Patent Issued for Automatic Generation Of Data-Centric Attack Graphs (USPTO 10,503,911) - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
December 19, 2019 Newswires
Share
Share
Post
Email

Patent Issued for Automatic Generation Of Data-Centric Attack Graphs (USPTO 10,503,911)

Insurance Daily News

2019 DEC 19 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- International Business Machines Coproration (Armonk, New York, United States) has been issued patent number 10,503,911, according to news reporting originating out of Alexandria, Virginia, by NewsRx editors.

The patent’s inventors are Chari, Suresh N. (Tarrytown, NY); Kundu, Ashish (Elmsford, NY); Molloy, Ian M. (Chappaqua, NY); Pendarakis, Dimitrios (Westport, CT); Rao, Josyula R. (Briarcliff Manor, NY).

This patent was filed on July 20, 2018 and was published online on December 23, 2019.

From the background information supplied by the inventors, news correspondents obtained the following quote: “The disclosure relates generally to attack graphs and more specifically to calculating a risk to a set of sensitive data objects, which correspond to a regulated service provided by a set of components comprising the regulated service, based on automatically generating a data-centric attack graph of nodes representing the set of components and propagating risk scores to related components along edge paths in the attack graph connecting related components.

“Today, many software applications access and/or process sensitive data, such as, for example, personal medical information or personal financial information, corresponding to individuals. However, many federal, state, and local laws regulate the accessing and processing of certain types of sensitive data corresponding to individuals. For example, federal regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) and the Gram-Leach-Bliley Act, include specific mandates regarding the use of sensitive data. For example, HIPAA provides data privacy and security provisions for safeguarding sensitive personal medical information of individuals. The Gram-Leach-Bliley Act controls the way financial institutions may use sensitive personal financial information of individuals. As a result, any entity, such as institutions, enterprises, businesses, companies, or agencies, which provides one or more services that access and/or process these types of sensitive data must be able to determine whether the sensitive data is at risk of attack or compromise and take corrective action to eliminate, reduce, or mitigate the risk.”

Supplementing the background information on this patent, NewsRx reporters also obtained the inventors’ summary information for this patent: “According to one illustrative embodiment, a computer-implemented method for generating an attack graph to protect sensitive data objects located on a network from attack is provided. A computer generates the attack graph that includes nodes representing components in a set of components of a regulated service and edges between nodes representing relationships between related components in the set of components based on vulnerability and risk metrics corresponding to each component in the set of components. The computer calculates a risk score for each component represented by a node in the attack graph based on a sensitivity rank and a criticality rank corresponding to each respective component. The computer aggregates risk scores for each component along each edge path connecting a node of a particular component to a node of a related component to form an aggregated risk score for each component. In response to the computer determining that the aggregated risk score of a component is greater than or equal to a risk threshold, the computer performs an action to mitigate a risk to sensitive data corresponding to the component posed by an attack via the network. According to other illustrative embodiments, a computer system and computer program product for generating an attack graph to protect sensitive data objects located on a network from attack are provided.”

The claims supplied by the inventors are:

“What is claimed is:

“1. A computer-implemented method for generating an attack graph to protect sensitive data objects located on a network from attack, the computer-implemented method comprising: generating, by a computer, the attack graph that includes nodes representing components in a set of components of a regulated service and edges between nodes representing relationships between related components in the set of components based on vulnerability and risk metrics corresponding to each component in the set of components; calculating, by the computer, a risk score for each component represented by a node in the attack graph based on a sensitivity rank and a criticality rank corresponding to each respective component; aggregating, by the computer, risk scores for each component along each edge path connecting a node of a particular component to a node of a related component to form an aggregated risk score for each component; and responsive to the computer determining that the aggregated risk score of a component is greater than or equal to a risk threshold, performing, by the computer, an action to mitigate a risk to sensitive data corresponding to the component posed by an attack via the network.

“2. The computer-implemented method of claim 1 further comprising: calculating, by the computer, a level of compromisability of sensitive data for each component represented by a node in the attack graph based on the vulnerability and risk metrics corresponding to each respective component and edge paths between nodes of related components; calculating, by the computer, the sensitivity rank, an integrity rank, and the criticality rank for each component represented by a node in the attack graph using a topology graph of the regulated service; and calculating, by the computer, the risk score for each component represented by a node in the attack graph based on the level of compromisability, the sensitivity rank, the integrity rank, and the criticality rank corresponding to each respective component.

