| CPC H04L 63/1425 (2013.01) | 17 Claims |

|
1. A system for identification and analysis of suspicious data in an electronic network environment, the system comprising:
at least one processing device; and
at least one non-transitory storage device with computer-readable program code stored thereon and accessible by the at least one processing device, wherein the computer-readable code when executed is configured to cause the at least one processing device to:
receive a transmission of an electronic communication through a communication gateway;
determine the electronic communication contains one or more extraneous characteristics;
in response to determining that the electronic communication contains one or more extraneous characteristics, initiate at least one of a behavioral analysis, a static analysis, or a metadata analysis;
initiate the metadata analysis of the electronic communication;
cause the results of the metadata analysis to be stored in the analytics log;
cause at least one or more of the extraneous characteristics of the electronic communication to be placed in an isolated environment;
initiate an execution of the one or more extraneous characteristics in the electronic communication within the isolated environment;
cause the behavioral analysis of the electronic communication;
in response to initiating at least one of the behavioral analysis, the static analysis, or the metadata analysis, create an analytics log associated with the electronic communication
cause the behavioral analysis to be stored in the analytics log;
in response to the behavioral analysis being stored in the analytics log, cause the isolated environment to be dismantled;
receive a transmission of an outgoing electronic communication, wherein the outgoing electronic communication contains one or more extraneous characteristics;
in response to the outgoing electronic communication containing extraneous characteristics, determine whether the extraneous characteristics contain one or more pieces of hidden data;
in response to the extraneous characteristics containing one or more pieces of hidden data, determine whether the hidden data is in a class of confidential data; and
in response to the hidden data being within the class of confidential data, block the transmission of the outgoing electronic communication.
|