Reputation-based threat protection

作者: Boris Yanovsky , Scott Eikenberry

DOI:

关键词: Telecommunications networkComputer securityInternet privacyPolitical scienceReputation

摘要: Information concerning a plurality of identified threats provided by preselected sources is stored in memory. An e-mail message may be received over communication network. The separated into components. information searched to identify reputation score associated with each the It then determined whether threat based on determination sent designated recipient.

参考文章(43)
Mark Resat Pariente, Ersin Uzun, Ali Aydin Selçuk, A Reputation-based trust management system for P2P networks International Journal of Network Security. ,vol. 6, pp. 227- 237 ,(2008)
Geoff Hulten, Ryan Colvin, Harry Katz, Joshua Korb, Xin Huang, Eriola Kruja, Chad Mills, Robert McCann, Determining email filtering type based on sender classification ,(2008)
Ryan Colvin, Kevin Chan, Chad Mills, Aleksander Kolcz, Robert McCann, Detecting spam from metafeatures of an email message ,(2008)