Systems and methods for monitoring and mitigating information leaks

ABSTRACT

Systems and methods are disclosed for determining whether a third party observer could determine that an organization has an intent with respect to subject matter based on the organization&#39;s web activity. The determination that there is a risk of information leaks to the third party observer can be completed by analyzing the entropy of web usage information destined for the third party observer&#39;s servers. Systems and methods are also disclosed for mitigating the risk of information leaks by obscuring the organization&#39;s web activity. The web activity can be obscured by selecting candidate actions that can be used to generate neutralizing web traffic from the organization&#39;s network which will obscure an intent the organization has with respect to a particular subject matter. For example, the candidate actions can identify specific queries, links, or actions that the organization can take to neutralize their web activity to a less remarkable point in the search space.

BACKGROUND OF THE DISCLOSURE

This application relates to monitoring and mitigating information leaksthat can occur through data mining by third party observers.

A major concern for many organizations is the leakage of informationthrough employee use of the web. The leakage of information can occurthrough inadvertent actions of the employee as well as directexfiltration of data. Through the use of search tools, web sitemonitoring, and other common commercial data analytical tools, a thirdparty can derive substantial insights into the operation and planning ofa large corporation.

Many Internet applications today use Data Analytical Services (DAS) toamass information about their users. Typically an application contractswith a DAS provider, so that the application provides raw data to theDAS provider and the DAS provider returns analytics to the application.The DAS use a number of methods to collected information on users' visitbehavior. The types of information tracked include such factors asgeolocation, dwell time on a particular web page, incoming and outgoingclicks (e.g., launch points), the type of computer used, thetelecommunications provider used, as well as a number of otherparameters—including tens to hundreds of data elements overall. Thisinformation is used to track and identify users, to make inferencesabout their preferences and habits, and to create the associations abouttheir behaviors that are of value to commercial organizations. Forexample, a commercial website might use information about how long auser dwells on a set of product pages along with information on theuser's geolocation to infer that a user has an interest in a particularclass of product and belongs to a particular income class. The websitecan then use this information to improve its marketing to the user, notjust to determine what class of products might interest a user, but alsoto present more exclusive product offerings within that class to moreaffluent users or more bargain-priced offerings to less affluent users.An example of this understanding is Amazon's ability to predict “whatothers like you” are interested in and Netflix's ability to correctlyrecommend movies. In both cases, the data mining systems developcomplete models of needs, desires, and predictions of intent of theusers. AMAZON is a registered trademark owned by Amazon, Inc. NETFLIX isa registered trademark owned by Netflix, Inc.

While the collected information has commercial value to DAS providersand applications, it can present a threat to individuals andorganizations by revealing information that these entities do not wishto reveal. For users, this can mean that they may be revealing sensitiveinformation about themselves, such as their identity or whereabouts,even when providing apparently innocuous information. This risk isparticularly acute given that DAS providers aggregate information acrossmultiple applications or web sites.

For organizations, there is the additional risk that the collectivebehavior of members of the organization (e.g., a group of users allvisiting sites related to the same topic) could reveal sensitiveinformation about the organization, such as product plans or futurelarge scale business transactions. For example, when an organization isinvolved in particular subject matter or is investigating the subjectmatter for possible involvement, the web usage (e.g., searching and webbrowsing history) of the organization tends to exhibit an increasedconcentration around the subject matter in which the organization isinvolved in comparison to an uninterested or neutral organization. Forexample, if company A is secretly investigating company B for a possibleacquisition, company A's web usage will likely tend to involve company Bmore than would otherwise be expected. A third party observer who istracking the users in company A, such as a DAS, will likely have enoughinformation about company A's web usage to discern company A's increasedinterest in Company B. If the observer knew that company A were, forexample, an investment bank, the observer might be able to translateknowledge of company A's increased interest into its true intentregarding company B. The third party observer could then use theknowledge of the company A's intent for nefarious actions, such as,publicizing information about company A's secret investigations intocompany B to affect their stock prices for unjust profit or by placingcertain investments in Company A or B that take advantage of theinformation.

In order to help users mitigate these risks, some tools have beendeveloped to provide information about tracking and information beinggathered about individual users, which function as tools on standalonecomputers. Other tools operate as a combination of a probe machine anduser machine. A key element of these systems is that they areimplemented locally on a user's device and do not make use of anynetwork resources. While these systems can be very effective forsophisticated end users who run these applications on their PCs, theyhave several limitations. For example, (1) they require the installationof software on individual PCs, with requires either active configurationby the end users or the inclusion of the software in a corporateconfiguration management system with associated support resources; (2)they do not provide any form of information consolidation or analyticsthat are needed for assessing the risk to a given organization; (3) theydo not provide any mechanism to assess what information is beinggathered about the organization as a whole; and (4) they do not providea means of discovering relationships and preferences that is languageindependent.

Other tools have also been developed to obscure the network layerconnection path when accessing websites, such as Anonymizer. However,tools like Anonymizer, which only disassociate IP addresses fromparticular users, are unable to prevent a third party from receivinghigher layer information (e.g., application or presentation layers). Assuch, the third party can still analyze users' behavior and then formuser groups, realize intent, or infer the user's and/or organization'sidentity based on the analysis.

SUMMARY OF THE DISCLOSURE

To address the deficiencies of the existing tools, this disclosureprovides illustrative embodiments of methods, systems, and computerreadable media storing computer executable instructions for determiningwhether a third party observer could, if they were so inclined,determine that an organization has an intent with respect to aparticular subject matter based on the organization's web usageinformation. Methods, systems, and computer readable media storingcomputer executable instructions are also disclosed for obscuring theexistence of an intent of an organization with respect to some subjectmatter by obscuring the organization's targeted web activity amongneutralizing web information, where neutralizing web information mimicsa user's web behavior in a manner that is substantially unrelated to theorganization's intent and would obscure the organization's actual intentwhen analyzed by a third party.

Herein, targeted web activity refers to an organization's web usageinformation that is associated with the organization's intent andneutralizing web information is information that would obscure thetargeted web activity with respect to the organization's intent if theorganization's web usage information were to be analyzed. Herein, anorganization may refer to any suitable government entity, enterprise,company, and/or group of users. The intent of an organization includes amere increased interest in subject matter or may be a more specificintent related to any business, research, and/or development in whichthe organization is involved or is investigating for possibleinvolvement. For example, the organization might intend to participateor may be merely investigating the possibility of participating in afinancial/business transaction (e.g., merger or acquisition), newproduct development, or some other activity that the organization wouldprefer to keep secret from competitors and/or the public at large.Regarding government entities, the intent of the organizations caninclude investigations regarding political strategies, terroristorganizations, other nations, or matters of national security.

In some embodiments, the systems for determining whether a third partyobserver could, if they were so inclined, determine that an organizationhas an intent with respect to a particular subject matter based on theorganization's web usage information include metadata extractingcircuitry. The metadata extracting circuitry, which may be positioned inthe organization's network at a point where network communications areconsolidated, collects data that is in transit between users on theorganization's network and elements on the Internet. The metadataextracting circuitry extracts the metadata from the collected data andsends the extracted metadata to privacy analyzing circuitry. The privacyanalyzing circuitry processes the extracted metadata to what informationthird party observers may have received from the organization's webactivity. Based on the processed metadata, the privacy analyzingcircuitry then determines whether third party observers may havereceived sufficient information to determine that the organization hasan intent with respect to the particular subject matter based on theextracted metadata.

In some embodiments, the privacy analyzing circuitry maintains countersthat are each associated with respective metadata. The counters areincremented substantially each time the associated metadata is receivedby the privacy analyzing circuitry. The metadata can include informationrelated to HTTP cookies, HTML meta tags, URLs that are accessed, sourceIP addresses, destination IP addresses, source MAC addresses, and/ordestination MAC addresses.

In some embodiments, what information the third party observer hasacquired about the users in the organization's network is determinedbased on the extracted metadata. In some embodiments, whether the thirdparty observer could determine the intent of the organization isdetermined based on the extracted metadata. In some embodiments, entropygraphs are used to make the determination on whether the third partyobserver has received sufficient information to determine the intent ofthe users in the organization's network. The entropy graphs may be basedon the counters. The peaks of the entropy graph can indicate that thethird party observer has received sufficient information to determinethat the organization has an intent with respect to a particular subjectmatter. In some embodiments, distance metrics are used instead of, or inaddition to, the entropy graphs to determine whether the third partyobserver has received sufficient information to determine that theorganization has an intent with respect to a particular subject matter.

Additional aspects of the disclosure relate to methods and computerreadable medium for determining whether a third party observer could, ifthey were so inclined, determine that an organization has an intent withrespect to a particular subject matter based on the organization's webusage information.

In some embodiments, the system for obscuring the intent of anorganization includes obfuscating circuitry that can generateneutralizing web information which, when output by the organization'snetwork, will obscure the organization's targeted web activity among theneutralizing web information. For example, the neutralizing webinformation can include specific queries, links, and/or actions thatmimics users' behavior, which the organization can take that would makethe organization's targeted web activity less apparent to a third partyobserver who is analyzing the organization's aggregate web activity. Insome embodiments, the neutralizing web information may make theorganization's targeted web activity appear to relate to a broader ordifferent subject matter than the organization's actual intent. Forexample, neutralizing web information used to obscure an interest incompany B from company A's web activity may include web activity relatedto company B's competitors so that a third party observer analyzingcompany A's aggregate web activity would only be able to discern thatcompany A is investigating company B's industry and not specificallycompany B.

In some embodiments, the obfuscating circuitry determines theneutralizing web information by reversing the process by which DASdetermine similarities between users' behaviors. First, the obfuscatingcircuitry generates a similarity matrix that is representative of thesimilarity or dissimilarity between users in an organization, whereinthe similarity matrix is generated based on the organization's web usageinformation. For example, the organization's similarity matrix includessimilarity index values that are indicative of the similarity betweenusers in the organization. Then, the obfuscating circuitry provides adesired similarity matrix that meets obfuscation constraints, whereinthe obfuscation constraints may set, for example, a maximum similarityindex value for the organization's similarity matrix between differentusers. For example, one possible manner to obscure the organization'sintent would be to make it appear to a third party observer that allusers in the organization are acting independently, and thus, their webactivity is relatively dissimilar. A maximum similarity index valuebetween different users may achieve this relatively dissimilarappearance.

The desired similarity matrix includes user similarity index values thatwould obscure whether an organization has an intent with respect to aparticular subject matter when the similarity index values are analyzedby a third party observer. In some embodiments, the obfuscatingcircuitry provides a set of desired similarity matrices. In someembodiments, the set of desired similarity matrices are predetermined.In some embodiments, a subset of the set of desired similarity matricesare selected and/or generated to meet the particular obfuscationconstraints that are based on the organization's current network usage.A distance matrix is generated based on the organization's similaritymatrix and the desired similarity matrix. The distance matrix generallyrepresents the distance the organization's similarity matrix is from thedesired similarity matrix, and thus, the distance from a similaritymatrix in which the obfuscation constraints are met. This distancematrix may be generated using any suitable distance metric.

Based on the distance matrix, the obfuscating circuitry selects acandidate action from a plurality of candidate actions. In someembodiments, the candidate action is selected based on a gradientdescent calculation on the distance matrix. In some embodiments, thecandidate action includes web behaviors that would make theorganization's similarity matrix more similar the desired similaritymatrix. For example, the candidate action can include instructions forcreating neutralizing web activity by performing a particular behavioron a website. The obfuscating circuitry modifies the organization'ssimilarity matrix based on the candidate action and then determineswhether the modified organization's similarity matrix meets theobfuscation constraints.

In some embodiments, the obfuscating circuitry iterates the selection ofthe candidate action and modification of the organization's similaritymatrix until the organization's similarity matrix meets the obfuscationconstraints. In some embodiments, the obfuscating circuitry iterates theselection of the candidate action and modification of the organization'ssimilarity matrix until the number of iterations has reaches a maximumnumber of iterations.

Once the candidate action(s) has been selected, the obfuscatingcircuitry can generate neutralizing web activity based on theinstructions included in the candidate action(s). In some embodiments,the neutralizing web activity is generated with a spoofed addressassociated with a user in the organization so that the neutralizing webactivity appears to be legitimate web activity to a third partyobserver.

Additional aspects of the disclosure relate to methods and computerreadable medium for causing a computer device to carryout thefunctionality of the system described above for obscuring the intent ofan organization by obscuring the organization's targeted web activityamong neutralizing web information.

BRIEF DESCRIPTION OF THE DRAWINGS

The system and methods may be better understood from the followingillustrative description with references to the following drawings inwhich:

FIG. 1 is a block diagram of a network that includes a security systemconnected to the Internet, according to an illustrative embodiment.

FIG. 2 is a block diagram of an information leakage monitoring andmitigation system, according to an illustrative embodiment.

FIG. 3 is an illustrative entropy graph, according to an illustrativeembodiment.

FIG. 4 is a flow chart of a method for monitoring information leaks,according to an illustrative embodiment.

FIG. 5 is a flow chart of a method for mitigating information leaks,according to an illustrative embodiment.

DETAILED DESCRIPTION

To provide an overall understanding of the disclosed methods andsystems, certain illustrative embodiments will now be described,including systems and methods for monitoring and mitigating informationleaks from an organization's network. However, it will be understood byone of ordinary skill in the art that the systems and methods describedherein may be adapted and modified as is appropriate for the applicationbeing addressed and that the systems and methods described herein may beemployed in other suitable applications, and that such other additionsand modifications will not depart from the scope hereof.

The disclosed information leakage monitoring and mitigation systemsfocus on the inadvertent leakage of information that can occur throughdata mining by external sources. The disclosed systems permit anorganization to develop an understanding of the concentration and typeof data being gathered. With this information, the organization candevelop informed policies and take specific actions to limit theundesired leakage of information and to avoid unnecessary blocking ofinformation which can damage productivity and limit the access toinformation that is needed by modern organizations.

The disclosed information leakage monitoring and mitigation systemsaddress this problem by applying network-based monitoring techniquesthat analyze the web usage of users on the organization's network, suchas the use of Internet applications, in order to determine when theseapplications are using DAS, which DAS providers have insight into whichapplications, and what information is being collected by DAS providersfrom applications. Based on these determinations, the disclosedinformation leakage monitoring and mitigation systems generate warningsto indicate when a DAS provider has received sufficient web usageinformation to determine, if they were so inclined, that theorganization has an intent with respect to a particular subject matter.The disclosed information leakage monitoring and mitigation systems mayalso attempt to prevent or mitigate these unintended disclosures,preferably in a manner that avoids unnecessarily blocking web accesswhich can damage productivity and limit the access to information thatis needed by modern organizations and without generating an overlyexcessive volume of network traffic.

FIG. 1 is a block diagram of network 100, which includes secure network102 and the Internet. Secure network 102 includes users 104, securitysystem 106, and communications network 108. As an illustrativeembodiment, the Internet includes DAS server 112, website 114,application server 116, DNS server 118, and location server 120.

Secure network 102 is and/or includes any suitable network, for example,a personal area network, local area network, home area network, campusnetwork, wide area network, global area network, organization privatenetwork, public switched telephone network, the Internet, and/or anyother suitable type of network. Users 104 are users of secure network102 and represent any suitable device in secure network 102, such as, apersonal computer, mobile computing device, or a device connected intosecure network 102 via virtual private network (VPN). Users 104 cancommunicate with any suitable element in secure network 102 and/or anysuitable element in the Internet via communications network 108, whichmay be any suitable network or combination of networks.

Security system 106 is responsible for monitoring and mitigatingpotential information leaks. Security system 106 may be implemented inany suitable network element, for example, in a firewall, Internetgateway, and/or any other point where user data is consolidated. Whenplaced in network elements, security system 106 can examine the trafficflowing across aggregation or trunking circuits to determine which DASmight be gathering information and the type of information the DAS couldbe gathering and possibly compiling about users 104 and/or theassociated organization. For example, security system 106 can observeuser application data that is in transit between users 104 andInternet-connected devices, such as, DAS server 112, website 114,application server 116, DNS server 118, location server 120, and otherrelated network services. In addition, security system 106 can usenetwork registries, network addresses, and domain management informationto automatically identify the DAS resources that are being used togather the information. In some embodiments, all or most of the networkcommunications entering or leaving network 102 will pass throughsecurity system 106. For example, security system 106 may examine alloutgoing network traffic to the Internet. In some embodiments, securitysystem 106 is equipped with software and/or hardware for detecting andmitigating information leaks. Such embodiments are discussed below withregard to FIGS. 2-5.

DAS server 112 may be a typical DAS server that is generally configuredto collect and analyze information about users or organizations. Thetypes of information tracked by DAS server 112 include, for example,geolocation, dwell time on a particular web page, incoming and outgoingclicks (e.g., launch points), the type of computer used, thetelecommunications provider used, as well as a number of otherparameters. DAS server 112 may acquire the information about usersand/or their respective organizations by aggregating the informationcollected from a number of websites and/or web applications with whichthe DAS operator has a relationship. For example, DAS server 112 maycollect data about a user when the user visits website 114 and collectdata about the same user when the user visits application server 116 ifthe operator of DAS server 112 has a business relationship with bothwebsite 114 and application server 116. If a number of users 104 have alot of activity with relation to website 114, the operator of DAS server112 might be able to aggregate users 104 web usage information anddetermine that users 104 have some sort of intent with respect towebsite 114 or the subject matter associated with website 114.

Website 114 may be any typical website that is accessible by users 104over the Internet. Web application server 116 may be a typical webserver that hosts any web-based application that is accessible by users104 over the Internet. DNS server 118 may be a typical server that isgenerally responsible for providing mapping between IP addresses andhostnames. Location server 120 may be a typical server that provideslocation related services.

FIG. 2 is a block diagram of information leakage monitoring andmitigation system 200. System 200 may be located within security system106 of FIG. 1 and includes metadata extractor 202, privacy analyzer 204,database 206, and obfuscation mechanism 208.

Metadata extractor 202 is configured to scan at least a portion of anetwork's outgoing network traffic, for example, traffic exiting securenetwork 102 into the Internet of FIG. 1. In some embodiments, metadataextractor 202 scans all of the outgoing network traffic. Metadataextractor 202 can extract elements such as HTTP cookies, HTML meta tags,the times at which application transactions occur, URLs that areaccessed, IP addresses, MAC addresses, and/or any other suitable networkcommunication information. Information loss monitoring and mitigationsystem 200 can use the extracted metadata elements in several ways. Forexample, for known DAS or tracking services, system 200 can identifywhether a DAS and/or tracking service has sufficient information todiscern that an organization has an intent with respect to a particularsubject matter, which users are being tracked by which DAS and/ortracking service, and what information the users are revealing to eachDAS and/or tracking service. System 200 can also determine whatinformation each DAS knows about the organization as a whole byaggregating the information disclosed by individual users. Suchembodiments are discussed in greater detail below.

In some embodiments, metadata extractor 202 runs in parallel with othernetwork processes and/or devices, such as a network router. In such anembodiment, both metadata extractor 202 and the network router willreceive identical or substantially similar outgoing network traffic.Duplicating incoming network traffic and/or utilizing packet capturingtechniques can allow information leakage monitoring and mitigationsystem 200 to perform its functions without increasing or substantiallyincreasing the network's latency. For example, metadata extractor 202can scan the incoming network communications while the network routerforwards the identical incoming network communications to theappropriate device in the network. After extraction by metadataextractor 202, the metadata is passed to privacy analyzer 204.

Privacy analyzer 204 is configured to determine whether a third partyentity has received enough information to discern whether anorganization has an intent with respect to a particular subject matter.For example, privacy analyzer 204 may determine that a particular DASmight have monitored users 104 web activity across a number of websites,where the web activity was actually related to a target company forwhich users 104 are investigating for a possible acquisition. Privacyanalyzer 204 may additionally determine that the DAS has receivedsufficient information such that, if the DAS was so inclined, the DASwould be able to discern that users 104 have some intent with regard tothe target company. In some embodiments, privacy analyzer 204 mayidentify whether individual users are being tracked by a particular DASor other tracking service. Additionally or alternatively, privacyanalyzer 204 may determine what information a DAS or multiple DASs mayknow about the organization associated with secure network 102.

In order to determine whether information leaks may be occurring,privacy analyzer 204 may generate an entropy graph or multiple entropygraphs, such as entropy graph 300 of FIG. 3, which will be discussed ingreater detail below. For example, when extracted metadata is receivedfrom metadata extractor 202, privacy analyzer 204 will increment acounter associated with the received metadata for use in an entropygraph, or alternatively, use the incremented counter and other countersto calculate an entropy value. For example, when organization users,such as users 104 of FIG. 1, visit a particular web server in a highervolume than other web servers, peaks in the entropy graphs associatedwith the particular web server will begin to form. As another example,the extracted metadata can include information regarding search termsused in queries performed by users 104. When users 104 have an intentwith regard to a particular subject matter, they will likely perform anincreased number of queries that include search terms related to theparticular subject matter. As such, peaks in the entropy graphsassociated with particular search terms and/or general search termsubject matter that is related to the intent of users 104 may begin toform. These peaks can indicate that a third party may have receivedenough information to determine that users 104 have some intent withrespect to the subject matter of the particular web server or searchterms, respectively.

In some embodiments, the counter is associated with a specific domain,sub-domain, domain registry, web address, DAS, website, and/or any othersuitable Internet attribute. As a specific example, privacy analyzer 204might receive information from metadata extractor 202 that indicatesthat user A's device is sending information to DAS server 112. Inresponse to receiving the information, privacy analyzer 204 willincrement a counter associated with DAS server 112 in an entropy graphassociated with user A. The incremented counter keeps track of the totalnumber of communications from user A's device to DAS server 112.Additionally or alternatively, privacy analyzer 204 will increment acounter associated with DAS server 112 in an entropy graph associatedwith users 104 (e.g., all or substantially the users in a particularorganization). This incremented counter keeps track of the total numberof communications from users 104 to DAS server 112 (e.g., theorganization aggregated communications to DAS server 112). The countersmay be incremented by any suitable value, for example, by 1 for eachoutgoing communication associated with a particular domain that isreceived by privacy analyzer 204. In some embodiments, the counters maybe incremented by a value less than or greater than 1 depending on thetype of communication that is received. For example, DNS requests mayincrement a counter by a value smaller than 1, while a different type ofweb transaction may increment the counter by a value greater than 1.

In some embodiments, each counter in the entropy graph(s) is associatedwith specific details of the outgoing information in addition to, oralternative to, the association with a particular domain or address. Forexample, a counter associated with DAS server 112 may be additionallyassociated with a number of other counters that keep track of what typeof information is being sent to DAS server 112. As a specific example,users 104 may conduct Internet searches for Company A, among othersearches, using multiple search engines. Through a relationship betweenDAS server 112 and the Internet search engine entities, DAS server 112will aggregate the information that users 104 are conducting searchesabout Company A. Privacy analyzer 204 will increment a counter that isassociated with (1) searches related to Company A, and (2) DAS server112 whenever an outgoing transmission destined for DAS server 112 isassociated with Company A. In this manner, privacy analyzer 204 will beable to determine what information DAS server 112 may know about the webusage history of users 104.

In some embodiments, privacy analyzer 204 can identify new DAS serversor providers, as well as new techniques that a DAS provider is using togain information about users 104. For example, if privacy analyzer 204detects a large number of communications of a particular data type goingto a previously unknown domain, privacy analyzer 204 may determine thatthe previously unknown domain is a new DAS server. As another example,the detection of new DAS servers, providers, or new tracking techniquesmay be determined based on correlations among different metadataelements. For example, all communications related to a DAS provider areusually directed to the same server, stored in the same field in aparticular protocol, and remain constant for each user the DAS istracking As such, privacy analyzer 204 may decompose the communicationsof users 104 into data fields. If some data fields in each messageremain constant for individual users, but are different when compared tothe data fields of other users, privacy analyzer 204 may determine thatthe destination server associated with the decomposed communications isassociated with a DAS.

In some embodiments, privacy analyzer 204 provides the counter, entropy,information about newly detected servers, provides, techniques, and/orany other suitable information to database 206. Database 206 may be anysuitable database and may be local or remote to privacy analyzer 204.Database 206 may additionally, or alternatively, be distributedthroughout secure network 102 and/or any other suitable network. In someembodiments, the information stored in database 206 is available onlineso that network operators, security analysts, and/or any other suitableperson/entity may access the information and make determinationsregarding information leakage risks to secure network 102.

In some embodiments, privacy analyzer 204 monitors the risk ofinformation leakage by utilizing distance metrics in addition to, oralternative to, the aforementioned entropy/counter analysis. Forexample, privacy analyzer 204 may determine the distance between adomain and domain registry, address and DAS, a first DAS and a secondDAS, websites to DASs, and/or any other suitable distance parameters.Here, the distance may relate to physical distance, network distance(e.g., number of hops), click-through distance (e.g., number oflinks/clicks required to get from one webpage to another), and/or anyother suitable distance metric. For example, if a user navigates to asearch engine, clicks a link associated with a DAS, and then goes backto the search engine, the distance is a value of 1. If the usernavigates to other pages in between the search engine and the DAS and inbetween the DAS and the return to the search engine, the distance willbe a value greater than 1. In some embodiments, the distance metricsmeasure distance values between values of an entropy graph and/orparameters of the entropy graph, such as entropy graph 300 of FIG. 3.The lower the distance value, the greater indication that a lot of auser's web activity is concentrated about a particular subject matter,for example, subject matter for which the users have an intent. In someembodiments, privacy analyzer 204 may keep track of the similarity ofweb usage behavior between users from the perspective of each DAS.Smaller distance values are assigned to users with more similarbehaviors, and larger distance values are assigned to users with lesssimilar behaviors. According, privacy analyzer 204 can determine that aDAS is more likely to determine that the organization has an intent withrespect to a particular subject matter when the web usage behavior ofthe users is relatively similar, which privacy analyzer 204 candetermine from relatively small distance values.

In some embodiments, when a particular counter, entropy value, and/ordistance metric reaches a specified threshold, privacy analyzer 204 willdetermine that there is a risk that a third party entity has receivedsufficient information to determine that an organization has an intentwith respect to a particular subject matter and send a notification toobfuscation mechanism 208. For example, when the counter associated witha particular DAS reaches the specified threshold value (e.g., somesuitable real number), privacy analyzer 204 will determine that the DAShas gathered a significant amount of information about the web usage ofusers 104 which could lead to information leaks. In some embodiments,the threshold relates to a maximum difference between counters. Forexample, one counter value may be significantly larger than the averagecounter value. If the difference between the counter value and theaverage counter value exceeds a specified threshold value, privacyanalyzer 204 will determine that there is a risk that a third partyentity has received sufficient information to determine that anorganization has an intent. In response to that determination, privacyanalyzer 204 will send a suitable notification to obfuscation mechanism208. In some embodiments, the notification includes information aboutthe severity and/or certainty regarding the potential informationleakage. In some embodiments, the notification additionally, oralternatively, includes information about which entity may be acquiringthe information and/or what information is at risk of being lost. Insome embodiments, the notification is an indicator that simply notifiesobfuscation mechanism 208 that information leakage may be occurringwithout providing any further information.

Obfuscation mechanism 208 is generally configured to generate alarms andwarning based on the data gathered by privacy analyzer 204 and/or anynotifications that privacy analyzer 204 sends to obfuscation mechanism208 when information leaks are detected or suspected. The alarms andwarnings generated by obfuscation mechanism 208 can be sent to othersecurity or management systems or can be used in a standalone function.

In some embodiments, obfuscation mechanism 208 will take other actionsto mitigate the risk of information leaks in addition to, or alternativeto, the alarm and warning generation. For example, obfuscation mechanism208 may generate neutralizing web traffic based on recommend behaviorsfrom predetermined privacy preserving templates that, when implemented,would obscure the targeted web activity of users 104 with neutralizingweb information. For example, the privacy preserving templates mayprovide suggestions of web browsing and/or network behavior modificationbased on the specific threats and/or network usage patterns identifiedby privacy analyzer 204 to neutralize the risk of information leakage.The implementation of a privacy preserving template may occurautomatically in response to a notification from privacy analyzer 204that indicates that there is a risk of information leakage. The privacypreserving templates may be stored in database 206.

In some embodiments, obfuscation mechanism 208 can determine thecomposition of the neutralizing web traffic for obscuring targeted webactivity based on the specific threats and/or network usage patternsidentified by privacy analyzer 204 in real-time. In some embodiments,the properties of the real-time generated neutralizing web traffic aresubstantially similar to the neutralizing web traffic generated from thepredetermined privacy preserving templates, except that the real-timeneutralizing web traffic is generated automatically in real-time. Thirdparty observers, such as a DAS, generally use algorithms that determinethe similarity of users based on their respective web activity. Thesesimilarity analysis algorithms can be reversed to derive theneutralizing web traffic that will make the users appear less similar.Such embodiments are discussed in further detail below with regard toFIG. 5.

Information leakage monitoring and mitigation system 200 may beimplemented using any suitable combination of hardware and/or software.For example, the elements shown in FIG. 2 may be implemented using oneor more PLD, FPGA, microcontroller, ASIC, other firmware, or anysuitable combination thereof. As a further example, system 200 mayutilize separate devices and/or chipsets for the collection of userapplication data, extraction of metadata by metadata extractor 202 andthe analysis of the metadata by privacy analyzer 204. It should be notedthat the elements shown in FIG. 2 may be removed, rearranged, and/orcombined in any suitable fashion without departing from the disclosure.For example, obfuscation mechanism 208 may be removed such that system200 only provides information leakage monitoring capabilities withoutinformation leakage mitigation capabilities. As a further example,portions of obfuscation mechanism 208 may be combined such that privacyanalyzer 204 generates warnings and alarms when a risk of informationleakage is detected.

FIG. 3 depicts an illustrative entropy graph 300 which is substantiallysimilar to an embodiment of the entropy graph discussed above withregard to privacy analyzer 204 of FIG. 2. Entropy graph 300 includescounter values on the y-axis and a number of different domains on thex-axis, however, any suitable information may be on the x-axis. Forexample, any of the types of metadata extracted by metadata extractor202 may be used for the x-axis. For illustrative purposes, entropy graph300 is associated with an organization, however, graph 300 may beassociated with a particular user. Target company domain 302 is onedomain entry on the x-axis of graph 300. For example, the target companyis a company that the organization is investigating as a target for apossible merger. As illustrated by graph 300, target company domain isassociated with a relatively high counter value. This can be due to manyusers in the organization's network accessing target company domain 302to conduct their diligence investigation. As further illustrated bygraph 300, DAS domain 304 also has a relatively high counter value. Thismay be because the DAS associated with DAS domain 304 is activelytracking the organization's web activities and/or metadata extractor 202has encountered a relatively large number of communications associatedwith DAS domain 304. In this illustration, DAS domain 304's countervalue has crossed threshold 306. Threshold 306 may be substantiallysimilar to the thresholds discussed above with regard to privacyanalyzer 204. For example, threshold 306 may refer to the maximumdifference between one counter and the average counter value. BecauseDAS domain 304's counter value is above threshold 306, privacy analyzer204 will issue a notification to obfuscation mechanism 208 thatindicates that the DAS associated with DAS domain 304 has acquired asignificant amount of the organization's aggregate web usage; which inturn, may allow the DAS to determine whether the organization has anintent with regard to the target company associated with target companydomain 302. The notification may also indicate that the DAS associatedwith DAS domain 304 might be able to determine that there has been a lotof web activity within the organization regarding the target companybased on the relatively high counter value associated with targetcompany domain 302, which thus indicates that the secrecy of thepossible merger could be jeopardized. As noted above, in someembodiments, obfuscation mechanism 208 will initiate information leakagemitigation techniques upon receiving the indication from privacyanalyzer 204.

FIG. 4 shows illustrative process 400 for monitoring information leaks.At step 402, outgoing traffic is received by, for example, informationleakage monitoring and mitigation system 200 of FIG. 2. The outgoingtraffic may be traffic that originated in secure network 102 of FIG. 1which is bound for the Internet. At step 404, metadata is extracted fromthe outgoing traffic received at step 402. The metadata extraction maybe performed by metadata extractor 202 of FIG. 2. As step 406, a counterassociated with the extracted metadata is incremented. The counter maybe used to update an entropy graph and/or an entropy value. As notedabove with regard to FIG. 2, the counter may be associated with anysuitable metadata that allows the system to monitor for possibleinformation leaks. In some embodiments, the counter information may bestored in a database, such as database 206 of FIG. 2.

At step 408, it is determined whether the counter incremented at step406 has exceeded a threshold, such as threshold 306 of FIG. 3. If thecounter has not exceeded the threshold, process 400 proceeds back tostep 402 to receive more outgoing traffic. If the counter has exceededthe threshold, process 400 proceeds to step 410. At step 410,information leakage mitigation techniques are initiated, for example,the information leakage mitigation techniques discussed above withregard to obfuscation mechanism 208 of FIG. 2.

In practice one or more steps shown in process 400 may be combined withother steps, performed in any suitable order, performed in parallel(e.g., simultaneously or substantially simultaneously), or removed. Forexample, in some embodiments, the information leakage monitoring andmitigation system 200 will continue to receive outgoing traffic at step402 while simultaneously performing information leakage mitigationtechniques at step 410. Process 400 may be implemented user any suitablecombination of hardware and/or software in any suitable fashion.

FIG. 5 shows illustrative process 500 for mitigating information leakswhich may be performed using, for example, obfuscation mechanism 208 ofFIG. 2. As noted above with regard to FIG. 2, third party observers,such as a DAS, generally use algorithms that determine the similarity ofusers based on their respective web activity. These similarity analysisalgorithms can be reversed to derive web behavior (e.g., neutralizingweb information) that will make the users appear less similar. Byreversing the similarity analysis algorithms, obfuscation mechanism 208can determine the substantially most efficient neutralizing web activitythat would obscure an organization's targeted web activity, and thus,the organization can obscure its targeted web activity using less dataand bandwidth than would otherwise be possible (e.g., by using randomweb information).

To derive the neutralizing web information, process 500 begins at step502 to generate a similarity matrix that is representative of thesimilarity between an organization's users. The organization'ssimilarity matrix can be generated based on monitored web traffic, suchas the traffic monitored by privacy analyzer 204. This similarity matrixis an estimate of a similarity matrix that may be derived by a thirdparty observer, such as a DAS. The similarity matrix is generally amatrix that includes a similarity index value at each coordinate thatindicates how similar one user is to the other, where a 0 valueindicates completely dissimilar and a 1 value indicates completelyidentical. For example, a value of 0.7 at coordinate 1, 150 indicatesthat users 1 and 150 are about 70% similar. As a further example, avalue of 0.15 at coordinate 2, 30 indicates that users 2 and 30 areabout 15% similar. In some embodiments, the similarity matrix includesdata from exemplary, and/or model users, where the exemplary and modelusers may be associated with neutral web activity (e.g., web activitythat is not directly related to the intent of the organization). In someembodiments, the organization's similarity matrix may be based at leastin part on the users' search behavior, click paths, subscriptions, andrelationship tags (e.g., friends or subscriptions in social networkingwebsites). Also, website dwell time, user provided connections, such as,location, age, income, and payment methods as well as common searchhistory and/or web surfing patterns may be used. It should be noted thatany suitable similarity algorithm may be utilized without departing fromthe scope of this disclosure.

After generating the organization's similarity matrix, obfuscationmechanism may compare the similarity matrix to a set of obfuscationconstraints to determine whether the similarity matrix meets theconstraints and/or whether it will be possible to modify the similaritymatrix to meet the constraints. For example, one obfuscation constraintmay be a maximum similarity index value limit between different users.As another example, one obfuscation constraint may be that the usersshould appear to be more similar to one of the exemplary users whose webactivity is unrelated or broader than the organization's web activitythat is associated with the organization's intent. For example, most ofthe organization's web activity may be centered around company A, but anexemplary user's web activity may be centered around company B. As such,if the organization's web activity were changed to be more similar tothe exemplary user, a DAS would have trouble determining that theorganization has some intent with regard to company A and instead mightdiscern that the organization has some intent with regard to company B.In some embodiments, the obfuscation constraints are predetermined. Insome embodiments, the obfuscation constraints are determinedautomatically by obfuscation mechanism 208 after receiving thenotification from privacy analyzer 204 and determining the makeup of theorganization's similarity matrix. For example, privacy analyzer 204might indicate that the organization's web usage is centered around aparticular website. Obfuscation mechanism 208 may then determineobfuscation constraints that relate to web usage centered around adifferent website or an increased entropy of the aggregateorganization's web usage.

If the organization's similarity matrix does not meet the obfuscationconstraints, obfuscation mechanism 208 provides a group of desiredsimilarity matrices that do meet the constraints. These desiredsimilarity matrices may be predetermined and stored in, for example,database 206. In some embodiments, the desired similarity matrices arederived by obfuscation mechanism 208 based on the obfuscationconstraints. As an example, a desired similarity matrix can be anidentity matrix, which represents that every user is only similar tothemselves and has no similarity to any other user. Another desiredsimilarity matrix may be a matrix where the organization's users aremost similar to a neutral user whose web activity is centered aroundneutral behavior. In some embodiments, the desired similarity matricesrepresent valid behavioral states. For example, an identity similaritymatrix may not be a plausible state of an organization's web activitybecause some users will always be at least a little similar to eachother. Additionally, or alternatively, the desired similarity matricesmay be close to the organization's similarity matrix. For example, arelatively small number of neutralizing actions would be necessary tomove the organization's similarity matrix to the desired similaritymatrix. In some embodiments, the desired similarity matrices are withinthe same ordering region as the organization's similarity matrix. Forexample, the organization's similarity matrix may map to a rankingvector (e.g., a vector that ranks the users in the similarity matrix)whose components are ordered in a particular manner. The desiredsimilarity matrices would also map to ranking vectors that are orderedin the same manner. In some embodiments, the ranking vectors are theeigenvectors of their respective similarity matrices. In someembodiments, the ranking vectors are the eigenvectors of theirrespective similarity matrices that are associated with their respectivelargest eigenvalues.

Once the desired similarity matrices are determined, process 500proceeds to step 504 where distance matrices are generated thatrepresent the distance between the organization's similarity matrix andthe respective desired similarity matrices. The distance matrices may bedetermined from the difference in similarity index values, the sum ofsquares, or any other suitable distance metric. In some embodiments,distance matrices are determined for each of the desired similaritymatrices. These distance matrices provide information as to how far theorganization's similarity matrix is from a desired similarity matrix.

At step 506, a gradient descent calculation is performed on the distancematrices to determine on which user in the organization's similaritymatrix a neutralizing action will have the greatest neutralizing effect.For example, the gradient descent can determine the steepest descentfrom the organization's similarity matrix to a desired similaritymatrix, where the steepest descent may be associated with the webactivities of a particular user. In some embodiments, the gradientdescent is performed for each of the different distance matrices thatare derived from the different desired similarity matrices. In someembodiments, the gradient descent for each of the distance matrices isperformed in parallel.

After performing the gradient descent, process 500 proceeds to step 508where a candidate action is selected from a set of candidate actions.The candidate actions may identify specific queries, links, and/oractions individuals and organizations could take to neutralize theirprior web searches and activity. For example, a candidate action maycontain information on specific searches to execute, configurations,certain web pages to visit, or other web activities to perform. In someembodiments, the candidate actions may be associated with a behaviorand/or a website. A user's targeted web activity can be neutralized byperforming a candidate action behavior on the associated website, suchthat when the behavior is performed on the associated website by aparticular user, the action may make the user more similar to a neutraluser. For example, obfuscation mechanism 208 may emulate a candidateaction such that it appears that a user(s) associated with the steepestdescent, as determined by the gradient descent, performed the candidateaction. In some embodiments, obfuscation mechanism 208 may have a numberof candidate actions available to use as neutralizing web activity. Theparticular candidate action may be selected at random or according to apriority level of actions to select. For example, each candidate actionmay be associated with a priority level that indicates how likely thecandidate action is to modify an organization's similarity matrix to adesired similarity matrix. Obfuscation mechanism 208 may store theselected candidate actions in database 206 after selecting therespective candidate action. In some embodiments, obfuscation mechanism208 associates the selected candidate actions with the respectivedistance matrix (e.g., the distance matrices associated with therespective desired similarity matrices) so that obfuscation mechanism208 can distinguish which candidate action was selected for whichdesired similarity matrix.

After selecting the candidate action, process 500 proceeds to step 510to modify the monitored web traffic based on the selected candidateaction. For example, obfuscation mechanism 208 may modify the datamonitored by privacy analyzer 204. In some embodiments, obfuscationmechanism 208 maintains multiple copies of the modified monitored webtraffic, where each copy is associated with a different gradient descentcalculation and/or different desired similarity matrix. Once the webtraffic is modified according to the selected candidate action, process500 proceeds to step 512 to recalculate the organization's similaritymatrix based on the modified traffic. In some embodiments, obfuscationmechanism 208 may maintain multiple versions of recalculatedorganization similarity matrices, where each version is associated witha different gradient descent calculation and/or different desiredsimilarity matrix.

After recalculating the organization's similarity matrix, process 500proceeds to step 514 where it is determined whether the recalculatedorganization similarity matrix meets the obfuscation constraintsdiscussed above with regard to step 504. If the recalculatedorganization similarity matrix does not meet the constraints, process500 iterates back to step 506 to perform a new gradient descent on therecalculated organization similarity matrix and determine additionalcandidate actions that may be taken in an attempt to obscure theorganization's targeted web activity. In some embodiments, process 500will not iterate back to step 506 if process 500 has already iterated amaximum number of iterations, it is determined that the organization'ssimilarity matrix will not meet the obfuscation constraints, and/or amaximum number of iterations have been performed where the candidateactions chosen made only a marginal difference in the organization'ssimilarity matrix. In such embodiments, process 500 may simply endwithout determining effective neutralizing web information or mayrandomly restart. For example, if the neutralizing effect is small forsuccessive iterations, process 500 may randomly restart to avoid a localminima in the gradient descent. In some embodiments, process 500 mayrandomly restart with an organization's similarity matrix that includessome or all of the web traffic modifications made before the restart.

If a recalculated organization similarity matrix does meet theconstraints, process 500 proceeds to step 516 where web traffic isgenerated. For example, obfuscation mechanism 208 can generate webtraffic according to the candidate actions that were used to modify therecalculated organization similarity matrix. As noted above, thecandidate actions may be stored in database 206 and associated with therespective modified similarity matrix. Obfuscation mechanism 208 cangenerate the web traffic with spoofed IP or MAC addresses of users inthe organization or fictitious users.

In practice one or more steps shown in process 500 may be combined withother steps, performed in any suitable order, performed in parallel(e.g., simultaneously or substantially simultaneously), or removed. Insome embodiments, process 500 may be performed in parallel for differentdesired similarity matrices and/or different set of candidate actions.Process 500 may be implemented user any suitable combination of hardwareand/or software in any suitable fashion.

The invention may be embodied in other specific forms without departingfrom the spirit or essential characteristics thereof. For example, theprocesses disclosed herein for monitoring and mitigating informationleaks may be equally applied to networks and/or systems of any suitablesize and configured in any suitable manner. As another example, in theembodiments described above, any reference to web traffic is equallyapplicable to web usage information, web activity, and/or webinformation and vice versa. The foregoing embodiments are therefore tobe considered in all respects illustrative, rather than limiting of theinvention.

1. A method for determining whether a third party observer coulddetermine that an organization has an intent with respect to subjectmatter, the method comprising: collecting data in transit between thegroup of users and Internet-connected elements associated with aplurality of third party observers; extracting metadata from thecollected data; processing the extracted metadata to identifyinformation each of the plurality of third party observers has receivedfrom the organization; and determining, based on the processed extractedmetadata, that at least one of the third party observers has receivedsufficient information from the organization to determine that theorganization has an intent with respect to a particular subject matter.2. The method of claim 1, wherein the data in transit is collected froma position in the network where network communications are consolidated.3. The method of claim 1, further comprising: incrementing a value of acounter of a plurality of counters based on the extracted metadata,wherein each of the plurality of counters is associated with each of theplurality of third party observers, and wherein the determination thatthe at least one third party observer has received sufficientinformation to determine that the organization has an intent withrespect to a particular subject matter is based on the relative valuesof the plurality of counters.
 4. The method of claim 1, furthercomprising: determining, based on the extracted metadata, whatinformation the at least one third party observer has acquired about thegroup of users.
 5. The method of claim 1, further comprising:identifying the at least one third party observer based on the extractedmetadata.
 6. The method of claim 1, further comprising: generating anentropy graph based on the extracted metadata, wherein the determinationthat the at least one third party observer has received sufficientinformation to determine that the organization has an intent withrespect to a particular subject matter is based on peaks in the entropygraph.
 7. The method of claim 1, wherein the determination that the atleast one third party observer has received sufficient information todetermine that the organization has an intent with respect to aparticular subject matter is based on distance metrics that arecalculated with respect to the extracted metadata.
 8. The method ofclaim 1, wherein the extracted metadata includes at least one of HTTPcookies, HTML meta tags, the times at which application transactionsoccur, URLs that are accessed, IP addresses, and MAC addresses.
 9. Asystem for determining whether a third party observer could determinethat an organization has an intent with respect to subject matter, thesystem comprising: metadata extracting circuitry configured to: collectdata in transit between the group of users and Internet-connectedelements associated with a plurality of third party observers, and aextract metadata from the collected data; and privacy analyzingcircuitry configured to: processing the extracted metadata to identifyinformation each of the plurality of third party observers has receivedfrom the organization; and determine, based on the processed extractedmetadata, that at least one of the third party observers has receivedsufficient information from the organization to determine that theorganization has an intent with respect to a particular subject matter.10. The system of claim 9, wherein the metadata extractor is positionedwithin the network at a point where network communications areconsolidated.
 11. The system of claim 9, wherein the privacy analyzingcircuitry is further configured to: maintain a plurality of countersassociated with each of the plurality of third party observers, andincrement a value of a respective counter of the plurality of countersbased on the extracted metadata, wherein the determination that the atleast one third party observer has received sufficient information todetermine that the organization has an intent with respect to aparticular subject matter is based on the relative values of theplurality of counters.
 12. The system of claim 9, wherein the privacyanalyzing circuitry is further configured to determine, based on theextracted metadata, what information the at least one third partyobserver has acquired about the group of users.
 13. The system of claim9, wherein the privacy analyzing circuitry is further configured toidentify the at least one third party observer based on the extractedmetadata.
 14. The system of claim 9, wherein the privacy analyzingcircuitry is further configured to generate an entropy graph based onthe extracted metadata, wherein the determination that the at least onethird party observer has received sufficient information to determinethat the organization has an intent with respect to a particular subjectmatter is based on peaks in the entropy graph.
 15. The system of claim9, wherein the determination that the at least one third party observerhas received sufficient information to determine that the organizationhas an intent with respect to a particular subject matter is based ondistance metrics that are calculated with respect to the extractedmetadata.
 16. The system of claim 9, wherein the extracted metadataincludes at least one of HTTP cookies, HTML meta tags, the times atwhich application transactions occur, URLs that are accessed, IPaddresses, and MAC addresses.
 17. A computer readable medium storingcomputer executable instructions, which, when executed by a processor,cause the processor to carryout a method for determining whether a thirdparty observer could determine that an organization has an intent withrespect to subject matter, the computer readable medium comprising:collecting data in transit between the group of users andInternet-connected elements associated with a plurality of third partyobservers; extracting metadata from the collected data; processing theextracted metadata to identify information each of the plurality ofthird party observers has received from the organization; anddetermining, based on the processed extracted metadata, that at leastone of the third party observers has received sufficient informationfrom the organization to determine that the organization has an intentwith respect to a particular subject matter.
 18. A method for obscuringan existence of an intent of an organization with respect to subjectmatter, the method comprising: generating an organization's similaritymatrix based on the organization's web usage information; providing adesired similarity matrix that meets an obfuscation constraint;generating a distance matrix based on the organization's similaritymatrix and the desired similarity matrix; selecting a candidate actionfrom a plurality of candidate actions based on the distance matrix,wherein the selected candidate action includes web behaviors that wouldmake the organization's similarity matrix more similar the desiredsimilarity matrix; modifying the organization's similarity matrix basedon the candidate action; and determining whether the modifiedorganization's similarity matrix meets the obfuscation constraint. 19.The method of claim 18, further comprising iterating the selecting thecandidate action and modifying the organization's similarity matrixuntil the modified organization's similarity matrix meets theobfuscation constraint.
 20. The method of claim 18, further comprisingiterating the selecting the candidate action and modifying theorganization's similarity matrix until the number of iterations reachesa maximum number of iterations.
 21. The method of claim 18, wherein thecandidate action is selected based on a gradient descent calculation onthe distance matrix.
 22. The method of claim 18, further comprising:generating neutralizing web activity based on the selected candidateaction.
 23. The method of claim 22, wherein the candidate actionincludes a website and a behavior to perform on the website and thegenerated web activity is based on the performance of the behavior. 24.The method of claim 22, wherein the web activity is generated with aspoofed address associated with a user in the organization.
 25. Themethod of claim 18, wherein the obfuscation constraint sets a maximumsimilarity index value for the organization's similarity matrix.
 26. Asystem for obscuring an existence of an intent of an organization withrespect to subject matter, the system comprising: obfuscating circuitryconfigured to: generate an organization's similarity matrix based on theorganization's web usage information; provide a desired similaritymatrix that meets a obfuscation constraint; generate a distance matrixbased on the organization's similarity matrix and the desired similaritymatrix; select a candidate action from a plurality of candidate actionsbased on the distance matrix, wherein the selected candidate actionincludes web behaviors that would make the organization's similaritymatrix more similar the desired similarity matrix; modify theorganization's similarity matrix based on the candidate action; anddetermine whether the modified organization's similarity matrix meetsthe obfuscation constraint.
 27. The system of claim 26, wherein theobfuscating circuitry is further configured to iterate the selecting thecandidate action and modifying the organization's similarity matrixuntil the modified organization's similarity matrix meets theobfuscation constraint.
 28. The system of claim 26, wherein theobfuscating circuitry is further configured to iterate the selecting thecandidate action and modifying the organization's similarity matrixuntil the number of iterations reaches a maximum number of iterations.29. The system of claim 26, wherein the candidate action is selectedbased on a gradient descent calculation on the distance matrix.
 30. Thesystem of claim 26, wherein the obfuscating circuitry is furtherconfigured to generate neutralizing web activity based on the selectedcandidate action.
 31. The system of claim 30, wherein the candidateaction includes a website and a behavior to perform on the website andthe generated web activity is based on the performance of the behavior.32. The system of claim 30, wherein the web activity is generated with aspoofed address associated with a user in the organization.
 33. Thesystem of claim 26, wherein the obfuscation constraint sets a maximumsimilarity index value for the organization's similarity matrix.
 34. Acomputer readable medium storing computer executable instructions,which, when executed by a processor, cause the processor to carryout amethod for obscuring an existence of an intent of an organization withrespect to subject matter, the computer readable medium comprising:generating an organization's similarity matrix based on theorganization's web usage information; providing a desired similaritymatrix that meets a obfuscation constraint; generating a distance matrixbased on the organization's similarity matrix and the desired similaritymatrix; selecting a candidate action from a plurality of candidateactions based on the distance matrix, wherein the selected candidateaction includes web behaviors that would make the organization'ssimilarity matrix more similar the desired similarity matrix; modifyingthe organization's similarity matrix based on the candidate action; anddetermining whether the modified organization's similarity matrix meetsthe obfuscation constraint.