“3. The computer-implemented method of claim 2, wherein the computer calculates the level of compromisability of the sensitive data using a network flow algorithm, and wherein the network flow algorithm is a max-flow min-cut algorithm.

“4. The computer-implemented method of claim 2 further comprising: normalizing, by the computer, the aggregated risk score for each component in the set of components of the regulated service to form a normalized risk score for each component.

“5. The computer-implemented method of claim 4 further comprising: comparing, by the computer, the normalized risk score for each component with a risk threshold value; and responsive to the computer determining that the normalized risk score of a component is greater than or equal to the risk threshold value, performing, by the computer, the action based on the normalized risk score being greater than the risk threshold value.

“6. The computer-implemented method of claim 1 further comprising: identifying, by the computer, a set of sensitive data corresponding to the regulated service; scanning, by the computer, for the set of components corresponding to the regulated service that are authorized to perform activities associated with sensitive data; identifying, by the computer, the vulnerability and risk metrics corresponding to each component in the set of components of the regulated service; and generating, by the computer, a topology graph of the regulated service based on each identified component in the set of components and a configuration of each identified component.

“7. The computer-implemented method of claim 6 further comprising: identifying, by the computer, authorized activities associated with the set of sensitive data.

“8. The computer-implemented method of claim 1 further comprising: identifying, by the computer, two or more edges having a common destination node in the attack graph.

“9. The computer-implemented method of claim 8, wherein the attack graph is an AND/OR graph.

“10. The computer-implemented method of claim 9 further comprising: generating, by the computer, an AND edge for the two or more edges having the common destination node, if and only if, a sensitive data vulnerability of the common destination node can be exploited by an attacker and all of the two or more edges having the common destination node are exploited.

“11. The computer-implemented method of claim 9 further comprising: generating, by the computer, an OR edge for the two or more edges having the common destination node if only one or more of the two or more edges having the common destination node can be exploited.

“12. The computer-implemented method of claim 9 further comprising: generating, by the computer, multi-step attack paths by connecting one sensitive data vulnerability to another sensitive data vulnerability such that a path containing two or more edges representing an attack requires an attacker to exploit each vulnerability of the two or more edges in sequential order.

“13. The computer-implemented method of claim 1 further comprising: propagating, by the computer, a local sensitive data risk backward along an edge path from a sensitive data sink node to a source sensitive data attack node in the attack graph.

“14. The computer-implemented method of claim 13 further comprising: calculating, by the computer, a cumulative sensitive data risk for each node in the attack graph based on a propagated sensitive data risk along all incoming edge paths of a node and the local sensitive data risk corresponding to that particular node.

“15. The computer-implemented method of claim 14 further comprising: calculating, by the computer, a total sensitive data risk corresponding to the regulated service represented by the attack graph based on aggregating cumulative sensitive data risk of all sensitive data sink nodes.

“16. The computer-implemented method of claim 1, wherein the computer identifies the vulnerability and risk metrics of a component based on at least one of Common Vulnerabilities and Exposures identifiers, application scanning, penetration testing, and vulnerability scanning.

“17. A computer system for generating an attack graph to protect sensitive data objects located on a network from attack, the computer system comprising: a bus system; a storage device connected to the bus system, wherein the storage device stores program instructions; and a processor connected to the bus system, wherein the processor executes the program instructions to: generate the attack graph that includes nodes representing components in a set of components of a regulated service and edges between nodes representing relationships between related components in the set of components based on vulnerability and risk metrics corresponding to each component in the set of components; calculate a risk score for each component represented by a node in the attack graph based on a sensitivity rank and a criticality rank corresponding to each respective component; aggregate risk scores for each component along each edge path connecting a node of a particular component to a node of a related component to form an aggregated risk score for each component; and perform an action to mitigate a risk to sensitive data corresponding to a component posed by an attack via the network in response to determining that the aggregated risk score of the component is greater than or equal to a risk threshold.

