SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT

An algorithm is trained on a known dataset to facilitate dynamic data exfiltration protection in a zero-trust environment. The classifications generated by the trained algorithm on a very large set of inputs may then be used to train an inversion threat model by a bad actor attempting to exfiltrate...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Czeszynski, Alan Donald, Chalk, Mary Elizabeth, Rogers, Robert Derward
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Czeszynski, Alan Donald
Chalk, Mary Elizabeth
Rogers, Robert Derward
description An algorithm is trained on a known dataset to facilitate dynamic data exfiltration protection in a zero-trust environment. The classifications generated by the trained algorithm on a very large set of inputs may then be used to train an inversion threat model by a bad actor attempting to exfiltrate data from the data steward. Since our system is taking place within the enclave/secure computing node, the system is able to very accurately build an inversion threat model since the original training dataset is known (a 'gold standard' inversion model). This inversion model can be characterized to determine its performance/accuracy of properly identifying a given input as being within the original training dataset or not (a data exfiltration event). This very accurate inversion model will be superior at data exfiltration as compared to any inversion attack model generated by a bad actor using only the algorithm classification outputs. As such, the results of this inversion model provide a ceiling on the likelihood of data exfiltration. Very accurate inversion models indicate that data exfiltration is easier/more likely. A poor performing inversion model indicates that the training data is more secure and less able to be exfiltrated. Differential privacy may be fluctuated to manage the risk of data exfiltration.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2024273232A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2024273232A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2024273232A13</originalsourceid><addsrcrecordid>eNqNjEFqAkEQRWfjImjuUJC1oD2BrMvpai2Yrpbq6sHJRkQ6q6CCHsJja0IOkNV_i_f-S3PPYzaKGVA8RLJN8hlC0idjLsqyBo-GQLvAvSkaJ4Gh9EKKK-7Zxt_Sj4KRO_AcAimJMfawVR6wG4EFED5J09y0ZIMuxW2xn2uSgTVJfAazZvJ1-L7W17-dNm-BrNvM6-W8r9fL4VhP9bYv2S3cu_toXetw2f7PegC20D_8</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT</title><source>esp@cenet</source><creator>Czeszynski, Alan Donald ; Chalk, Mary Elizabeth ; Rogers, Robert Derward</creator><creatorcontrib>Czeszynski, Alan Donald ; Chalk, Mary Elizabeth ; Rogers, Robert Derward</creatorcontrib><description>An algorithm is trained on a known dataset to facilitate dynamic data exfiltration protection in a zero-trust environment. The classifications generated by the trained algorithm on a very large set of inputs may then be used to train an inversion threat model by a bad actor attempting to exfiltrate data from the data steward. Since our system is taking place within the enclave/secure computing node, the system is able to very accurately build an inversion threat model since the original training dataset is known (a 'gold standard' inversion model). This inversion model can be characterized to determine its performance/accuracy of properly identifying a given input as being within the original training dataset or not (a data exfiltration event). This very accurate inversion model will be superior at data exfiltration as compared to any inversion attack model generated by a bad actor using only the algorithm classification outputs. As such, the results of this inversion model provide a ceiling on the likelihood of data exfiltration. Very accurate inversion models indicate that data exfiltration is easier/more likely. A poor performing inversion model indicates that the training data is more secure and less able to be exfiltrated. Differential privacy may be fluctuated to manage the risk of data exfiltration.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240815&amp;DB=EPODOC&amp;CC=US&amp;NR=2024273232A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240815&amp;DB=EPODOC&amp;CC=US&amp;NR=2024273232A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Czeszynski, Alan Donald</creatorcontrib><creatorcontrib>Chalk, Mary Elizabeth</creatorcontrib><creatorcontrib>Rogers, Robert Derward</creatorcontrib><title>SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT</title><description>An algorithm is trained on a known dataset to facilitate dynamic data exfiltration protection in a zero-trust environment. The classifications generated by the trained algorithm on a very large set of inputs may then be used to train an inversion threat model by a bad actor attempting to exfiltrate data from the data steward. Since our system is taking place within the enclave/secure computing node, the system is able to very accurately build an inversion threat model since the original training dataset is known (a 'gold standard' inversion model). This inversion model can be characterized to determine its performance/accuracy of properly identifying a given input as being within the original training dataset or not (a data exfiltration event). This very accurate inversion model will be superior at data exfiltration as compared to any inversion attack model generated by a bad actor using only the algorithm classification outputs. As such, the results of this inversion model provide a ceiling on the likelihood of data exfiltration. Very accurate inversion models indicate that data exfiltration is easier/more likely. A poor performing inversion model indicates that the training data is more secure and less able to be exfiltrated. Differential privacy may be fluctuated to manage the risk of data exfiltration.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjEFqAkEQRWfjImjuUJC1oD2BrMvpai2Yrpbq6sHJRkQ6q6CCHsJja0IOkNV_i_f-S3PPYzaKGVA8RLJN8hlC0idjLsqyBo-GQLvAvSkaJ4Gh9EKKK-7Zxt_Sj4KRO_AcAimJMfawVR6wG4EFED5J09y0ZIMuxW2xn2uSgTVJfAazZvJ1-L7W17-dNm-BrNvM6-W8r9fL4VhP9bYv2S3cu_toXetw2f7PegC20D_8</recordid><startdate>20240815</startdate><enddate>20240815</enddate><creator>Czeszynski, Alan Donald</creator><creator>Chalk, Mary Elizabeth</creator><creator>Rogers, Robert Derward</creator><scope>EVB</scope></search><sort><creationdate>20240815</creationdate><title>SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT</title><author>Czeszynski, Alan Donald ; Chalk, Mary Elizabeth ; Rogers, Robert Derward</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2024273232A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Czeszynski, Alan Donald</creatorcontrib><creatorcontrib>Chalk, Mary Elizabeth</creatorcontrib><creatorcontrib>Rogers, Robert Derward</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Czeszynski, Alan Donald</au><au>Chalk, Mary Elizabeth</au><au>Rogers, Robert Derward</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT</title><date>2024-08-15</date><risdate>2024</risdate><abstract>An algorithm is trained on a known dataset to facilitate dynamic data exfiltration protection in a zero-trust environment. The classifications generated by the trained algorithm on a very large set of inputs may then be used to train an inversion threat model by a bad actor attempting to exfiltrate data from the data steward. Since our system is taking place within the enclave/secure computing node, the system is able to very accurately build an inversion threat model since the original training dataset is known (a 'gold standard' inversion model). This inversion model can be characterized to determine its performance/accuracy of properly identifying a given input as being within the original training dataset or not (a data exfiltration event). This very accurate inversion model will be superior at data exfiltration as compared to any inversion attack model generated by a bad actor using only the algorithm classification outputs. As such, the results of this inversion model provide a ceiling on the likelihood of data exfiltration. Very accurate inversion models indicate that data exfiltration is easier/more likely. A poor performing inversion model indicates that the training data is more secure and less able to be exfiltrated. Differential privacy may be fluctuated to manage the risk of data exfiltration.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2024273232A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T20%3A08%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Czeszynski,%20Alan%20Donald&rft.date=2024-08-15&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2024273232A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true