×

Method and system for identifying security risks using graph analysis

  • US 10,320,802 B1
  • Filed: 12/07/2017
  • Issued: 06/11/2019
  • Est. Priority Date: 12/10/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for identifying users of an information security system for determining risk of unauthorized access to secure data assets, the method executed by one or more processors programmed to perform the method, the method comprising:

  • identifying, by one or more processors, a plurality of users, wherein each user has a job function related to a role of the user within an organization and is associated with an organizational network which contains a plurality of secure data assets and a plurality of security groups, each security group having permission to access at least one secure data asset;

    for each of the plurality of users;

    causing, by the one or more processors, a node of a graph data structure representing the user to be displayed on a user interface of a computing device,identifying, by the one or more processors, a connection between the node of the user and a node of another user of the plurality of users when the user and the other user both correspond to a same security group of the plurality of security groups; and

    causing, by the one or more processors, the connection between the corresponding node for the user and the other user to be displayed as an edge of the graph data structure on the user interface; and

    determining, by the one or more processors, a shortest path between each pair of nodes of the plurality of nodes based upon the connections between the nodes, wherein the shortest path between a pair of nodes is a least number of interconnected nodes in which a first node must pass through to reach a second node;

    ranking, by the one or more processors, each of the plurality of users based upon a number of shortest paths which include the corresponding node for the respective user;

    providing, by the one or more processors, the ranking of the plurality of users to the computing device; and

    determining, by the one or more processors, that at least one of the plurality of users ranked above a threshold ranking belongs to at least two different security groups to determine users having a potential security risk.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×