Patents by Inventor Youngja Park
Youngja Park has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11132507Abstract: A first vector representation of a first word within a first narrative text and a machine-generated label corresponding to the first word are constructed. Using the first vector representation, an annotator model is trained. The annotator model is configured to produce a set of probabilities, each probability in the set of probabilities representing a probable output annotation corresponding to a word within a narrative text. The training includes minimizing a difference between a first human-generated label corresponding to the first word and a first probable output annotation corresponding to the first word. Using the trained annotator model and a second narrative text, second training data is generated. The trained annotator model is configured to produce an output annotation corresponding to a word within a narrative text. The second training data is usable to train a relation extraction model.Type: GrantFiled: April 2, 2019Date of Patent: September 28, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Youngja Park, Taesung Lee, Arpita Roy
-
Patent number: 11089040Abstract: This disclosure provides for a signal flow analysis-based exploration of security knowledge represented in a graph structure comprising nodes and edges. “Conductance” values are associated to each of a set of edges. Each node has an associated “toxicity” value representing a degree of maliciousness associated with the node. The conductance value associated with an edge is a function of at least the toxicity values of the nodes to which the edge is incident. A signal flow analysis is conducted with respect to an input node representing an observable associated with an offense. The flow analysis seeks to identify a subset of the nodes that, based on their conductance values, are reached by flow of a signal representing a threat, wherein signal flow over a path in the graph continues until a signal threshold is met. Based on the analysis, nodes within the subset are designated as hypothesis nodes for further examination.Type: GrantFiled: December 27, 2019Date of Patent: August 10, 2021Assignee: International Business Machines CorporationInventors: Jiyong Jang, Dhilung Hang Kirat, Youngja Park, Marc Philippe Stoecklin
-
Patent number: 11082434Abstract: A cognitive security analytics platform is enhanced by providing a technique for automatically inferring temporal relationship data for cybersecurity events. In operation, a description of a security event is received, typically as unstructured security content or data. Information such as temporal data or cues, are extracted from the description, along with security entity and relationship data. Extracted temporal information is processing according to a set of temporal markers (heuristics) to determine a time value marker (i.e., an established time) of the security event. This processing typically involves retrieval of information from one or more structured data sources. The established time is linked to the security entities and relationships. The resulting security event, as augmented with the identified temporal data, is then subjected to a management operation.Type: GrantFiled: April 6, 2019Date of Patent: August 3, 2021Assignee: International Business Machines CorporationInventors: Preeti Ravindra, Youngja Park, Dhilung Hang Kirat, Jiyong Jang, Marc Philippe Stoecklin
-
Patent number: 10984322Abstract: Automatically estimating a sensitivity level of an information technology (IT) asset in one aspect may obtain information about an asset. Characteristics of the asset assigned based on the information may be compared with stored characteristics of known sensitive assets. A sensitivity level of the asset may be determined based on the comparing.Type: GrantFiled: July 11, 2013Date of Patent: April 20, 2021Assignee: International Business Machines CorporationInventors: Suresh N. Chari, Christopher Gates, Stephen C. Gates, Youngja Park, Wilfried Teiken
-
Patent number: 10984323Abstract: Automatically estimating a sensitivity level of an information technology (IT) asset in one aspect may obtain information about an asset. Characteristics of the asset assigned based on the information may be compared with stored characteristics of known sensitive assets. A sensitivity level of the asset may be determined based on the comparing.Type: GrantFiled: August 9, 2013Date of Patent: April 20, 2021Assignee: International Business Machines CorporationInventors: Suresh N. Chari, Christopher Gates, Stephen C. Gates, Youngja Park, Wilfried Teiken
-
Patent number: 10958672Abstract: An automated method for processing security events in association with a cybersecurity knowledge graph. The method begins upon receipt of information from a security system representing an offense. An initial offense context graph is built based in part on context data about the offense. The graph also activity nodes connected to a root node; at least one activity node includes an observable. The root node and its one or more activity nodes represent a context for the offense. The knowledge graph, and potentially other data sources, are then explored to further refine the initial graph to generate a refined graph that is then provided to an analyst for further review and analysis. Knowledge graph exploration involves locating the observables and their connections in the knowledge graph, determining that they are associated with known malicious entities, and then building subgraphs that are then merged into the initial graph.Type: GrantFiled: December 12, 2019Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: William Alexander Bird, Suzanne Carol Deffeyes, Jiyong Jang, Dhilung Kirat, Youngja Park, Josyula R. Rao, Marc Philippe Stoecklin
-
Patent number: 10922407Abstract: Examples of techniques for discriminant power based threat detection are described herein. An aspect includes identifying a plurality of detector names associated with an indicator of compromise, wherein each of the plurality of detector names has a respective associated discriminant power. Another aspect includes determining a plurality of malware families, wherein each malware family of the plurality of malware families is linked to at least one detector name of the plurality of detector names. Another aspect includes, for each malware family of the plurality of malware families, determining a sum of the associated discriminant power of any detector names that are linked to the malware family. Another aspect includes determining that the indicator of compromise belongs to a malware family of the plurality of malware families that has a highest sum.Type: GrantFiled: November 19, 2018Date of Patent: February 16, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Raymund Lin, Charlie Wu, Youngja Park
-
Patent number: 10891371Abstract: Detecting malicious user activity is provided. A profile for a user that accesses a set of protected assets is generated based on static information representing an organizational view and associated attributes corresponding to the user and based on dynamic information representing observable actions made by the user. A plurality of analytics is applied on the profile corresponding to the user to generate an aggregate risk score for the user accessing the set of protected assets based on applying the plurality of analytics on the profile of the user. A malicious user activity alert is generated in response to the aggregate risk score for the user accessing the set of protected assets being greater than an alert threshold value. The malicious user activity alert is sent to an analyst for feedback.Type: GrantFiled: October 10, 2019Date of Patent: January 12, 2021Assignee: International Business Machines CorporationInventors: Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken
-
Patent number: 10805308Abstract: Jointly discovering user roles and data clusters using both access and side information by performing the following operation: (i) representing a set of users as respective vectors in a user feature space; representing data as respective vectors in a data feature space; (ii) providing a user-data access matrix, in which each row represents a user's access over the data; and (iii) co-clustering the users and data using the user-data matrix to produce a set of co-clusters.Type: GrantFiled: December 22, 2017Date of Patent: October 13, 2020Assignee: International Business Machines CorporationInventors: Youngja Park, Taesung Lee, Ian M. Molloy, Suresh Chari, Benjamin J. Edwards
-
Publication number: 20200320171Abstract: A first vector representation of a first word within a first narrative text and a machine-generated label corresponding to the first word are constructed. Using the first vector representation, an annotator model is trained. The annotator model is configured to produce a set of probabilities, each probability in the set of probabilities representing a probable output annotation corresponding to a word within a narrative text. The training includes minimizing a difference between a first human-generated label corresponding to the first word and a first probable output annotation corresponding to the first word. Using the trained annotator model and a second narrative text, second training data is generated. The trained annotator model is configured to produce an output annotation corresponding to a word within a narrative text. The second training data is usable to train a relation extraction model.Type: ApplicationFiled: April 2, 2019Publication date: October 8, 2020Applicant: International Business Machines CorporationInventors: Youngja Park, Taesung Lee, Arpita Roy
-
Publication number: 20200322361Abstract: A cognitive security analytics platform is enhanced by providing a technique for automatically inferring temporal relationship data for cybersecurity events. In operation, a description of a security event is received, typically as unstructured security content or data. Information such as temporal data or cues, are extracted from the description, along with security entity and relationship data. Extracted temporal information is processing according to a set of temporal markers (heuristics) to determine a time value marker (i.e., an established time) of the security event. This processing typically involves retrieval of information from one or more structured data sources. The established time is linked to the security entities and relationships. The resulting security event, as augmented with the identified temporal data, is then subjected to a management operation.Type: ApplicationFiled: April 6, 2019Publication date: October 8, 2020Applicant: International Business Machines CorporationInventors: Preeti Ravindra, Youngja Park, Dhilung Hang Kirat, Jiyong Jang, Marc Philippe Stoecklin
-
Patent number: 10733286Abstract: Detecting propensity profile for a person may comprise receiving artifacts associated with the person; detecting profile characteristics for the person based on the artifacts; receiving a plurality of predefined profiles comprising a plurality of characteristics and relationships between the characteristics over time, each of the plurality of predefined profiles specifying an indication of propensity; matching the profile characteristics for the person with one or more of the plurality of predefined profiles; and outputting one or more propensity indicators based on the matching, the propensity indicators comprising at least an expressed strength of a given propensity in the person at a given time.Type: GrantFiled: February 12, 2016Date of Patent: August 4, 2020Assignee: International Business Machines CorporationInventors: Anni R. Coden, Keith C. Houck, Ching-Yung Lin, Wanyi Lin, Peter K. Malkin, Shimei Pan, Youngja Park, Justin D. Weisz
-
Publication number: 20200234109Abstract: Mechanisms for implementing a social engineering cognitive system are provided. The mechanisms train a social engineering classifier to classify documents in a corpus as to whether they are associated with a social engineering communication (SEC). The mechanisms process one or more documents of the corpus to classify the one or more documents as to whether the one or more documents are associated with an SEC to thereby identify a set of SEC related documents. The mechanisms extract key features from the documents in the set of SEC related documents. The mechanisms train an SEC classification model based on the extracted key features, which processes a newly received electronic communication to determine whether or not the newly received electronic communication is an SEC. The mechanisms perform a responsive action in response to determining that the newly received electronic communication is an SEC.Type: ApplicationFiled: January 22, 2019Publication date: July 23, 2020Inventors: Taesung Lee, Youngja Park
-
Corroborating threat assertions by consolidating security and threat intelligence with kinetics data
Patent number: 10686830Abstract: A cognitive security analytics platform is enhanced by providing a computationally- and storage-efficient data mining technique to improve the confidence and support for one or more hypotheses presented to a security analyst. The approach herein enables the security analyst to more readily validate a hypothesis and thereby corroborate threat assertions to identify the true causes of a security offense or alert. The data mining technique is entirely automated but involves an efficient search strategy that significantly reduces the number of data queries to be made against a data store of historical data. To this end, the algorithm makes use of maliciousness information attached to each hypothesis, and it uses a confidence schema to sequentially test indicators of a given hypothesis to generate a rank-ordered (by confidence) list of hypotheses to be presented for analysis and response by the security analyst.Type: GrantFiled: December 20, 2017Date of Patent: June 16, 2020Assignee: International Business Machines CorporationInventors: Jiyong Jang, Dhilung Hang Kirat, Youngja Park, Marc Philippe Stoecklin -
Publication number: 20200186516Abstract: Managing passwords is provided. A machine training process is performed using a set of existing passwords to train a machine learning component. Members of a set of semantic categories are used to categorize respective passwords in the set of existing passwords. Password strengths corresponding to a set of candidate passwords are evaluated using the machine learning component. A resource is secured with a candidate password having a password strength greater than or equal to a defined password strength threshold level.Type: ApplicationFiled: February 18, 2020Publication date: June 11, 2020Inventors: Suresh Chari, Taesung Lee, Ian Michael Molloy, Youngja Park
-
Publication number: 20200159920Abstract: Examples of techniques for discriminant power based threat detection are described herein. An aspect includes identifying a plurality of detector names associated with an indicator of compromise, wherein each of the plurality of detector names has a respective associated discriminant power. Another aspect includes determining a plurality of malware families, wherein each malware family of the plurality of malware families is linked to at least one detector name of the plurality of detector names. Another aspect includes, for each malware family of the plurality of malware families, determining a sum of the associated discriminant power of any detector names that are linked to the malware family. Another aspect includes determining that the indicator of compromise belongs to a malware family of the plurality of malware families that has a highest sum.Type: ApplicationFiled: November 19, 2018Publication date: May 21, 2020Inventors: Raymund Lin, Charlie Wu, Youngja Park
-
Publication number: 20200145442Abstract: This disclosure provides for a signal flow analysis-based exploration of security knowledge represented in a graph structure comprising nodes and edges. “Conductance” values are associated to each of a set of edges. Each node has an associated “toxicity” value representing a degree of maliciousness associated with the node. The conductance value associated with an edge is a function of at least the toxicity values of the nodes to which the edge is incident. A signal flow analysis is conducted with respect to an input node representing an observable associated with an offense. The flow analysis seeks to identify a subset of the nodes that, based on their conductance values, are reached by flow of a signal representing a threat, wherein signal flow over a path in the graph continues until a signal threshold is met. Based on the analysis, nodes within the subset are designated as hypothesis nodes for further examination.Type: ApplicationFiled: December 27, 2019Publication date: May 7, 2020Inventors: Jiyong Jang, Dhilung Hang Kirat, Youngja Park, Marc Philippe Stoecklin
-
Publication number: 20200120115Abstract: An automated method for processing security events in association with a cybersecurity knowledge graph. The method begins upon receipt of information from a security system representing an offense. An initial offense context graph is built based in part on context data about the offense. The graph also activity nodes connected to a root node; at least one activity node includes an observable. The root node and its one or more activity nodes represent a context for the offense. The knowledge graph, and potentially other data sources, are then explored to further refine the initial graph to generate a refined graph that is then provided to an analyst for further review and analysis. Knowledge graph exploration involves locating the observables and their connections in the knowledge graph, determining that they are associated with known malicious entities, and then building subgraphs that are then merged into the initial graph.Type: ApplicationFiled: December 12, 2019Publication date: April 16, 2020Inventors: William Alexander Bird, Suzanne Carol Deffeyes, Jiyong Jang, Dhilung Kirat, Youngja Park, Josyula R. Rao, Marc Philippe Stoecklin
-
Patent number: 10609017Abstract: Managing passwords is provided. A machine training process is performed using a set of existing passwords to train a machine learning component. Members of a set of semantic categories are used to categorize respective passwords in the set of existing passwords. Password strengths corresponding to a set of candidate passwords are evaluated using the machine learning component. A resource is secured with a candidate password having a password strength greater than or equal to a defined password strength threshold level.Type: GrantFiled: May 10, 2017Date of Patent: March 31, 2020Assignee: International Business Machines CorporationInventors: Suresh Chari, Taesung Lee, Ian Michael Molloy, Youngja Park
-
Patent number: 10599837Abstract: Detecting malicious user activity is provided. A profile for a user that accesses a set of protected assets is generated based on static information representing an organizational view and associated attributes corresponding to the user and based on dynamic information representing observable actions made by the user. A plurality of analytics is applied on the profile corresponding to the user to generate an aggregate risk score for the user accessing the set of protected assets based on applying the plurality of analytics on the profile of the user. A malicious user activity alert is generated in response to the aggregate risk score for the user accessing the set of protected assets being greater than an alert threshold value. The malicious user activity alert is sent to an analyst for feedback.Type: GrantFiled: March 31, 2016Date of Patent: March 24, 2020Assignee: International Business Machines CorporationInventors: Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken