×

Systems and methods for detecting information leakage by an organizational insider

  • US 9,652,597 B2
  • Filed: 04/25/2014
  • Issued: 05/16/2017
  • Est. Priority Date: 03/12/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for detecting information leakage by an organizational insider, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying a set of organizational insiders of an organization;

    identifying a set of public forums used by at least one organizational insider in the set of organizational insiders;

    identifying a set of messages that contain sensitive information capable of being leveraged in a targeted attack on the organization and are posted by at least one organizational insider of the organization to at least one public forum in the set of public forums;

    creating a message record corresponding to each message in the set of messages, the message record comprising;

    a message summary; and

    a set of message metadata fields that includes a message metadata field indicating a risk score that quantifies a sensitivity level of contents of the message;

    generating a plurality of message summary records that each comprise a consolidated set of message records that have been grouped based on the sets of message metadata fields within the message records;

    for each message summary record in the plurality of message summary records, determining a likelihood that the message summary record represents leaked sensitive information based on the risk score of the message record within the message summary record;

    identifying an information leakage threat by identifying at least one message metadata field within the plurality of message summary records that indicates an information leak using a machine learning classifier built based on training data comprising metadata fields within message summary records that describe previously-detected information leaks, wherein the machine learning classifier identifies the message metadata field that indicates the information leak by comparing based on the likelihood that each message summary record in the plurality of message summary records represents leaked sensitive information, metadata fields within the plurality of message summary records with the metadata fields within the training data; and

    initiating, based on the information leakage threat, a security action on at least one computing system to prevent a targeted attack that is based on the leaked information.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×