“18. A computer program product for generating an attack graph to protect sensitive data objects located on a network from attack, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a computer to cause the computer to perform a method comprising: generating, by the computer, the attack graph that includes nodes representing components in a set of components of a regulated service and edges between nodes representing relationships between related components in the set of components based on vulnerability and risk metrics corresponding to each component in the set of components; calculating, by the computer, a risk score for each component represented by a node in the attack graph based on a sensitivity rank and a criticality rank corresponding to each respective component; aggregating, by the computer, risk scores for each component along each edge path connecting a node of a particular component to a node of a related component to form an aggregated risk score for each component; and responsive to the computer determining that the aggregated risk score of a component is greater than or equal to a risk threshold, performing, by the computer, an action to mitigate a risk to sensitive data corresponding to the component posed by an attack via the network.

“19. The computer program product of claim 18 further comprising: calculating, by the computer, a level of compromisability of sensitive data for each component represented by a node in the attack graph based on the vulnerability and risk metrics corresponding to each respective component and edge paths between nodes of related components; calculating, by the computer, the sensitivity rank, an integrity rank, and the criticality rank for each component represented by a node in the attack graph using a topology graph of the regulated service; and calculating, by the computer, the risk score for each component represented by a node in the attack graph based on the level of compromisability, the sensitivity rank, the integrity rank, and the criticality rank corresponding to each respective component.

“20. The computer program product of claim 19, wherein the computer calculates the level of compromisability of the sensitive data using a network flow algorithm, and wherein the network flow algorithm is a max-flow min-cut algorithm.”

For the URL and additional information on this patent, see: Chari, Suresh N.; Kundu, Ashish; Molloy, Ian M.; Pendarakis, Dimitrios; Rao, Josyula R. Automatic Generation Of Data-Centric Attack Graphs. U.S. Patent Number 10,503,911, filed July 20, 2018, and published online on December 23, 2019. Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=10,503,911.PN.&OS=PN/10,503,911RS=PN/10,503,911

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Health care special interests are spending millions to kill reform. We can’t let them get away with it. | Opinion

Newer

Elderly Russian Kindergarten Teacher Dies After False Bomb Threat

Advisor News

  • Health insurance premium tax bill advancing
  • The Medi-Cal money pit
  • The untapped potential of Qualified Longevity Annuity Contracts
  • NYC's fiscal outlook on downslide over budget gaps
  • Health insurance premium tax bill moving in Iowa House
More Advisor News

Annuity News

  • An Application for the Trademark “GREAT-WEST LIFE & ANNUITY INSURANCE COMPANY” Has Been Filed by Great-West Life & Annuity Insurance Company: Great-West Life & Annuity Insurance Company
  • The forces shaping life and annuities in 2026
  • Variable annuity sales surge as market confidence remains high, Wink finds
  • New Allianz Life Annuity Offers Added Flexibility in Income Benefits
  • How to elevate annuity discussions during tax season
More Annuity News

Health/Employee Benefits News

  • From $500 to $1.5K: Marylanders feel financial impact of expired ACA tax credits
  • The politics behind America's new health insurance shock
  • Health insurance premium tax bill advancing
  • Families oppose bill locking in Iowa Medicaid privatization
  • The Medi-Cal money pit
More Health/Employee Benefits News

Life Insurance News

  • Are the biggest life insurance opportunities hiding during tax season?
  • Hulse, Murray
  • Murray Giles Hulse
  • Oaktree grabs control of Atlantic Coast Life Co. in blockbuster A-Cap deal
  • AM Best Removes From Under Review With Developing Implications and Downgrades Credit Ratings of Banner Life Insurance Company and William Penn Life Insurance Company of New York
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Elevate Your Practice with Pacific Life
Taking your business to the next level is easier when you have experienced support.

Your Cap. Your Term. Locked.
Oceanview CapLock™. One locked cap. No annual re-declarations. Clear expectations from day one.

Ready to make your client presentations more engaging?
EnsightTM marketing stories, available with select Allianz Life Insurance Company of North America FIAs.

Press Releases

  • RFP #T02226
  • YourMedPlan Appoints Kevin Mercier as Executive Vice President of Business Development
  • ICMG Golf Event Raises $43,000 for Charity During Annual Industry Gathering
  • RFP #T25521
  • ICMG Announces 2026 Don Kampe Lifetime Achievement Award Recipient
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet