METHOD AND SYSTEM FOR DETECTING A CYBERSECURITY BREACH

Methods, systems, and techniques for detecting a cybersecurity breach. The cybersecurity breach may be a synthetic account or an account having been subjected to an account takeover. Electronic account data representative of accounts is obtained in which a first group of the accounts includes accoun...

Full description

Saved in:
Bibliographic Details
Main Authors Rahmani, Sahar, Smyth, Cathal, Yadav, Vikash, Golkar, Mahsa, Ross, James, Afsariardchi, Niloufar
Format Patent
LanguageEnglish
Published 08.06.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Methods, systems, and techniques for detecting a cybersecurity breach. The cybersecurity breach may be a synthetic account or an account having been subjected to an account takeover. Electronic account data representative of accounts is obtained in which a first group of the accounts includes accounts flagged as being associated with the breach, and a second group of the accounts includes a remainder of the accounts. The computer system generates from the account data nodes representing the accounts and edges based on account metadata that connect the nodes. The computer system determines, such as by applying a link analysis method to the nodes and edges, a ranking of the accounts of at least part of the second group indicative of a likelihood that those accounts are also associated with the cybersecurity breach. That ranking may be used to identify which of those accounts is also identified with the cybersecurity breach.
Bibliography:Application Number: US202117543444