SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT
An algorithm is trained on a known dataset to facilitate dynamic data exfiltration protection in a zero-trust environment. The classifications generated by the trained algorithm on a very large set of inputs may then be used to train an inversion threat model by a bad actor attempting to exfiltrate...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Czeszynski, Alan Donald Chalk, Mary Elizabeth Rogers, Robert Derward |
description | An algorithm is trained on a known dataset to facilitate dynamic data exfiltration protection in a zero-trust environment. The classifications generated by the trained algorithm on a very large set of inputs may then be used to train an inversion threat model by a bad actor attempting to exfiltrate data from the data steward. Since our system is taking place within the enclave/secure computing node, the system is able to very accurately build an inversion threat model since the original training dataset is known (a 'gold standard' inversion model). This inversion model can be characterized to determine its performance/accuracy of properly identifying a given input as being within the original training dataset or not (a data exfiltration event). This very accurate inversion model will be superior at data exfiltration as compared to any inversion attack model generated by a bad actor using only the algorithm classification outputs. As such, the results of this inversion model provide a ceiling on the likelihood of data exfiltration. Very accurate inversion models indicate that data exfiltration is easier/more likely. A poor performing inversion model indicates that the training data is more secure and less able to be exfiltrated. Differential privacy may be fluctuated to manage the risk of data exfiltration. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2024273232A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2024273232A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2024273232A13</originalsourceid><addsrcrecordid>eNqNjEFqAkEQRWfjImjuUJC1oD2BrMvpai2Yrpbq6sHJRkQ6q6CCHsJja0IOkNV_i_f-S3PPYzaKGVA8RLJN8hlC0idjLsqyBo-GQLvAvSkaJ4Gh9EKKK-7Zxt_Sj4KRO_AcAimJMfawVR6wG4EFED5J09y0ZIMuxW2xn2uSgTVJfAazZvJ1-L7W17-dNm-BrNvM6-W8r9fL4VhP9bYv2S3cu_toXetw2f7PegC20D_8</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT</title><source>esp@cenet</source><creator>Czeszynski, Alan Donald ; Chalk, Mary Elizabeth ; Rogers, Robert Derward</creator><creatorcontrib>Czeszynski, Alan Donald ; Chalk, Mary Elizabeth ; Rogers, Robert Derward</creatorcontrib><description>An algorithm is trained on a known dataset to facilitate dynamic data exfiltration protection in a zero-trust environment. The classifications generated by the trained algorithm on a very large set of inputs may then be used to train an inversion threat model by a bad actor attempting to exfiltrate data from the data steward. Since our system is taking place within the enclave/secure computing node, the system is able to very accurately build an inversion threat model since the original training dataset is known (a 'gold standard' inversion model). This inversion model can be characterized to determine its performance/accuracy of properly identifying a given input as being within the original training dataset or not (a data exfiltration event). This very accurate inversion model will be superior at data exfiltration as compared to any inversion attack model generated by a bad actor using only the algorithm classification outputs. As such, the results of this inversion model provide a ceiling on the likelihood of data exfiltration. Very accurate inversion models indicate that data exfiltration is easier/more likely. A poor performing inversion model indicates that the training data is more secure and less able to be exfiltrated. Differential privacy may be fluctuated to manage the risk of data exfiltration.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240815&DB=EPODOC&CC=US&NR=2024273232A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240815&DB=EPODOC&CC=US&NR=2024273232A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Czeszynski, Alan Donald</creatorcontrib><creatorcontrib>Chalk, Mary Elizabeth</creatorcontrib><creatorcontrib>Rogers, Robert Derward</creatorcontrib><title>SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT</title><description>An algorithm is trained on a known dataset to facilitate dynamic data exfiltration protection in a zero-trust environment. The classifications generated by the trained algorithm on a very large set of inputs may then be used to train an inversion threat model by a bad actor attempting to exfiltrate data from the data steward. Since our system is taking place within the enclave/secure computing node, the system is able to very accurately build an inversion threat model since the original training dataset is known (a 'gold standard' inversion model). This inversion model can be characterized to determine its performance/accuracy of properly identifying a given input as being within the original training dataset or not (a data exfiltration event). This very accurate inversion model will be superior at data exfiltration as compared to any inversion attack model generated by a bad actor using only the algorithm classification outputs. As such, the results of this inversion model provide a ceiling on the likelihood of data exfiltration. Very accurate inversion models indicate that data exfiltration is easier/more likely. A poor performing inversion model indicates that the training data is more secure and less able to be exfiltrated. Differential privacy may be fluctuated to manage the risk of data exfiltration.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjEFqAkEQRWfjImjuUJC1oD2BrMvpai2Yrpbq6sHJRkQ6q6CCHsJja0IOkNV_i_f-S3PPYzaKGVA8RLJN8hlC0idjLsqyBo-GQLvAvSkaJ4Gh9EKKK-7Zxt_Sj4KRO_AcAimJMfawVR6wG4EFED5J09y0ZIMuxW2xn2uSgTVJfAazZvJ1-L7W17-dNm-BrNvM6-W8r9fL4VhP9bYv2S3cu_toXetw2f7PegC20D_8</recordid><startdate>20240815</startdate><enddate>20240815</enddate><creator>Czeszynski, Alan Donald</creator><creator>Chalk, Mary Elizabeth</creator><creator>Rogers, Robert Derward</creator><scope>EVB</scope></search><sort><creationdate>20240815</creationdate><title>SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT</title><author>Czeszynski, Alan Donald ; Chalk, Mary Elizabeth ; Rogers, Robert Derward</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2024273232A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Czeszynski, Alan Donald</creatorcontrib><creatorcontrib>Chalk, Mary Elizabeth</creatorcontrib><creatorcontrib>Rogers, Robert Derward</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Czeszynski, Alan Donald</au><au>Chalk, Mary Elizabeth</au><au>Rogers, Robert Derward</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT</title><date>2024-08-15</date><risdate>2024</risdate><abstract>An algorithm is trained on a known dataset to facilitate dynamic data exfiltration protection in a zero-trust environment. The classifications generated by the trained algorithm on a very large set of inputs may then be used to train an inversion threat model by a bad actor attempting to exfiltrate data from the data steward. Since our system is taking place within the enclave/secure computing node, the system is able to very accurately build an inversion threat model since the original training dataset is known (a 'gold standard' inversion model). This inversion model can be characterized to determine its performance/accuracy of properly identifying a given input as being within the original training dataset or not (a data exfiltration event). This very accurate inversion model will be superior at data exfiltration as compared to any inversion attack model generated by a bad actor using only the algorithm classification outputs. As such, the results of this inversion model provide a ceiling on the likelihood of data exfiltration. Very accurate inversion models indicate that data exfiltration is easier/more likely. A poor performing inversion model indicates that the training data is more secure and less able to be exfiltrated. Differential privacy may be fluctuated to manage the risk of data exfiltration.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2024273232A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T20%3A08%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Czeszynski,%20Alan%20Donald&rft.date=2024-08-15&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2024273232A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |