CN116708019A - A cloud mailbox security monitoring method, device, equipment and storage medium - Google Patents
A cloud mailbox security monitoring method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN116708019A CN116708019A CN202310932568.6A CN202310932568A CN116708019A CN 116708019 A CN116708019 A CN 116708019A CN 202310932568 A CN202310932568 A CN 202310932568A CN 116708019 A CN116708019 A CN 116708019A
- Authority
- CN
- China
- Prior art keywords
- account
- preset
- alarm information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/08—Annexed information, e.g. attachments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/302—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/308—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Evolutionary Computation (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
技术领域technical field
本发明涉及网络安全技术领域,特别涉及一种云邮箱安全监测方法、装置、设备及存储介质。The present invention relates to the technical field of network security, in particular to a cloud mailbox security monitoring method, device, equipment and storage medium.
背景技术Background technique
以邮件为媒介的钓鱼攻击严重威胁着企业的信息安全,过往基于邮件安全网关的防护方案可以在一定程度上过滤一部分的垃圾邮件、钓鱼邮件和病毒邮件,邮件安全网关是一种串联在邮件通信链路中的网络安全设备,通过特征和算法可以识别垃圾邮件,病毒邮件、钓鱼邮件,并根据策略实施拦截和告警。由于是串联设备,为了减少误报,所以通常邮件安全网关的检测阈值相对比较严格,会有少量的垃圾邮件、病毒邮件或者钓鱼邮件会穿透邮件安全网关到达用户的邮箱。同时,作为串联设备,邮件安全网关更多的是针对单封邮件做流式分析,不会针对一段时间内的多封邮件、多个账号等的离线统计关联行为的分析。但是仍然会存在一部分的恶意邮件被投递到收件人文件夹中,这种钓鱼邮件往往可以通过流量监测设备监控。但是目前使用云邮箱的场景下,由于无法引流,所以漏掉收件人文件夹的恶意邮件无法被监控,形成了安全监测的死角,带来了巨大风险。Phishing attacks using mail as the medium seriously threaten the information security of enterprises. In the past, protection solutions based on mail security gateways can filter part of spam, phishing emails and virus mails to a certain extent. The network security devices in the link can identify spam, virus, and phishing emails through features and algorithms, and implement blocking and warning according to policies. Because it is a series of devices, in order to reduce false positives, the detection threshold of the email security gateway is usually relatively strict, and a small amount of spam, virus emails or phishing emails will pass through the email security gateway and reach the user's mailbox. At the same time, as a series device, the email security gateway is more for streaming analysis of a single email, and will not analyze the offline statistical correlation behavior of multiple emails and multiple accounts within a period of time. However, some malicious emails will still be delivered to recipient folders, and such phishing emails can often be monitored by traffic monitoring equipment. However, in the current cloud mailbox scenario, malicious emails that miss the recipient folder cannot be monitored due to the inability to divert traffic, forming a blind spot for security monitoring and bringing huge risks.
发明内容Contents of the invention
有鉴于此,本发明的目的在于提供一种云邮箱安全监测方法、装置、设备及存储介质,能够解决邮件安全网关无法100%防护钓鱼邮件,且对于漏掉的钓鱼邮件无法监测、当前的邮件网关或者其他安全设备无法监测账号异常以及云邮箱环境下,因无法获取邮件通信流量而无法开展邮件监测的技术问题。其具体方案如下:In view of this, the purpose of the present invention is to provide a cloud mailbox security monitoring method, device, equipment and storage medium, which can solve the problem that the email security gateway cannot 100% protect phishing emails, and cannot monitor missed phishing emails, and the current email Gateways or other security devices are unable to monitor account abnormalities, and in the cloud mailbox environment, email monitoring cannot be carried out due to the inability to obtain email communication traffic. The specific plan is as follows:
第一方面,本申请公开了一种云邮箱安全监测方法,包括:In the first aspect, the present application discloses a cloud mailbox security monitoring method, including:
基于邮件备份规则将待监控账号的邮件备份至预先创建的监控账号;所述监控账号为用于监控业务的邮箱账号;Backup the mail of the account to be monitored to a pre-created monitoring account based on the email backup rule; the monitoring account is an email account for monitoring business;
根据互联网邮件访问协议以及预先为所述监控账号配置的邮箱信息从所述监控账号中拉取所述待监控账号的邮件,以得到拉取后邮件;Pulling the mail of the account to be monitored from the monitoring account according to the Internet mail access protocol and the mailbox information pre-configured for the monitoring account to obtain the pulled mail;
对所述拉取后邮件进行解析,以获取相应的若干邮件数据,并利用预设特征算法以及预设行为算法基于流式分析和离线分析对各所述邮件数据进行分析,以生成相应的告警信息;Analyzing the pulled emails to obtain corresponding email data, and analyzing the email data based on stream analysis and offline analysis by using preset feature algorithms and preset behavior algorithms to generate corresponding alarms information;
基于预设标记算法将所述告警信息进行置信度标记,并基于所述置信度对所述告警信息进行相应的自动推送操作或人工分析操作。The alarm information is marked with a confidence level based on a preset marking algorithm, and a corresponding automatic push operation or manual analysis operation is performed on the alarm information based on the confidence level.
可选的,所述基于邮件备份规则将待监控账号的邮件备份至预先创建的监控账号之后,还包括:Optionally, after the email of the account to be monitored is backed up to the pre-created monitoring account based on the email backup rule, it also includes:
判断当前所述监控账号中的邮件数量是否超过预设邮件数量;Judging whether the number of mails in the current monitoring account exceeds the preset number of mails;
若是,则基于预设删除规则删除全部已读邮件;If yes, delete all read emails based on preset deletion rules;
若否,则基于预设删除时间删除所述预设删除时间之前的全部已读邮件。If not, all the read emails before the preset deletion time are deleted based on the preset deletion time.
可选的,所述对所述拉取后邮件进行解析,以获取相应的若干邮件数据,包括:Optionally, the said extracted mail is parsed to obtain a corresponding number of mail data, including:
基于电子邮件传输协议读取所述拉取后邮件中的各邮件头的键值,并抽取所述键值中的预设关键信息并对所述拉取后邮件的邮件附件以及邮件正文进行分析,以得到所述若干邮件数据;所述若干邮件数据包括发件人、收件人、实际发件人、发件IP、附件名称、附件哈希值、附件中的统一资源定位符、正文中的统一资源定位符、QQ号码、手机号以及敏感词中的任意一种或几种的组合。Reading the key value of each mail header in the extracted mail based on the email transmission protocol, extracting the preset key information in the key value, and analyzing the mail attachment and the mail text of the pulled mail , to obtain the several mail data; the several mail data include the sender, recipient, actual sender, sender IP, attachment name, attachment hash value, uniform resource locator in the attachment, text in the Any one or combination of several of the Uniform Resource Locator, QQ number, mobile phone number, and sensitive words.
可选的,所述利用预设特征算法以及预设行为算法基于流式分析和离线分析对各所述邮件数据进行分析,以生成相应的告警信息,包括:Optionally, the use of preset feature algorithms and preset behavior algorithms to analyze each of the email data based on streaming analysis and offline analysis, so as to generate corresponding alarm information, including:
将各所述邮件数据与预设情报库进行匹配;matching each of the email data with a preset intelligence database;
若匹配成功,则生成相应的告警信息;If the matching is successful, a corresponding alarm message is generated;
若匹配失败,则基于预设钓鱼行为检测算法确定各所述邮件数据中是否存在目标行为,若存在所述目标行为,则生成相应的告警信息;所述目标行为包括仿冒域名、仿冒用户名以及仿冒用户业务任意一种或几种的组合;If the matching fails, it is determined whether there is a target behavior in each of the email data based on a preset phishing behavior detection algorithm, and if there is the target behavior, then corresponding alarm information is generated; the target behavior includes fake domain names, fake user names and Counterfeiting any one or combination of several types of user services;
基于预设账号伪造识别算法确定各所述邮件数据中的用户名,确定所述用户名中的异常用户名,以基于所述异常用户名以及预设域名查询工具确定各所述邮件数据中是否存在伪造账号,若是,则生成相应的告警信息;Determine the user name in each of the mail data based on a preset account forgery identification algorithm, and determine the abnormal user name in the user name, so as to determine whether in each of the mail data based on the abnormal user name and the preset domain name query tool If there is a fake account, if so, a corresponding alarm message will be generated;
基于预设异常链接提取算法将各所述邮件数据与所述预设情报库进行匹配,基于匹配结果确定各所述邮件数据中是否存在异常链接,若存在,则生成相应的告警信息;Match each of the email data with the preset intelligence database based on a preset abnormal link extraction algorithm, determine whether there is an abnormal link in each of the email data based on the matching result, and generate corresponding alarm information if there is;
基于预设行为基线匹配算法对当前各所述邮件数据中还未经过检测的数据进行离线分析,以确定所述待监控账号的收发信行为基线是否偏离预设基准,若是,则判定所述待监控账号异常,并生成相应的告警信息。Based on the preset behavior baseline matching algorithm, the data that has not been detected in the current email data is analyzed offline to determine whether the sending and receiving behavior baseline of the account to be monitored deviates from the preset benchmark, and if so, then determine the pending Monitor account abnormalities and generate corresponding alarm information.
可选的,所述基于预设行为基线匹配算法对当前各所述邮件数据中还未经过检测的数据进行离线分析之前,还包括:Optionally, before the offline analysis of the undetected data in the email data based on the preset behavioral baseline matching algorithm, the method further includes:
基于预设周期对所述监控账号的账号行为基线进行学习以确定所述监控账号的行为基线,得到所述预设基准。The account behavior baseline of the monitored account is learned based on a preset period to determine the behavior baseline of the monitored account to obtain the preset baseline.
可选的,所述方法还包括:Optionally, the method also includes:
从基于所述预设钓鱼行为检测算法、所述预设账号伪造识别算法、所述预设异常链接提取算法以及所述预设行为基线匹配算法对各所述邮件数据进行分析后生成的告警信息中提取目标字段信息;Alarm information generated after analyzing each email data based on the preset phishing behavior detection algorithm, the preset account forgery identification algorithm, the preset abnormal link extraction algorithm and the preset behavior baseline matching algorithm Extract target field information from
基于所述目标字段信息对所述预设情报库进行更新。The preset intelligence library is updated based on the target field information.
可选的,所述基于预设标记算法将所述告警信息进行置信度标记,包括:Optionally, marking the alarm information with confidence based on a preset marking algorithm includes:
将在所述邮件数据与所述预设情报库匹配成功后生成的告警信息的置信度标记为可信;Marking the confidence level of the alarm information generated after the email data is successfully matched with the preset intelligence database as credible;
相应的,所述基于所述置信度对所述告警信息进行相应的自动推送操作或人工分析操作,包括:Correspondingly, performing a corresponding automatic push operation or manual analysis operation on the alarm information based on the confidence level includes:
对置信度标记为可信的所述告警信息进行自动推送操作,并对其他的所述告警信息进行人工分析操作,以对所述告警信息进行相应的人工标记。An automatic push operation is performed on the alarm information whose confidence level is marked as credible, and a manual analysis operation is performed on the other alarm information, so as to manually mark the alarm information accordingly.
第二方面,本申请公开了一种云邮箱安全监测装置,包括:In a second aspect, the present application discloses a cloud mailbox security monitoring device, including:
邮件备份模块,用于基于邮件备份规则将待监控账号的邮件备份至预先创建的监控账号;所述监控账号为用于监控业务的邮箱账号;The email backup module is used to back up the emails of the account to be monitored to the pre-created monitoring account based on the email backup rule; the monitoring account is the email account for monitoring the business;
邮件拉取模块,用于根据互联网邮件访问协议以及预先为所述监控账号配置的邮箱信息从所述监控账号中拉取所述待监控账号的邮件,以得到拉取后邮件;The mail pulling module is used to pull the mail of the account to be monitored from the monitoring account according to the Internet mail access protocol and the mailbox information configured in advance for the monitoring account, so as to obtain the mail after pulling;
数据分析模块,用于对所述拉取后邮件进行解析,以获取相应的若干邮件数据,并利用预设特征算法以及预设行为算法基于流式分析和离线分析对各所述邮件数据进行分析,以生成相应的告警信息;The data analysis module is used to analyze the pulled emails to obtain a corresponding number of email data, and analyze each of the email data based on stream analysis and offline analysis by using preset feature algorithms and preset behavior algorithms , to generate corresponding alarm information;
置信度标记模块,用于基于预设标记算法将所述告警信息进行置信度标记;A confidence marking module, configured to mark the alarm information with confidence based on a preset marking algorithm;
告警信息处理模块,用于基于所述置信度对所述告警信息进行相应的自动推送操作或人工分析操作。The alarm information processing module is configured to perform a corresponding automatic push operation or manual analysis operation on the alarm information based on the confidence level.
第三方面,本申请公开了一种电子设备,包括:In a third aspect, the present application discloses an electronic device, comprising:
存储器,用于保存计算机程序;memory for storing computer programs;
处理器,用于执行所述计算机程序,以实现前述公开的所述的云邮箱安全监测方法的步骤。The processor is configured to execute the computer program to implement the steps of the cloud mailbox security monitoring method disclosed above.
第四方面,本申请公开了一种计算机可读存储介质,用于存储计算机程序;其中,所述计算机程序被处理器执行时实现前述公开的所述的云邮箱安全监测方法的步骤。In a fourth aspect, the present application discloses a computer-readable storage medium for storing a computer program; wherein, when the computer program is executed by a processor, the steps of the cloud mailbox security monitoring method disclosed above are implemented.
由上可知,本申请在对云邮箱进行安全监测时,首先基于邮件备份规则将待监控账号的邮件备份至预先创建的监控账号;所述监控账号为用于监控业务的邮箱账号;根据互联网邮件访问协议以及预先为所述监控账号配置的邮箱信息从所述监控账号中拉取所述待监控账号的邮件,以得到拉取后邮件;对所述拉取后邮件进行解析,以获取相应的若干邮件数据,并利用预设特征算法以及预设行为算法基于流式分析和离线分析对各所述邮件数据进行分析,以生成相应的告警信息;最终基于预设标记算法将所述告警信息进行置信度标记,并基于所述置信度对所述告警信息进行相应的自动推送操作或人工分析操作。可见,本申请首先通过邮件备份的方式实现邮件元数据采集,并利用行为算法以及流式和离线分析方法检测钓鱼邮件,并基于置信度选择自动性告警,实现告警的及时性,进而能够通过邮箱系统的备份/过滤功能,将需要监控的邮件备份到一个监控业务账号,然后使用互联网邮件访问协议拉取该监控业务账号中的所有邮件,来解析、分析、识别恶意邮件,上报告警,最终实现风险及时发现,风险集中管控。As can be seen from the above, when the application performs security monitoring on the cloud mailbox, first, based on the email backup rules, the emails of the account to be monitored are backed up to the pre-created monitoring account; the monitoring account is the email account used to monitor the business; The access protocol and the mailbox information pre-configured for the monitoring account pull the email of the account to be monitored from the monitoring account to obtain the pulled email; analyze the pulled email to obtain the corresponding A number of mail data, and use preset feature algorithms and preset behavior algorithms to analyze each of the mail data based on streaming analysis and offline analysis to generate corresponding alarm information; finally, based on preset marking algorithms, the alarm information is processed Confidence mark, and perform a corresponding automatic push operation or manual analysis operation on the alarm information based on the confidence degree. It can be seen that this application first implements email metadata collection through email backup, and uses behavioral algorithms and streaming and offline analysis methods to detect phishing emails, and selects automatic alarms based on the confidence level to achieve timely alarms, and then can pass emails. The backup/filtering function of the system backs up the emails that need to be monitored to a monitoring business account, and then uses the Internet mail access protocol to pull all the emails in the monitoring business account to parse, analyze, identify malicious emails, report to the police, and finally Realize timely discovery of risks and centralized risk management and control.
附图说明Description of drawings
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only It is an embodiment of the present invention, and those skilled in the art can also obtain other drawings according to the provided drawings without creative work.
图1为本申请公开的一种云邮箱安全监测方法流程图;Fig. 1 is a flow chart of a cloud mailbox security monitoring method disclosed in the present application;
图2为本申请公开的一种具体的云邮箱安全监测方法流程图;Fig. 2 is a flow chart of a specific cloud mailbox security monitoring method disclosed in the present application;
图3为本申请公开的一种具体的云邮箱安全监测装置结构示意图;FIG. 3 is a schematic structural diagram of a specific cloud mailbox security monitoring device disclosed in the present application;
图4为本申请公开的一种云邮箱安全监测装置结构示意图;FIG. 4 is a schematic structural diagram of a cloud mailbox security monitoring device disclosed in the present application;
图5为本申请公开的一种电子设备结构图。FIG. 5 is a structural diagram of an electronic device disclosed in the present application.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
目前主要根据邮件头中的域名、IP(Internet Protocol,互联网协议)和邮件内容中的链接黑名单来识别钓鱼邮件;根据邮件附件的MIME(Multipurpose Internet MailExtensions,多用途互联网邮件扩展)字段与MIME类型等不匹配来识别恶意附件。通常情况下,钓鱼邮件很可能来源于一个可信的域名和IP,因为钓鱼攻击者为了绕过检测,通常会先在黑市购买或者直接盗取正常单位的账号用于发送钓鱼邮件;在邮件接收方面,现有技术主要解决的是用户个人接收到邮件后的一种检测方法,无法实现集中管控。在告警展示方面现有技术主要是提前组建一个消息共享群,一个用户发现钓鱼邮件之后共享给其他用户。通常情况下,这种共享难以为继,以服务的方式来开展相应的工作,应当是服务商发现钓鱼邮件后精准推送给收件方。为了解决上述技术问题,本申请公开了一种云邮箱安全监测方法能够及时识别恶意邮件,并及时告警。At present, phishing emails are mainly identified based on the domain name in the email header, IP (Internet Protocol, Internet Protocol) and the link blacklist in the email content; according to the MIME (Multipurpose Internet MailExtensions, Multipurpose Internet Mail Extensions) field and MIME type of the email attachment Wait for a mismatch to identify malicious attachments. Usually, phishing emails are likely to originate from a credible domain name and IP, because in order to bypass detection, phishing attackers usually purchase on the black market or directly steal accounts of normal units to send phishing emails; On the one hand, the existing technology mainly solves a detection method after the individual user receives the mail, which cannot realize centralized management and control. In terms of alarm display, the existing technology is mainly to set up a message sharing group in advance, and share it with other users after a user finds a phishing email. Under normal circumstances, this kind of sharing is unsustainable. To carry out the corresponding work in the form of service, the service provider should accurately push it to the recipient after discovering the phishing email. In order to solve the above technical problems, the present application discloses a cloud mailbox security monitoring method capable of identifying malicious emails in time and giving an alarm in time.
参见图1所示,本发明实施例公开了一种云邮箱安全监测方法,包括:Referring to Fig. 1, the embodiment of the present invention discloses a cloud mailbox security monitoring method, including:
步骤S11、基于邮件备份规则将待监控账号的邮件备份至预先创建的监控账号;所述监控账号为用于监控业务的邮箱账号。Step S11 , based on the email backup rules, back up the emails of the account to be monitored to a pre-created monitoring account; the monitoring account is an email account for monitoring business.
本实施例中,在进行邮件备份之前,要首先创建或者选择一个独占用于监控业务的邮件业务账号,称为监控账号,并确定监测范围、需要监测的邮件账号或者部门,之后便可以根据邮件备份规则,将全部待监控的账号邮件备份到监控账号,这样来实现账号的统一管理。In this embodiment, before performing email backup, one must first create or select an email service account exclusively used for monitoring services, which is called a monitoring account, and determine the scope of monitoring, email accounts or departments that need to be monitored, and then you can Backup rules, backup all account emails to be monitored to the monitoring account, so as to realize the unified management of accounts.
步骤S12、根据互联网邮件访问协议以及预先为所述监控账号配置的邮箱信息从所述监控账号中拉取所述待监控账号的邮件,以得到拉取后邮件。Step S12, pull the email of the account to be monitored from the monitoring account according to the Internet mail access protocol and the mailbox information pre-configured for the monitoring account, so as to obtain the pulled email.
本实施例中,首先配置所述监控账号的邮箱账号、密码、邮箱域名,启动采集引擎,这样采集引擎使用IMAP(Internet Mail Access Protocol,互联网邮件访问协议)协议和配置的账号拉取邮件,由此实现集中管控,且不用再配置企业里面的其它账号。需要指出的是,在基于邮件备份规则将待监控账号的邮件备份至预先创建的监控账号之后,要判断当前所述监控账号中的邮件数量是否超过预设邮件数量;若是,则基于预设删除规则删除全部已读邮件;若否,则基于预设删除时间删除所述预设删除时间之前的全部已读邮件。每个账号的邮箱存储是有上限的,企业的邮件都备份到账号,账号文件夹容易撑满,所以要做自适应的文件删除。在这里,本申请公开了一种邮件标记和删除算法,首先默认删除N天前的邮件,或者文件夹最大邮件数量M;具体过程就是:第一、获取当前邮箱的未读邮件数量n;第二、读取这n条邮件,并设置为已读;第三、获取当前邮箱的已读邮箱数量m;第四、如果(m+n)>m,立即启动邮件删除操作,进入步骤四;第五、获取N天前的邮件数量k,并删除这批邮件,判定当前(m+n-k)>m是否成立,如果成立,那么就继续删除N-1天前的邮件,再判定,直到当i所在邮箱的已读邮件数量m<=M。In this embodiment, at first configure the mailbox account number, password, mailbox domain name of described monitoring account number, start collection engine, such collection engine uses IMAP (Internet Mail Access Protocol, Internet Mail Access Protocol) account number of agreement and configuration to pull mail, by This enables centralized management and control, and there is no need to configure other accounts in the enterprise. It should be pointed out that after backing up the emails of the account to be monitored to the pre-created monitoring account based on the email backup rules, it is necessary to determine whether the number of emails in the current monitoring account exceeds the preset number of emails; if so, delete the emails based on the preset The rule deletes all the read emails; if not, deletes all the read emails before the preset deletion time based on the preset deletion time. The mailbox storage of each account has an upper limit. Enterprise emails are all backed up to the account, and the account folder is easy to fill up, so adaptive file deletion is required. Here, the application discloses a mail marking and deletion algorithm. First, the mails from N days ago are deleted by default, or the maximum number of mails in a folder is M; the specific process is: first, obtain the number n of unread mails in the current mailbox; 2. Read the n mails and set them as read; 3. Obtain the number m of the read mailboxes of the current mailbox; 4. If (m+n)>m, immediately start the mail deletion operation and enter step 4; Fifth, get the number k of emails N days ago, and delete this batch of emails, and determine whether the current (m+n-k)>m is true. If it is true, then continue to delete the emails N-1 days ago, and then judge until the current The number of read mails m<=M of the mailbox where i is located.
步骤S13、对所述拉取后邮件进行解析,以获取相应的若干邮件数据,并利用预设特征算法以及预设行为算法基于流式分析和离线分析对各所述邮件数据进行分析,以生成相应的告警信息。Step S13: Parse the pulled emails to obtain corresponding email data, and analyze each email data based on streaming analysis and offline analysis using preset feature algorithms and preset behavior algorithms to generate corresponding warning information.
本实施例中,基于电子邮件传输协议读取所述拉取后邮件中的各邮件头的键值,并抽取所述键值中的预设关键信息并对所述拉取后邮件的邮件附件以及邮件正文进行分析,以得到所述若干邮件数据;所述若干邮件数据包括发件人、收件人、实际发件人、发件IP、附件名称、附件哈希值、附件中的统一资源定位符、正文中的统一资源定位符、QQ号码、手机号以及敏感词中的任意一种或几种的组合。就是首先根据电子邮件传输协议,将邮件头的各个键值读取出来,将邮件头的各个键值中关键的键抽取出来,如:发件人、收件人、实际发件人、发件IP等,并识别邮件附件,包含附件名称、附件HASH、附件中的URL(UniversalResource Locator,统一资源定位符);再识别邮件正文中的URL、QQ号、手机号、敏感词等。以此获取相应的若干邮件数据。之后,基于预设特征算法,即根据数据解析上来的各个字段,调用情报模块接口匹配,匹配中情报的邮件,证明邮件存在问题,上送对应的告警。需要指出的是,需要将在所述邮件数据与所述预设情报库匹配成功后生成的告警信息的置信度标记为可信;如果邮件检测命中,就可以跳出本阶段,否则采用预设行为算法检测,对拉取后邮件进行分析,调用预设钓鱼行为检测算法、预设账号伪造识别算法、预设异常链接提取算法,识别账号异常行为,并上送相应的告警信息,同时这里包括了流式分析以及离线分析,对于没有检出的数据,进行离线分析,分析账号的发信行为基线是否偏离基准,如果发现异常,则上送相应的告警信息。In this embodiment, the key value of each mail header in the mail after being pulled is read based on the email transmission protocol, and the preset key information in the key value is extracted, and the mail attachment of the mail after being pulled is extracted. and the text of the mail are analyzed to obtain the plurality of mail data; the plurality of mail data includes the sender, recipient, actual sender, sending IP, attachment name, attachment hash value, uniform resource in the attachment Locators, uniform resource locators in the text, QQ numbers, mobile phone numbers, and sensitive words, any one or a combination of several. It is to first read the key values of the mail header according to the email transmission protocol, and extract the key keys in the key values of the mail header, such as: sender, recipient, actual sender, sender IP, etc., and identify email attachments, including attachment name, attachment HASH, and URL (Universal Resource Locator, Uniform Resource Locator) in the attachment; then identify URL, QQ number, mobile phone number, sensitive words, etc. in the email body. In this way, corresponding pieces of mail data are obtained. Afterwards, based on the preset characteristic algorithm, that is, according to the various fields analyzed from the data, the intelligence module interface is called to match, and the emails in the intelligence are matched to prove that there is a problem with the email, and the corresponding alarm is sent. It should be pointed out that the confidence level of the alarm information generated after the email data is successfully matched with the preset intelligence database needs to be marked as credible; if the email detection hits, this stage can be skipped, otherwise the preset behavior will be adopted Algorithm detection, analyze the mail after pulling, call the preset phishing behavior detection algorithm, preset account forgery identification algorithm, preset abnormal link extraction algorithm, identify abnormal account behavior, and send corresponding alarm information, and here includes Streaming analysis and offline analysis, for the undetected data, offline analysis is performed to analyze whether the baseline of the account's letter sending behavior deviates from the baseline, and if any abnormality is found, corresponding alarm information will be sent.
步骤S14、基于预设标记算法将所述告警信息进行置信度标记,并基于所述置信度对所述告警信息进行相应的自动推送操作或人工分析操作。Step S14: Mark the alarm information with a confidence level based on a preset marking algorithm, and perform a corresponding automatic push operation or manual analysis operation on the alarm information based on the confidence level.
本实施例中,将在所述邮件数据与所述预设情报库匹配成功后生成的告警信息的置信度标记为可信;并对置信度标记为可信的所述告警信息进行自动推送操作,并对其他的所述告警信息进行人工分析操作,以对所述告警信息进行相应的人工标记,人工分析后,标记所述告警信息是真实告警还是误报。由此,本申请通过置信度标记实现了机器自动推送告警,以此保障失效性。In this embodiment, the confidence degree of the alarm information generated after the mail data is successfully matched with the preset intelligence database is marked as credible; and the alarm information marked as credible with the confidence degree is automatically pushed. , and perform a manual analysis operation on the other alarm information, so as to manually mark the alarm information accordingly, and mark whether the alarm information is a real alarm or a false alarm after the manual analysis. Therefore, the present application realizes the automatic push alarm of the machine through the confidence mark, so as to ensure the invalidity.
由上可知,本申请在对云邮箱进行安全监测时,首先基于邮件备份规则将待监控账号的邮件备份至预先创建的监控账号;所述监控账号为用于监控业务的邮箱账号;根据互联网邮件访问协议以及预先为所述监控账号配置的邮箱信息从所述监控账号中拉取所述待监控账号的邮件,以得到拉取后邮件;对所述拉取后邮件进行解析,以获取相应的若干邮件数据,并利用预设特征算法以及预设行为算法基于流式分析和离线分析对各所述邮件数据进行分析,以生成相应的告警信息;最终基于预设标记算法将所述告警信息进行置信度标记,并基于所述置信度对所述告警信息进行相应的自动推送操作或人工分析操作。可见,本申请首先通过邮件备份的方式实现邮件元数据采集,并利用行为算法以及流式和离线分析方法检测钓鱼邮件,并基于置信度选择自动性告警,实现告警的及时性,进而能够通过邮箱系统的备份、过滤功能,将需要监控的邮件备份到一个监控业务账号,然后使用互联网邮件访问协议拉取该监控业务账号中的所有邮件,来解析、分析、识别恶意邮件,上报告警,最终实现风险及时发现,风险集中管控。As can be seen from the above, when the application performs security monitoring on the cloud mailbox, first, based on the email backup rules, the emails of the account to be monitored are backed up to the pre-created monitoring account; the monitoring account is the email account used to monitor the business; The access protocol and the mailbox information pre-configured for the monitoring account pull the email of the account to be monitored from the monitoring account to obtain the pulled email; analyze the pulled email to obtain the corresponding A number of mail data, and use preset feature algorithms and preset behavior algorithms to analyze each of the mail data based on streaming analysis and offline analysis to generate corresponding alarm information; finally, based on preset marking algorithms, the alarm information is processed Confidence mark, and perform a corresponding automatic push operation or manual analysis operation on the alarm information based on the confidence degree. It can be seen that this application first implements email metadata collection through email backup, and uses behavioral algorithms and streaming and offline analysis methods to detect phishing emails, and selects automatic alarms based on the confidence level to achieve timely alarms, and then can pass emails. The backup and filtering functions of the system back up the emails that need to be monitored to a monitoring business account, and then use the Internet mail access protocol to pull all the emails in the monitoring business account to analyze, analyze, and identify malicious emails, report to the police, and finally Realize timely discovery of risks and centralized risk management and control.
参见图2所示,本发明实施例公开了一种具体的云邮箱安全监测方法,包括:Referring to Fig. 2, the embodiment of the present invention discloses a specific cloud mailbox security monitoring method, including:
步骤S21、将各邮件数据与预设情报库进行匹配。Step S21, matching each email data with a preset information database.
本实施例中,预设情报库包括基于历史经验提供的情报,同时要从基于预设钓鱼行为检测算法、预设账号伪造识别算法、预设异常链接提取算法以及预设行为基线匹配算法对各邮件数据进行分析后生成的告警信息中提取目标字段信息;并基于所述目标字段信息对所述预设情报库进行更新,将各邮件数据与预设情报库进行匹配。In this embodiment, the preset intelligence library includes information provided based on historical experience, and at the same time, it is necessary to analyze each Extracting target field information from the alarm information generated after the email data is analyzed; and updating the preset intelligence database based on the target field information, and matching each email data with the preset intelligence database.
步骤S22、若匹配成功,则生成相应的告警信息。Step S22, if the matching is successful, generate corresponding alarm information.
本实施例中,若各邮件数据与预设情报库匹配成功,则表明当前邮件有问题,则需要生成相应的告警信息,且需要指出的是,这里由情报匹配生成的告警信息可以直接将它的置信度标记为可信,由此之后便可以自动输出,来提高告警输出的及时性。In this embodiment, if each email data is successfully matched with the preset intelligence database, it indicates that there is a problem with the current email, and corresponding alarm information needs to be generated, and it should be pointed out that the alarm information generated by intelligence matching can directly send it The confidence level of the alarm is marked as credible, and then it can be automatically output to improve the timeliness of alarm output.
步骤S23、若匹配失败,则基于预设钓鱼行为检测算法确定各所述邮件数据中是否存在目标行为,若存在所述目标行为,则生成相应的告警信息;所述目标行为包括仿冒域名、仿冒用户名以及仿冒用户业务任意一种或几种的组合。Step S23. If the matching fails, determine whether there is a target behavior in each of the email data based on the preset phishing behavior detection algorithm, and if there is the target behavior, generate corresponding alarm information; the target behavior includes counterfeiting domain names, counterfeiting Any one or a combination of user names and counterfeit user services.
本实施例中,若各邮件数据与预设情报库匹配失败,则需要基于预设钓鱼行为检测算法确定各所述邮件数据中是否存在目标行为。由于实际情报库中不可能包含世界上所有的钓鱼邮件的情况,所以需要根据钓鱼邮件钓鱼攻击者的行为来检测,而钓鱼攻击者会有以下行为:仿冒域名或仿冒用户名或仿冒用户业务。首先使用数据库记录用户历史所有正常的通信方的域名;提取当前发件人的邮箱后缀域名,逐条与历史的域名根据编辑距离计算相似度,设定阈值为A,A根据经验值来设定,如果计算的编辑距离a<A,那么判定域名相似,存在仿冒域名的可能;之后提取邮件用户名,如果用户名中包含关键字IT、财务、管理员等关键词,那么判定用户名为可疑用户名;如果邮件正文出现修改、账号、打款等关键词,那么标记这封邮件可能是关键邮件,并且如果域名注册时间小于N,N通常小于1年。如果上述描述的行为任意出现两项以上,那么判定为钓鱼行为,需要生成相应的告警信息。In this embodiment, if each email data fails to match with the preset intelligence database, it is necessary to determine whether there is a target behavior in each email data based on a preset phishing behavior detection algorithm. Since the actual intelligence database cannot contain all phishing emails in the world, it needs to be detected based on the behavior of phishing attackers in phishing emails, and phishing attackers will have the following behaviors: counterfeiting domain names or counterfeiting user names or counterfeiting user services. First use the database to record the domain names of all normal communication parties in the user history; extract the current sender’s mailbox suffix domain name, calculate the similarity with the historical domain name one by one according to the edit distance, set the threshold to A, and A is set according to the experience value. If the calculated edit distance a<A, then it is determined that the domain names are similar, and there is a possibility of counterfeiting domain names; after that, the email user name is extracted, and if the user name contains keywords such as IT, finance, administrator, etc., then it is determined that the user name is a suspicious user name; if there are keywords such as modification, account number, and payment in the body of the email, then the email may be marked as a key email, and if the domain name registration time is less than N, N is usually less than 1 year. If any two or more of the behaviors described above appear, it is determined to be a phishing behavior, and a corresponding alarm message needs to be generated.
步骤S24、基于预设账号伪造识别算法确定各所述邮件数据中的用户名,确定所述用户名中的异常用户名,以基于所述异常用户名以及预设域名查询工具确定各所述邮件数据中是否存在伪造账号,若是,则生成相应的告警信息。Step S24: Determine the user name in each of the email data based on the preset account forgery identification algorithm, and determine the abnormal user name in the user name, so as to determine each of the emails based on the abnormal user name and the preset domain name query tool Whether there is a fake account in the data, if so, generate corresponding alarm information.
本实施例中,通过邮件的from头取出邮件账号,并提取@字符之前的部分,这部分是用户名;通过如下步骤识别异常用户名(识别字符串异常排列):In the present embodiment, the mail account number is taken out by the from header of the mail, and the part before the @ character is extracted, which is the user name; the abnormal user name is identified through the following steps (the identification character string is abnormally arranged):
1、将用户名所有字符转ascii编码,形成整数数组array,长度为k;1. Convert all characters of the user name to ascii encoding to form an integer array array with a length of k;
2、计算字符串array[i]-array[i-1],i<k-1,并将结果存入数组newarray;2. Calculate the string array[i]-array[i-1], i<k-1, and store the result in the array newarray;
3、计算newarray数组所有数值方差,作为平滑度;3. Calculate the variance of all values in the newarray array as smoothness;
4、设定阈值,阈值根据实际收集的样本来计算,根据经验设定为10;4. Set the threshold. The threshold is calculated based on the actual collected samples and is set to 10 based on experience;
5、平滑度>10的为异常用户名;5. The smoothness > 10 is an abnormal user name;
如果是异常用户名,提取邮件账号,@字符之后的部分,这部分是域名;使用nslookup(域名查询)工具获取域名的txt记录,如果txt的spf(Sender Policy Framework,发信者策略架构)记录不存在,或者发信ip不在spf允许范围内,那么是任意邮件账号伪造,发件账号无效,需要产生告警。If it is an abnormal user name, extract the email account, the part after the @ character, this part is the domain name; use the nslookup (domain name query) tool to obtain the txt record of the domain name, if the spf (Sender Policy Framework) record of the txt is not If it exists, or the sending ip is not within the allowed range of spf, then any email account is forged, the sending account is invalid, and an alarm needs to be generated.
步骤S25、基于预设异常链接提取算法将各所述邮件数据与所述预设情报库进行匹配,基于匹配结果确定各所述邮件数据中是否存在异常链接,若存在,则生成相应的告警信息。Step S25: Match each of the email data with the preset intelligence database based on a preset abnormal link extraction algorithm, determine whether there is an abnormal link in each of the email data based on the matching result, and if so, generate corresponding alarm information .
本实施例中,与目标情报库进行匹配,这里的目标情报库为从基于预设钓鱼行为检测算法、预设账号伪造识别算法、预设异常链接提取算法以及预设行为基线匹配算法对各邮件数据进行分析后生成的告警信息中提取目标字段信息;并基于所述目标字段信息对所述预设情报库进行更新得到的情报库。如果直接匹配中URL中的域名、路径,那么认定异常链接;如果没有命中情报,那么识别链接的行为特征,提取链接的参数,如果链接形如http://test.co m/?Param;如果Param中包含了收件人账户,如mail=test@test.com,且以#号结尾,且&字符不超过1个,那么认定为异常;如果Param是base64编码的,那么直接解码,如果解码字符串包含了收件人账户,如mail=test@test.co m,且&字符不超过1个,那么认定为异常,需要生成相应的告警信息。In this embodiment, it is matched with the target intelligence database, where the target intelligence database is based on the preset phishing behavior detection algorithm, the preset account forgery identification algorithm, the preset abnormal link extraction algorithm and the preset behavior baseline matching algorithm for each email The target field information is extracted from the alarm information generated after data analysis; and the intelligence base is obtained by updating the preset intelligence base based on the target field information. If it directly matches the domain name and path in the URL, then identify the abnormal link; if there is no hit information, then identify the behavior characteristics of the link and extract the parameters of the link. If the link is in the form of http://test.com/? Param; if the Param contains the recipient account, such as mail=test@test.com, and ends with #, and the & character does not exceed 1, then it is considered abnormal; if the Param is base64 encoded, then decode it directly , if the decoded string contains the recipient account, such as mail=test@test.com, and there is no more than one & character, then it is considered abnormal and a corresponding alarm message needs to be generated.
步骤S26、基于预设行为基线匹配算法对当前各所述邮件数据中还未经过检测的数据进行离线分析,以确定所述待监控账号的收发信行为基线是否偏离预设基准,若是,则判定所述待监控账号异常,并生成相应的告警信息。Step S26, based on the preset behavior baseline matching algorithm, perform offline analysis on the undetected data in the current email data to determine whether the sending and receiving behavior baseline of the account to be monitored deviates from the preset benchmark, and if so, determine The account to be monitored is abnormal, and corresponding alarm information is generated.
本实施例中,基于预设行为基线匹配算法对当前各所述邮件数据中还未经过检测的数据进行离线分析之前,还包括:基于预设周期对所述监控账号的账号行为基线进行学习以确定所述监控账号的行为基线,得到所述预设基准。例如:In this embodiment, before performing offline analysis on the undetected data in the current mail data based on the preset behavior baseline matching algorithm, it also includes: learning the account behavior baseline of the monitoring account based on the preset period to A behavior baseline of the monitored account is determined to obtain the preset baseline. For example:
周期内账号正常的发信数量区间为[M1,N1];The range of the normal number of letters sent by the account within the period is [M1, N1];
周期内账号正常的收信数量区间为[M2,N2];The range of the normal number of received letters for an account within a period is [M2, N2];
周期内账号正常的发信通信账号数量为[M3,N3];The number of normal sending communication accounts within the period is [M3, N3];
周期内账号正常的收信通信账号数量为[M4,N4];The number of receiving communication accounts with normal accounts in the period is [M4, N4];
周期内账号正常的发信抄送账号数量为[M5,N5];The number of CC accounts that are normally sent by the account within the period is [M5, N5];
周期内账号正常的发信IP集合为IP[ip1、ip2……ipn];The set of normal sending IP addresses of the accounts within the period is IP[ip1, ip2...ipn];
周期内账号正常的发信客户端集合为UA[UA1、UA2……UAN];The set of sending clients with normal accounts in the period is UA[UA1, UA2...UAN];
之后进行离线分析,即首先定义周期为K,与学习周期一致;计算K天前到当前的数据统计,包含发信数量p1,收信数量p2,发信通信账号数量p3,收信通信账号p4、发信抄送账号p5、发信IP集合A,发信客户端集合B;并设定允许的误差δ1、δ2、δ3、δ4、δ5对应学习的统计量;最后如果p1>N1+δ、p2>N2+δ、p3>N3+δ、p4>N4+δ、p5>N5+δ、其中任意一项成立,那么判定该账号存在异常行为,需要生成相应的告警信息。需要指出的是,如果同一账号的行为被三个或三个以上的算法均检测出异常,则直接将其对应的告警信息的置信度标记为可信。Then conduct offline analysis, that is, first define the period as K, which is consistent with the learning period; calculate the data statistics from K days ago to the present, including the number of sent letters p1, the number of received letters p2, the number of sending communication accounts p3, and the number of receiving communication accounts p4 , sending cc account number p5, sending IP set A, sending client set B; and setting allowable errors δ1, δ2, δ3, δ4, δ5 corresponding to the learning statistics; finally if p1>N1+δ, p2>N2+δ, p3>N3+δ, p4>N4+δ, p5>N5+δ, If any one of them is true, it is determined that the account has abnormal behavior, and corresponding alarm information needs to be generated. It should be pointed out that if the behavior of the same account is detected as abnormal by three or more algorithms, the confidence level of the corresponding alarm information will be directly marked as credible.
可见,本申请通过使用流式分析以及离线分析对邮件进行全方位的行为特征分析来准确判断恶意邮件的存在,由此能够解决邮件安全网关无法100%防护钓鱼邮件,且对于漏掉的钓鱼邮件无法监测的问题,以及解决当前的邮件网关或者其他安全设备无法监测账号异常的问题。从而实现风险及时发现,风险集中管控。It can be seen that this application can accurately determine the existence of malicious emails by using stream analysis and offline analysis to analyze the comprehensive behavior characteristics of emails, thereby solving the problem that the email security gateway cannot 100% protect phishing emails, and for missed phishing emails Problems that cannot be monitored, and solve the problem that current mail gateways or other security devices cannot monitor abnormal accounts. In order to realize the timely discovery of risks and centralized risk management and control.
基于上述实施例可知,本申请公开了一种云邮箱安全监测方法,能够及时发现邮箱中存在的风险。接下来,将针对基于云邮箱安全监测方法的对应装置进行具体的描述。参见图3所示,本申请实施例公开了一种具体的云邮箱安全监测装置,包括:Based on the foregoing embodiments, it can be seen that the present application discloses a method for monitoring security of cloud mailboxes, which can detect risks existing in mailboxes in time. Next, a specific description will be given for the corresponding device based on the cloud mailbox security monitoring method. Referring to Figure 3, the embodiment of the present application discloses a specific cloud mailbox security monitoring device, including:
本实施例中,装置包括了两个主模块,以及四个子模块,其中引擎模块负责数据的输入和处理,包含钓鱼邮件得采集解析,特性和行为分析,分析生成对应的告警,并根据算法置信度给对应告警打上可信和一般的置信度标签,在分析工作中特征匹配算法会依赖情报模块的数据。同时,整套装置采用旁路部署的方式,引擎模块支持多个引擎串接,支持流式分析和离线分析两种模式,其中,流式分析开展邮件路由和内容异常分析:In this embodiment, the device includes two main modules and four sub-modules, among which the engine module is responsible for data input and processing, including collection and analysis of phishing emails, characteristic and behavior analysis, analysis and generation of corresponding alarms, and confidence based on algorithms The corresponding alarms are marked with credible and general confidence labels. In the analysis work, the feature matching algorithm will rely on the data of the intelligence module. At the same time, the entire device adopts a bypass deployment method. The engine module supports multiple engine serial connections, and supports two modes of streaming analysis and offline analysis. Among them, streaming analysis carries out email routing and content anomaly analysis:
1、通过邮件头中的from、to、reply-to、sender、x-sender、x-sender-ip字段识别代发、账号伪造等异常行为;1. Use the from, to, reply-to, sender, x-sender, and x-sender-ip fields in the email header to identify abnormal behaviors such as proxy delivery and account forgery;
2、通过提取邮件内容中的链接、附件中的链接,图片二维码转换的链接,基于链接特征和情报匹配识别恶意邮件。2. Identify malicious emails based on link features and intelligence matching by extracting links in email content, links in attachments, and links converted from image QR codes.
另一方面,离线分析开展账号行为异常分析:On the other hand, offline analysis conducts abnormal account behavior analysis:
1、以周为单位的周期性账号行为统计学习,学习账号的收发信基线,该基线包含发信账号清单,收信账号清单,抄送账号清单,发送邮件数量,收信邮件数量,发信IP地址,收信IP地址,发信邮件客户端;1. Periodic statistical study of account behavior in weekly units, learning the baseline of sending and receiving letters of accounts, which includes a list of sending accounts, a list of receiving accounts, a list of CC accounts, the number of sent emails, the number of received emails, and the number of emails sent. IP address, receiving IP address, sending email client;
2、按天滚动式的统计分析,分析基线偏离情况,如近一周的联系账号数量,收件数量,发件数量,新增发信IP数量。2. Rolling statistical analysis on a daily basis to analyze baseline deviations, such as the number of contact accounts in the past week, the number of incoming mail, the number of outgoing mail, and the number of new sending IPs.
运营模块主要负责数据的输出和运营,针对置信度为可信的数据可以设置自动输出告警,置信度为一般的数据,经过人工研判后输出告警。针对输出的告警,提取告警中的关键字段,生成对应的情报,情报包含,域名情报、IP情报、URL情报、QQ号情报、手机号情报、附件HASH情报、账号情报等。The operation module is mainly responsible for the output and operation of data. Automatic output alarms can be set for data whose confidence level is credible. For data with a general confidence level, alarms can be output after manual research and judgment. For the output alarm, extract the key fields in the alarm and generate corresponding intelligence, which includes domain name information, IP information, URL information, QQ number information, mobile phone number information, attachment HASH information, account information, etc.
采集模块就是配置好监控账号的邮箱账号、密码、邮箱域名之后,启动采集引擎,采集引擎使用IMAP协议和配置的账号从监控账号中拉取邮件,以得到拉取后邮件。接下来,分析模块对拉取后邮件进行分析,包括:对所述拉取后邮件进行解析,以获取相应的若干邮件数据,并利用预设特征算法以及预设行为算法基于流式分析和离线分析对各所述邮件数据进行分析,以生成相应的告警信息,告警模块,就是基于预设标记算法将所述告警信息进行置信度标记,并基于所述置信度对所述告警信息进行相应的自动推送操作或人工分析操作。情报模块是首先查询未提取情报的告警。之后运营人员根据经验选择未提取情报的告警中的发件账号、发件域名、URL、IP、QQ号、手机号、附件HASH字段的其中一个或者多个作为情报。The collection module is to start the collection engine after configuring the email account, password, and email domain name of the monitoring account. The collection engine uses the IMAP protocol and the configured account to pull emails from the monitoring account to obtain the emails after pulling. Next, the analysis module analyzes the pulled emails, including: parsing the pulled emails to obtain corresponding email data, and using preset feature algorithms and preset behavior algorithms based on stream analysis and offline Analyzing and analyzing each of the mail data to generate corresponding alarm information, the alarm module is to mark the alarm information with a confidence degree based on a preset marking algorithm, and perform a corresponding response to the alarm information based on the confidence degree. Automatic push operation or manual analysis operation. The intelligence module is the first to query the alarms that have not extracted intelligence. Afterwards, the operator selects one or more of the sending account, sending domain name, URL, IP, QQ number, mobile phone number, and attachment HASH fields in the alarm that has not extracted intelligence as intelligence based on experience.
由上可知,本申请提供一种云邮箱邮件、账号的安全监测装置,为使用了云邮箱的用户提供邮件安全监测能力。通过邮箱系统的备份、过滤功能,将需要监控的邮件备份到一个监控业务账号,然后使用IMAP协议拉取该监控业务账号中的所有邮件,解析、分析、识别恶意邮件,上报告警,实现风险及时发现,风险集中管控。As can be seen from the above, the present application provides a security monitoring device for cloud mailbox emails and accounts, which provides email security monitoring capabilities for users who use cloud mailboxes. Through the backup and filtering functions of the mailbox system, back up the emails that need to be monitored to a monitoring business account, and then use the IMAP protocol to pull all the emails in the monitoring business account, parse, analyze, identify malicious emails, and report to the police to realize the risk Timely detection and centralized risk management and control.
参见图4所示,本发明实施例公开了一种云邮箱安全监测装置,包括:Referring to Figure 4, the embodiment of the present invention discloses a cloud mailbox security monitoring device, including:
邮件备份模块11,用于基于邮件备份规则将待监控账号的邮件备份至预先创建的监控账号;所述监控账号为用于监控业务的邮箱账号;Mail backup module 11 is used for backing up the mail of the account to be monitored to a pre-created monitoring account based on the mail backup rule; the monitoring account is a mailbox account for monitoring business;
邮件拉取模块12,用于根据互联网邮件访问协议以及预先为所述监控账号配置的邮箱信息从所述监控账号中拉取所述待监控账号的邮件,以得到拉取后邮件;The mail pulling module 12 is used to pull the mail of the account to be monitored from the monitoring account according to the Internet mail access protocol and the mailbox information configured in advance for the monitoring account, so as to obtain the mail after pulling;
数据分析模块13,用于对所述拉取后邮件进行解析,以获取相应的若干邮件数据,并利用预设特征算法以及预设行为算法基于流式分析和离线分析对各所述邮件数据进行分析,以生成相应的告警信息;The data analysis module 13 is used to analyze the emails after pulling to obtain a corresponding number of email data, and use preset feature algorithms and preset behavior algorithms to analyze each of the email data based on streaming analysis and offline analysis. Analyze to generate corresponding alarm information;
置信度标记模块14,用于基于预设标记算法将所述告警信息进行置信度标记;Confidence marking module 14, configured to mark the alarm information with confidence based on a preset marking algorithm;
告警信息处理模块15,用于基于所述置信度对所述告警信息进行相应的自动推送操作或人工分析操作。The alarm information processing module 15 is configured to perform a corresponding automatic push operation or manual analysis operation on the alarm information based on the confidence level.
由上可知,本申请在对云邮箱进行安全监测时,首先基于邮件备份规则将待监控账号的邮件备份至预先创建的监控账号;所述监控账号为用于监控业务的邮箱账号;根据互联网邮件访问协议以及预先为所述监控账号配置的邮箱信息从所述监控账号中拉取所述待监控账号的邮件,以得到拉取后邮件;对所述拉取后邮件进行解析,以获取相应的若干邮件数据,并利用预设特征算法以及预设行为算法基于流式分析和离线分析对各所述邮件数据进行分析,以生成相应的告警信息;最终基于预设标记算法将所述告警信息进行置信度标记,并基于所述置信度对所述告警信息进行相应的自动推送操作或人工分析操作。可见,本申请首先通过邮件备份的方式实现邮件元数据采集,并利用行为算法以及流式和离线分析方法检测钓鱼邮件,并基于置信度选择自动性告警,实现告警的及时性,进而能够通过邮箱系统的备份、过滤功能,将需要监控的邮件备份到一个监控业务账号,然后使用互联网邮件访问协议拉取该监控业务账号中的所有邮件,来解析、分析、识别恶意邮件,上报告警,最终实现风险及时发现,风险集中管控。As can be seen from the above, when the application performs security monitoring on the cloud mailbox, first, based on the email backup rules, the emails of the account to be monitored are backed up to the pre-created monitoring account; the monitoring account is the email account used to monitor the business; The access protocol and the mailbox information pre-configured for the monitoring account pull the email of the account to be monitored from the monitoring account to obtain the pulled email; analyze the pulled email to obtain the corresponding A number of mail data, and use preset feature algorithms and preset behavior algorithms to analyze each of the mail data based on streaming analysis and offline analysis to generate corresponding alarm information; finally, based on preset marking algorithms, the alarm information is processed Confidence mark, and perform a corresponding automatic push operation or manual analysis operation on the alarm information based on the confidence degree. It can be seen that this application first implements email metadata collection through email backup, and uses behavioral algorithms and streaming and offline analysis methods to detect phishing emails, and selects automatic alarms based on the confidence level to achieve timely alarms, and then can pass emails. The backup and filtering functions of the system back up the emails that need to be monitored to a monitoring business account, and then use the Internet mail access protocol to pull all the emails in the monitoring business account to analyze, analyze, and identify malicious emails, report to the police, and finally Realize timely discovery of risks and centralized risk management and control.
在一些具体的实施例中,所述邮件备份模块11,还可以包括:In some specific embodiments, the mail backup module 11 may also include:
邮件数量判断单元,用于判断当前所述监控账号中的邮件数量是否超过预设邮件数量;The number of mails judging unit is used to judge whether the number of mails in the current monitoring account exceeds the preset number of mails;
第一删除单元,用于若是,则基于预设删除规则删除全部已读邮件;The first deletion unit is used to delete all the read mails based on the preset deletion rules if yes;
第二删除单元,用于若否,则基于预设删除时间删除所述预设删除时间之前的全部已读邮件。The second deleting unit is configured to, if not, delete all the read emails before the preset deletion time based on the preset deletion time.
在一些具体的实施例中,所述数据分析模块13,具体可以包括:In some specific embodiments, the data analysis module 13 may specifically include:
数据分析单元,用于基于电子邮件传输协议读取所述拉取后邮件中的各邮件头的键值,并抽取所述键值中的预设关键信息并对所述拉取后邮件的邮件附件以及邮件正文进行分析,以得到所述若干邮件数据;所述若干邮件数据包括发件人、收件人、实际发件人、发件IP、附件名称、附件哈希值、附件中的统一资源定位符、正文中的统一资源定位符、QQ号码、手机号以及敏感词中的任意一种或几种的组合。The data analysis unit is used to read the key value of each mail header in the pulled mail based on the email transmission protocol, and extract the preset key information in the key value and analyze the mail of the pulled mail Attachments and email texts are analyzed to obtain the email data; the email data includes the sender, recipient, actual sender, sending IP, attachment name, attachment hash value, and unified Any one or a combination of resource locators, uniform resource locators in the text, QQ numbers, mobile phone numbers, and sensitive words.
在一些具体的实施例中,所述数据分析模块13,具体可以包括:In some specific embodiments, the data analysis module 13 may specifically include:
数据匹配单元,用于将各所述邮件数据与预设情报库进行匹配;A data matching unit, configured to match each of the mail data with a preset intelligence database;
第一告警生成单元,用于若匹配成功,则生成相应的告警信息;The first alarm generating unit is configured to generate corresponding alarm information if the matching is successful;
第二告警生成单元,用于若匹配失败,则基于预设钓鱼行为检测算法确定各所述邮件数据中是否存在目标行为,若存在所述目标行为,则生成相应的告警信息;所述目标行为包括仿冒域名、仿冒用户名以及仿冒用户业务任意一种或几种的组合;The second alarm generation unit is used to determine whether there is a target behavior in each of the email data based on a preset phishing behavior detection algorithm based on a preset phishing behavior detection algorithm, and if the target behavior exists, generate corresponding alarm information; the target behavior Including any one or a combination of counterfeit domain names, counterfeit user names and counterfeit user services;
第三告警生成单元,用于基于预设账号伪造识别算法确定各所述邮件数据中的用户名,确定所述用户名中的异常用户名,以基于所述异常用户名以及预设域名查询工具确定各所述邮件数据中是否存在伪造账号,若是,则生成相应的告警信息;The third alarm generation unit is used to determine the user name in each of the email data based on the preset account forgery recognition algorithm, determine the abnormal user name in the user name, and use the abnormal user name and the preset domain name query tool Determine whether there is a forged account in each of the mail data, if so, generate corresponding alarm information;
第四告警生成单元,用于基于预设异常链接提取算法将各所述邮件数据与所述预设情报库进行匹配,基于匹配结果确定各所述邮件数据中是否存在异常链接,若存在,则生成相应的告警信息;The fourth alarm generating unit is configured to match each of the email data with the preset intelligence database based on a preset abnormal link extraction algorithm, determine whether there is an abnormal link in each of the email data based on the matching result, and if so, then Generate corresponding alarm information;
第五告警生成单元,用于基于预设行为基线匹配算法对当前各所述邮件数据中还未经过检测的数据进行离线分析,以确定所述待监控账号的收发信行为基线是否偏离预设基准,若是,则判定所述待监控账号异常,并生成相应的告警信息。The fifth alarm generation unit is configured to perform offline analysis on the undetected data in the current mail data based on the preset behavior baseline matching algorithm, so as to determine whether the sending and receiving behavior baseline of the account to be monitored deviates from the preset benchmark , if yes, it is determined that the account to be monitored is abnormal, and corresponding alarm information is generated.
在一些具体的实施例中,所述数据分析模块13,还可以包括:In some specific embodiments, the data analysis module 13 may also include:
行为基线学习单元,用于基于预设周期对所述监控账号的账号行为基线进行学习以确定所述监控账号的行为基线,得到所述预设基准。The behavior baseline learning unit is configured to learn the account behavior baseline of the monitored account based on a preset period to determine the behavior baseline of the monitored account and obtain the preset baseline.
在一些具体的实施例中,所述装置,还可以包括:In some specific embodiments, the device may also include:
目标字段信息提取模块,用于从基于所述预设钓鱼行为检测算法、所述预设账号伪造识别算法、所述预设异常链接提取算法以及所述预设行为基线匹配算法对各所述邮件数据进行分析后生成的告警信息中提取目标字段信息;The target field information extraction module is used to analyze each of the emails based on the preset phishing behavior detection algorithm, the preset account forgery identification algorithm, the preset abnormal link extraction algorithm and the preset behavior baseline matching algorithm. Extract the target field information from the alarm information generated after data analysis;
更新模块,用于基于所述目标字段信息对所述预设情报库进行更新。An update module, configured to update the preset intelligence library based on the target field information.
在一些具体的实施例中,所述置信度标记模块14,具体可以包括:In some specific embodiments, the confidence marking module 14 may specifically include:
置信度标记单元,用于将在所述邮件数据与所述预设情报库匹配成功后生成的告警信息的置信度标记为可信;a confidence marking unit, configured to mark the confidence of the alarm information generated after the mail data is successfully matched with the preset intelligence database as credible;
相应的,所述告警信息处理模块15,具体可以包括:Correspondingly, the alarm information processing module 15 may specifically include:
告警信息处理单元,用于对置信度标记为可信的所述告警信息进行自动推送操作,并对其他的所述告警信息进行人工分析操作,以对所述告警信息进行相应的人工标记。The alarm information processing unit is configured to automatically push the alarm information whose confidence level is marked as credible, and manually analyze the other alarm information, so as to manually mark the alarm information accordingly.
进一步的,本申请实施例还公开了一种电子设备,图5是根据一示例性实施例示出的电子设备20结构图,图中的内容不能认为是对本申请的使用范围的任何限制。Further, the embodiment of this application also discloses an electronic device. FIG. 5 is a structural diagram of an electronic device 20 according to an exemplary embodiment. The content in the figure should not be regarded as any limitation on the application scope of this application.
图5为本申请实施例提供的一种电子设备20的结构示意图。该电子设备20,具体可以包括:至少一个处理器21、至少一个存储器22、电源23、通信接口24、输入输出接口25和通信总线26。其中,所述存储器22用于存储计算机程序,所述计算机程序由所述处理器21加载并执行,以实现前述任一实施例公开的云邮箱安全监测方法中的相关步骤。另外,本实施例中的电子设备20具体可以为电子计算机。FIG. 5 is a schematic structural diagram of an electronic device 20 provided in an embodiment of the present application. The electronic device 20 may specifically include: at least one processor 21 , at least one memory 22 , a power supply 23 , a communication interface 24 , an input/output interface 25 and a communication bus 26 . Wherein, the memory 22 is used to store a computer program, and the computer program is loaded and executed by the processor 21 to implement relevant steps in the cloud mailbox security monitoring method disclosed in any of the foregoing embodiments. In addition, the electronic device 20 in this embodiment may specifically be an electronic computer.
本实施例中,电源23用于为电子设备20上的各硬件设备提供工作电压;通信接口24能够为电子设备20创建与外界设备之间的数据传输通道,其所遵循的通信协议是能够适用于本申请技术方案的任意通信协议,在此不对其进行具体限定;输入输出接口25,用于获取外界输入数据或向外界输出数据,其具体的接口类型可以根据具体应用需要进行选取,在此不进行具体限定。In this embodiment, the power supply 23 is used to provide working voltage for each hardware device on the electronic device 20; the communication interface 24 can create a data transmission channel between the electronic device 20 and external devices, and the communication protocol it follows is applicable Any communication protocol in the technical solution of the present application is not specifically limited here; the input and output interface 25 is used to obtain external input data or output data to the external, and its specific interface type can be selected according to specific application needs, here Not specifically limited.
另外,存储器22作为资源存储的载体,可以是只读存储器、随机存储器、磁盘或者光盘等,其上所存储的资源可以包括操作系统221、计算机程序222等,存储方式可以是短暂存储或者永久存储。In addition, the memory 22, as a resource storage carrier, can be a read-only memory, random access memory, magnetic disk or optical disk, etc., and the resources stored thereon can include operating system 221, computer program 222, etc., and the storage method can be temporary storage or permanent storage. .
其中,操作系统221用于管理与控制电子设备20上的各硬件设备以及计算机程序222,其可以是Windows Server、Netware、Unix、Linux等。计算机程序222除了包括能够用于完成前述任一实施例公开的由电子设备20执行的云邮箱安全监测方法的计算机程序之外,还可以进一步包括能够用于完成其他特定工作的计算机程序。Wherein, the operating system 221 is used to manage and control various hardware devices and computer programs 222 on the electronic device 20 , which may be Windows Server, Netware, Unix, Linux, etc. In addition to the computer program 222 that can be used to complete the cloud mailbox security monitoring method performed by the electronic device 20 disclosed in any of the foregoing embodiments, the computer program 222 can further include a computer program that can be used to complete other specific tasks.
进一步的,本申请还公开了一种计算机可读存储介质,用于存储计算机程序;其中,所述计算机程序被处理器执行时实现前述公开的云邮箱安全监测方法。关于该方法的具体步骤可以参考前述实施例中公开的相应内容,在此不再进行赘述。Further, the present application also discloses a computer-readable storage medium for storing a computer program; wherein, when the computer program is executed by a processor, the aforementioned disclosed cloud mailbox security monitoring method is realized. Regarding the specific steps of the method, reference may be made to the corresponding content disclosed in the foregoing embodiments, and details are not repeated here.
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同或相似部分互相参见即可。对于实施例公开的装置而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。Each embodiment in this specification is described in a progressive manner, each embodiment focuses on the difference from other embodiments, and the same or similar parts of each embodiment can be referred to each other. As for the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and for relevant details, please refer to the description of the method part.
专业人员还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Professionals can further realize that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, computer software or a combination of the two. In order to clearly illustrate the possible For interchangeability, in the above description, the composition and steps of each example have been generally described according to their functions. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
结合本文中所公开的实施例描述的方法或算法的步骤可以直接用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。The steps of the methods or algorithms described in connection with the embodiments disclosed herein may be directly implemented by hardware, software modules executed by a processor, or a combination of both. Software modules can be placed in random access memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or any other Any other known storage medium.
最后,还需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。Finally, it should also be noted that in this text, relational terms such as first and second etc. are only used to distinguish one entity or operation from another, and do not necessarily require or imply that these entities or operations, any such actual relationship or order exists. Furthermore, the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes elements not expressly listed. other elements of or also include elements inherent in such a process, method, article, or device. Without further limitations, an element defined by the phrase "comprising a ..." does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising said element.
以上对本申请所提供的技术方案进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。The technical solution provided by this application has been introduced in detail above, and specific examples have been used in this paper to illustrate the principle and implementation of this application. The description of the above embodiments is only used to help understand the method and core idea of this application; At the same time, for those skilled in the art, based on the idea of this application, there will be changes in the specific implementation and application scope. In summary, the content of this specification should not be construed as limiting the application.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310932568.6A CN116708019A (en) | 2023-07-26 | 2023-07-26 | A cloud mailbox security monitoring method, device, equipment and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310932568.6A CN116708019A (en) | 2023-07-26 | 2023-07-26 | A cloud mailbox security monitoring method, device, equipment and storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN116708019A true CN116708019A (en) | 2023-09-05 |
Family
ID=87845430
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202310932568.6A Pending CN116708019A (en) | 2023-07-26 | 2023-07-26 | A cloud mailbox security monitoring method, device, equipment and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN116708019A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN120748105A (en) * | 2025-08-15 | 2025-10-03 | 深圳市安室智能有限公司 | Mailbox alarm method and system based on infrared detection |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106572164A (en) * | 2016-11-02 | 2017-04-19 | 广东欧珀移动通信有限公司 | Mail backup method and terminal |
| CN108200105A (en) * | 2018-03-30 | 2018-06-22 | 杭州迪普科技股份有限公司 | A kind of method and device for detecting fishing mail |
| CN111404939A (en) * | 2020-03-16 | 2020-07-10 | 深信服科技股份有限公司 | Mail threat detection method, device, equipment and storage medium |
| CN115174270A (en) * | 2022-09-05 | 2022-10-11 | 杭州安恒信息技术股份有限公司 | Behavior abnormity detection method, device, equipment and medium |
-
2023
- 2023-07-26 CN CN202310932568.6A patent/CN116708019A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106572164A (en) * | 2016-11-02 | 2017-04-19 | 广东欧珀移动通信有限公司 | Mail backup method and terminal |
| CN108200105A (en) * | 2018-03-30 | 2018-06-22 | 杭州迪普科技股份有限公司 | A kind of method and device for detecting fishing mail |
| CN111404939A (en) * | 2020-03-16 | 2020-07-10 | 深信服科技股份有限公司 | Mail threat detection method, device, equipment and storage medium |
| CN115174270A (en) * | 2022-09-05 | 2022-10-11 | 杭州安恒信息技术股份有限公司 | Behavior abnormity detection method, device, equipment and medium |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN120748105A (en) * | 2025-08-15 | 2025-10-03 | 深圳市安室智能有限公司 | Mailbox alarm method and system based on infrared detection |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11516248B2 (en) | Security system for detection and mitigation of malicious communications | |
| US11595353B2 (en) | Identity-based messaging security | |
| US11997115B1 (en) | Message platform for automated threat simulation, reporting, detection, and remediation | |
| US12081522B2 (en) | Discovering email account compromise through assessments of digital activities | |
| US11146575B2 (en) | Suspicious message report processing and threat response | |
| US10181957B2 (en) | Systems and methods for detecting and/or handling targeted attacks in the email channel | |
| US9906554B2 (en) | Suspicious message processing and incident response | |
| US8131742B2 (en) | Method and system for processing fraud notifications | |
| US8578480B2 (en) | Systems and methods for identifying potentially malicious messages | |
| US20050015626A1 (en) | System and method for identifying and filtering junk e-mail messages or spam based on URL content | |
| WO2013009713A2 (en) | Syntactical fingerprinting | |
| WO2016164844A1 (en) | Message report processing and threat prioritization | |
| JP2005520230A (en) | System and method for enhancing electronic security | |
| WO2011090466A1 (en) | Method and system for using spam e-mail honeypots to identify potential malware containing e-mails | |
| JP2012511842A (en) | Electronic messaging integration engine | |
| US20250077661A1 (en) | Email Security Detection Apparatus, Method and Device, and Storage Medium | |
| EP3281144A1 (en) | Message report processing and threat prioritization | |
| US20060259551A1 (en) | Detection of unsolicited electronic messages | |
| US7257773B1 (en) | Method and system for identifying unsolicited mail utilizing checksums | |
| CN116708019A (en) | A cloud mailbox security monitoring method, device, equipment and storage medium | |
| Khan et al. | Introduction to email, web, and message forensics | |
| CA2804851A1 (en) | Monitoring communications | |
| CN113938311A (en) | Mail attack tracing method and system | |
| Morovati et al. | Detection of Phishing Emails with Email Forensic Analysis and Machine Learning Techniques. | |
| Karunamoorthy | Network Forensics |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |