METHOD AND SYSTEM FOR DETECTING A CYBERSECURITY BREACH
Methods, systems, and techniques for detecting a cybersecurity breach. The cybersecurity breach may be a synthetic account or an account having been subjected to an account takeover. Electronic account data representative of accounts is obtained in which a first group of the accounts includes accoun...
Saved in:
Main Authors | , , , , , |
---|---|
Format | Patent |
Language | English |
Published |
08.06.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Methods, systems, and techniques for detecting a cybersecurity breach. The cybersecurity breach may be a synthetic account or an account having been subjected to an account takeover. Electronic account data representative of accounts is obtained in which a first group of the accounts includes accounts flagged as being associated with the breach, and a second group of the accounts includes a remainder of the accounts. The computer system generates from the account data nodes representing the accounts and edges based on account metadata that connect the nodes. The computer system determines, such as by applying a link analysis method to the nodes and edges, a ranking of the accounts of at least part of the second group indicative of a likelihood that those accounts are also associated with the cybersecurity breach. That ranking may be used to identify which of those accounts is also identified with the cybersecurity breach. |
---|---|
Bibliography: | Application Number: US202117543444 |