GR1010623B - User's internet protection method via detection of data leaks - Google Patents
User's internet protection method via detection of data leaks Download PDFInfo
- Publication number
- GR1010623B GR1010623B GR20230100117A GR20230100117A GR1010623B GR 1010623 B GR1010623 B GR 1010623B GR 20230100117 A GR20230100117 A GR 20230100117A GR 20230100117 A GR20230100117 A GR 20230100117A GR 1010623 B GR1010623 B GR 1010623B
- Authority
- GR
- Greece
- Prior art keywords
- leaks
- internet
- data
- user
- protection method
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 6
- 238000001514 detection method Methods 0.000 title 1
- 238000013473 artificial intelligence Methods 0.000 abstract 1
- 238000010924 continuous production Methods 0.000 abstract 1
- 238000009472 formulation Methods 0.000 abstract 1
- 238000011835 investigation Methods 0.000 abstract 1
- 238000010801 machine learning Methods 0.000 abstract 1
- 239000000203 mixture Substances 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- Artificial Intelligence (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The system described herein is a method of protecting Internet users from cyber-attacks that may result from the leakage of their data on the Internet. The above method accepts as input the internet user data (email addresses, phone numbers) and investigates on a continuous basis potential relevant leaks thereof. This method is liable to find new findings, understand which leaks are relevant to the entities under investigation and categorize data leaks by criticality, using machine learning and artificial intelligence algorithms. The formulation and development of this method is a continuous process and, therefore, a team of expert analysts have authorized access to control and evaluate its operation in order to formulate and optimize said method and its components in real time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GR20230100117A GR1010623B (en) | 2023-02-15 | 2023-02-15 | User's internet protection method via detection of data leaks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GR20230100117A GR1010623B (en) | 2023-02-15 | 2023-02-15 | User's internet protection method via detection of data leaks |
Publications (1)
Publication Number | Publication Date |
---|---|
GR1010623B true GR1010623B (en) | 2024-01-30 |
Family
ID=89983969
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GR20230100117A GR1010623B (en) | 2023-02-15 | 2023-02-15 | User's internet protection method via detection of data leaks |
Country Status (1)
Country | Link |
---|---|
GR (1) | GR1010623B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017115272A1 (en) * | 2015-12-28 | 2017-07-06 | Sixgill Ltd. | Dark web monitoring, analysis and alert system and method |
US20190266355A1 (en) * | 2015-12-04 | 2019-08-29 | Early Warning Services, Llc | Systems and methods of determining compromised identity information |
US20190340390A1 (en) * | 2018-05-04 | 2019-11-07 | Rubicon Global Holdings, Llc. | Systems and methods for detecting and remedying theft of data |
WO2019222224A1 (en) * | 2018-05-14 | 2019-11-21 | Guardinex LLC | Dynamic risk detection and mitigation of compromised customer log-in credentials |
US20200137109A1 (en) * | 2018-10-31 | 2020-04-30 | SpyCloud, Inc. | Detecting Use of Compromised Security Credentials in Private Enterprise Networks |
US20220004630A1 (en) * | 2020-07-01 | 2022-01-06 | Cyber Reconaissance, Inc. | Systems and methods for a multi-model approach to predicting the development of cyber threats to technology products |
-
2023
- 2023-02-15 GR GR20230100117A patent/GR1010623B/en active IP Right Grant
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190266355A1 (en) * | 2015-12-04 | 2019-08-29 | Early Warning Services, Llc | Systems and methods of determining compromised identity information |
WO2017115272A1 (en) * | 2015-12-28 | 2017-07-06 | Sixgill Ltd. | Dark web monitoring, analysis and alert system and method |
US20190340390A1 (en) * | 2018-05-04 | 2019-11-07 | Rubicon Global Holdings, Llc. | Systems and methods for detecting and remedying theft of data |
WO2019222224A1 (en) * | 2018-05-14 | 2019-11-21 | Guardinex LLC | Dynamic risk detection and mitigation of compromised customer log-in credentials |
US20200137109A1 (en) * | 2018-10-31 | 2020-04-30 | SpyCloud, Inc. | Detecting Use of Compromised Security Credentials in Private Enterprise Networks |
US20220004630A1 (en) * | 2020-07-01 | 2022-01-06 | Cyber Reconaissance, Inc. | Systems and methods for a multi-model approach to predicting the development of cyber threats to technology products |
Non-Patent Citations (1)
Title |
---|
XP033005748 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Rethinking machine unlearning for large language models | |
Carpenter et al. | Refining technology threat avoidance theory | |
Taneja et al. | Testing software in age of data privacy: A balancing act | |
Chalhoub et al. | Factoring user experience into the security and privacy design of smart home devices: A case study | |
Yan et al. | On protecting the data privacy of large language models (llms): A survey | |
Tan et al. | Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security | |
Ivić et al. | The Challenges and Opportunities in Adopting AI, IoT and Blockchain Technology in E-Government: A Systematic Literature Review | |
Mireshghallah et al. | A principled approach to learning stochastic representations for privacy in deep neural inference | |
Jimenez et al. | Carets: A consistency and robustness evaluative test suite for vqa | |
Addington | ChatGPT: cyber security threats and countermeasures | |
Li et al. | Unit selection with nonbinary treatment and effect | |
GR1010623B (en) | User's internet protection method via detection of data leaks | |
Hu et al. | Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning | |
Xiong et al. | Generating realistic fake equations in order to reduce intellectual property theft | |
Vaczi et al. | Fuzzy-based cybersecurity risk analysis of the human factor from the perspective of classified information leakage | |
De Cristofaro | Synthetic Data: Methods, Use Cases, and Risks | |
Seeman | Framing Effects in the Operationalization of Differential Privacy Systems as Code-Driven Law | |
Gao et al. | Ethos: Rectifying language models in orthogonal parameter space | |
Huang | Defense against membership inference attack applying domain adaptation with addictive noise | |
Rao et al. | Privacy inference attack and defense in centralized and federated learning: A comprehensive survey | |
Derbyshire | Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment | |
Herurkar et al. | Cross-Domain Transformation for Outlier Detection on Tabular Datasets | |
CN112861179A (en) | Method for desensitizing personal digital spatial data based on text-generated countermeasure network | |
Fazelnia et al. | Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework | |
Jiang et al. | Differential Privacy on Edge Computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PG | Patent granted |
Effective date: 20240209 |