REDUCES THE RISK OF CYBERATTACK BY RECOGNIZING & BLOCKING MALICIOUS EMAIL PHISHING LINKS and attachments
1.Interrogates user email for all URLs
2.Packages them up in a small JSON call to CliqSafe Cloud through port 80 (or other port). May or may not require firewall rule changes on client-side.
3.STAGE 1: Package is pre-parsed in CliqSafe Cloud against Client-generated whitelists, SEVERAL SIMPLE LOGICAL RULES, & Google Safe Browsing List(in order to reduce latency, parsing is done using node.js AWS λ (Lambda) API’s.
5.If STAGE 1 tests can make a decision w/ > 90% certainty, then when STAGE 1 returns result to CliqSafe & results are returned to client through port 80 (or other) as an HTML overlay.
6.If results are not positive, then suspicious URLs move to STAGE 2
1.Stage 2: The AI
2.Using vagrant, ~103 minimal Debian VM’s to be spun up at all times
3.If URL == suspicious && ! in GSBL; then request URL is routed to wget batch script on a single VM
4.wget batch script requests actual suspicious URL.
5.When request is received, rules are applied to returned results of HTTP GET request.