- TrustedSource
Infobox Software
name = SecureComputing's TrustedSource
developer =Secure Computing
website = [http://www.trustedsource.org http://www.trustedsource.org]TrustedSource is an Internet
reputation system originally developed byCipherTrust and now owned bySecure Computing . It provides reputation scores for Internet identities, such as IP addresses, URLs, domains, and email/web content.Reputation data and content categories, as well as global email and web traffic patterns observed by TrustedSource ecosystem, for any IP address, domain, or URL can be checked from the TrustedSource.org portal site [ [http://www.trustedsource.org/ TrustedSource community portal] ]
TrustedSource works by analyzing in real-time traffic patterns from email, web and network data flows from Secure Computing's global set of security appliances and hosted services, as well as those of partners like
F5 Networks . Working off that data stream, it applies data mining and analysis techniques, such asSupport Vector Machine ,Random Forest , and Term-Frequency Inverse-Document Frequency (TFIDF ) classifiers [ [http://www.trustedsource.org/en/resources/publications Academic and industry papers published by Secure Computing Research on the algorithms behind TrustedSource] ] to determine the degree of maliciousness and security risk associated with each Internet identity, as well as perform content categorization.The numeric scores that result from that analysis are then combined with local filtering policies of devices and services that utilize TrustedSource to make an accept/deny/traffic shape types of decisions on the network connections associated with those Internet identities.
Internet reputation systems like TrustedSource are useful to effectively block network-based attacks sent over email, web and other protocols. They benefit from the global sensor network reporting attack patterns in real-time and the intensive behavioral analysis is distributed across a world-wide network of systems instead of unnecessarily utilizing processing power of local security devices. Those systems have also been effective at tracking and monitoring botnets, such as the infamous
Storm worm . [ [http://www.trustedsource.org/en/threats/storm_tracker TrustedSource Storm Worm Tracker] ]External links
Wikimedia Foundation. 2010.