CN109308330A - The method of enterprise's leakage information extraction, analysis and classification Internet-based - Google Patents
The method of enterprise's leakage information extraction, analysis and classification Internet-based Download PDFInfo
- Publication number
- CN109308330A CN109308330A CN201810821897.2A CN201810821897A CN109308330A CN 109308330 A CN109308330 A CN 109308330A CN 201810821897 A CN201810821897 A CN 201810821897A CN 109308330 A CN109308330 A CN 109308330A
- Authority
- CN
- China
- Prior art keywords
- enterprise
- information
- key message
- data
- internet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention belongs to network environment Security Construction technical fields, specifically disclose a kind of method and system that enterprise Internet-based reveals information extraction, analyzes classification, wherein method includes: S1: the data information in crawler capturing leaking data channel;S2: using enterprise's keyword as search condition, the data information comprising enterprise's keyword is extracted from the data information obtained in S1 as key message;S3: duplicate removal merger processing is carried out to the key message obtained in S2, and establishes the parallel relationship between each key message, obtains key message group;S4: the key message group obtained in S3 is shown by visualization interface.By above-mentioned internet grasping means, the important reference that enterprise divulges information is provided, helps enterprise to cope with the attack being likely to occur in time, and can also effective guarantee employee information safety.
Description
Technical field
The invention belongs to network environment Security Construction technical fields, and in particular to a kind of enterprise's leakage letter Internet-based
The method and system that breath extracts, analysis is classified.
Background technique
With universal and dependence of the people to internet of Internet application, the safety problem of internet is also increasingly prominent.
Rogue program, all kinds of fishing and fraud continue to keep rapid growth, while hacker attack and large-scale leakage of personal information thing
Part takes place frequently, and increases substantially with various network attacks associated, be a large amount of netizen's personal information leakage and property loss it is continuous
Increase.According to public information, 2011 so far, and existing 11.27 hundred million user privacy informations are leaked.Including essential information, equipment
Information, account information, privacy information, social relationships information and network behavior information etc..
The leakage of personal information is also stepped up the harm of enterprise, thus enterprise information security construction demand also with
Increase.By analysis it is found that the behavior of company information leakage at present is divided into two parts reason: first is that based on enterprise caused by loophole
Industry data are stolen by hacker, and then are hacked the case where production is actively sold using the case where peddling or intra-enterprise business personnel;
Second is that intentionally or being not intended to voluntarily propagate identity letter on network since enterprise staff is due to lacking awareness of safety and technological means
Leakage caused by breath, for example leaked being similar to identity information caused by microblogging social platform, the caused code on Github
Mailbox even encrypted message leaks, and sensitive data etc. is remained in all kinds of document repositories.
Solving the problems, such as part is capable of by internal vulnerability monitoring and personnel's control in enterprise of first part, there is certain solution
Certainly thinking and product, and it is not fine at present for second part leakage behavior as caused by the consciousness of employee itself is weak
Monitoring and resolving ideas.Hacker has exactly carried out a large amount of attack using the leak data of this part, causes to enterprise
Very big influence.And enterprises can not cope with the external number as caused by employee itself behavior by disposing Protection Product
According to leakage problem.How the enterprise staff information revealed in discovery internet automated by technological means, is looked forward in time for emphasis
Industry blocks hidden danger, and oneself becomes an important content of assessment business risk.
Therefore, against the above deficiency, present invention urgent need provides a kind of enterprise Internet-based leakage information extraction, analysis
The method and system of classification.
Summary of the invention
The purpose of the present invention is to provide a kind of enterprise Internet-based leakage information extraction, analysis classification method and
System, to solve the problems, such as to increase because company information is not intended to business risk caused by revealing in the prior art.
On the one hand, the present invention provides the method for a kind of enterprise Internet-based leakage information extraction, analysis and classification,
The following steps are included:
S1: the data information in crawler capturing leaking data channel;
S2: it using enterprise's keyword as search condition, extracts from the data information obtained in S1 and is closed comprising the enterprise
The data information of key word is as key message;
S3: carrying out duplicate removal merger processing to the key message obtained in S2, and establishes the pass in parallel between each key message
System, obtains key message group;
S4: the key message group obtained in S3 is shown by visualization interface.
The method of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably,
In S1, the leaking data channel includes that enterprise official website, internet search engine, social media, Github, cloud disk, document exist
One of line sharing platform is a variety of.
The method of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably,
In S2, enterprise's keyword include one of enterprise's mailbox, enterprise domain name, enterprise phone, enterprise staff identity information or
It is a variety of;The enterprise staff identity information includes: name, contact method, job information.
The method of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably,
The parallel relationship includes: the corresponding relationship between the account and password of enterprise's mailbox;Enterprise's mailbox and enterprise staff identity are believed
Corresponding relationship between breath;Name in enterprise staff identity information, contact method, the corresponding relationship between job information.
The method of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably,
In S4 step, the exhibition method of the key message group includes: to believe by the classification displaying of displaying condition, data of enterprise's keyword
Breath grabs one of the classification displaying in source, the displaying of leaking data time-sequencing or a variety of.
The method of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably,
The displaying content of the key message group include: leaking data time statistical graph, data information crawl source statistic chart, with
Enterprise's keyword is the statistical graph of displaying condition, and the statistical graph of the key message group includes: histogram, cake chart, section
Point diagram.
On the other hand, the present invention also provides a kind of enterprise's leakage information extraction, analysis and classification Internet-based
System, for realizing enterprise Internet-based described in above-mentioned any one leakage information extraction, analysis and classification method,
Include:
System support layer, for supporting crawler capturing and data cached information;
System interface, for Interworking Data leakage channel and the leak data information processing platform;The leak data information
Processing platform is for handling the data information crawled;
Kernel business tier, the kernel business tier include crawl scheduler module, and the crawl scheduler module is for grabbing institute
The data information in leaking data channel is stated, extracts key message in the data information grabbed, and by the key
Information butt joint is handled to the leakage information data processing platform, to obtain key message group;The crawl scheduler module
To be multiple, each crawl scheduler module is corresponding with a leaking data channel;
Presentation layer, the key message group shown for visualization interface.
The system of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably,
The crawl scheduler module include crawl search engine scheduler module, crawl microblogging scheduler module, crawl github scheduler module,
Grab one of social network sites scheduler module module or a variety of.
The system of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably,
It further include instruction module, described instruction module is set to presentation layer and connect respectively with multiple crawl scheduler module signals,
For assigning work order.
The system of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably,
The system support layer includes redis database, mysql database, and the mysql database is suitable for storage enterprise's keyword letter
Breath, the redis database are used to store the data cached data information with crawler capturing of presentation layer.
The present invention has the advantage that compared with prior art
The method and system that the invention discloses a kind of enterprises Internet-based to reveal information extraction, analysis is classified,
Middle method includes: S1: the data information in crawler capturing leaking data channel;S2: using enterprise's keyword as search condition, from
The data information comprising enterprise's keyword is extracted in the data information obtained in S1 as key message;S3: to being obtained in S2
The key message taken carries out duplicate removal merger processing, and establishes the parallel relationship between each key message, obtains key message group;
S4: the key message group obtained in S3 is shown by visualization interface.By above-mentioned internet grasping means, enterprise is provided
The important reference that industry divulges information helps enterprise to cope with the attack being likely to occur in time, and can also effective guarantee
Employee information safety.
Detailed description of the invention
Fig. 1 is a kind of flow chart that enterprise Internet-based reveals information extraction, analyzes the method classified in the present invention;
Fig. 2 is a kind of schematic diagram that enterprise Internet-based reveals information extraction, analyzes the system classified in the present invention;
Fig. 3 is the network topological diagram of system in Fig. 2.
Specific embodiment
Technical solution of the present invention is clearly and completely described below in conjunction with attached drawing, it is clear that described implementation
Example is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill
Personnel's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical",
The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to
Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation,
It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ",
" third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
As shown in Figure 1, present embodiment discloses the sides that a kind of enterprise Internet-based reveals information extraction, analysis classification
Method, this method comprises the following steps: S1: the data information in crawler capturing leaking data channel;S2: using enterprise's keyword as
Search condition extracts the data information comprising enterprise's keyword as key message from the data information obtained in S1;
S3: duplicate removal merger processing is carried out to the key message obtained in S2, and establishes the parallel relationship between each key message, is closed
Key information group;S4: the key message group obtained in S3 is shown by visualization interface.Currently, leaking data channel includes
But it is not limited to enterprise official website, internet search engine, social media, Github, cloud disk, the online sharing platform of document (i.e. text
Library), and have in the online sharing platform of document including disclosed word document, excel table and ppt document, therefore in S1, crawler
It needs to cover above-mentioned various channels when crawl, carries out the crawler capturing of data respectively.
In S2, used enterprise's keyword includes but is not limited to: enterprise's mailbox, enterprise domain name, enterprise phone, enterprise person
Work identity information, enterprise staff identity information include: name, contact method, job information.
In S3, parallel relationship includes: the corresponding relationship between the account and password of enterprise's mailbox;Enterprise's mailbox and enterprise person
Corresponding relationship between work identity information;Name in enterprise staff identity information, contact method, corresponding between job information are closed
System.Then above-mentioned key message group is grabbed into source according to by the classification displaying of displaying condition, data information of enterprise's keyword
A displaying is selected in the various ways such as classification is shown, leaking data time-sequencing is shown;And it shows content when including: leaking data
Between statistical graph, data information crawl source statistic chart, using enterprise's keyword as the statistical graph of displaying condition, key message
The statistical graph of group includes: histogram, cake chart, node diagram.
As shown in Fig. 2, further, the invention also discloses a kind of enterprises Internet-based for the above method to let out
Reveal the system of information extraction, analysis and classification, is mentioned for realizing the enterprise Internet-based leakage information of above-mentioned any one
The method for taking, analyzing and classifying comprising: system support layer, for supporting crawler capturing and data cached information;System connects
Mouthful, for Interworking Data leakage channel and the leak data information processing platform;The leak data information processing platform for pair
The data information crawled is handled;Kernel business tier, the kernel business tier include crawl scheduler module, the crawl scheduling
Module is used to grab the data information in the leaking data channel, and crucial letter is extracted in the data information grabbed
Breath, and the key message is docked to the leakage information data processing platform and is handled, to obtain key message group;Institute
State crawl scheduler module be it is multiple, each crawl scheduler module is corresponding with a leaking data channel;Presentation layer, being used for can
The key message group obtained depending on changing showing interface.
In above system, system support layer is mainly used for providing memory space, to support crawler to crawl and cache.This implementation
Example in, storage content include three parts: enterprise's essential information, leak data information and by enterprise's keyword extraction simultaneously
By the key message for display of post-processing.After system is opened, is inputted, opened based on enterprise's keyword of typing
Dynamic docker environment and redis, mysql are to support crawler and caching, wherein enterprise's keyword message is stored in mysql, exhibition
Show that layer is data cached and be stored in REDIS, reveals information data storing in mysql and ES.
System interface is for being docked to existing network platform and leakage information data processing platform.This system passes through
The api interface of RESTFUL format realizes docking, the data letter that crawler capturing takes from existing network platform, that is, leaking data channel
Breath, and is transmitted by JSON format, data information include enterprise name, leakage type, source, source address, reveal information, when
Between field.It by ID export, is temporally exported to support various scenes, supporting simultaneously, this system also supports the importing of external data
Interface, to carry out deeper association analysis.
Kernel business tier includes multiple crawl scheduler modules, and multiple crawl scheduler modules include at least crawl search engine tune
Spend module, crawl microblogging scheduler module, crawl github scheduler module, crawl social network sites scheduler module module, above-mentioned crawl
Each one leaking data channel of correspondence of scheduler module grabs data information, such as crawl will be respectively started in crawl search engine module
Baidu, google, Microsoft must should wait TU task units, and it is micro- that crawl Sina weibo, Tencent will be respectively started in crawl microblogging scheduler module
It is rich to wait TU task units etc..Each TU task unit is concurrently executed by starting multiple worker task distributions by sidekip, each in this way
A each crawl TU task unit of module is mutually indepedent, is independent of each other, convenient for the exploitation and later maintenance of early period, O&M, and if
Later period is further added by picking unit, need to only write a TU task unit again and directly add just, starts multiple worker and goes crawl in this way
Crawl effect can be greatly improved, prevent single exception, guarantee that system being capable of long-term, stable operation when information is revealed in crawl.
Worker grabs the identifying code of object when grabbing information using pattern recognition technique, using proxy access around access frequency
The limitation such as rate.After grabbing content, extracted according to the keyword (mailbox, enterprise name, enterprise's mailbox, domain name etc.) of enterprise effective
Information is classified, re-scheduling, polymerization storage, classification according to mailbox feature be classified as mailbox leakage, according to be accounting features sort out
For account leakage, according to be code characteristic be classified as code leakage, according to be telephone feature be classified as phone leakage etc..Re-scheduling is
According to source, source address, one md5 value of category combinations as unique identification.The type of the information grabbed, source, source
Address, leakage information, time storage, use for presentation layer.
Presentation layer for visualization display treated information, use php development language, zenframework frame into
Row exploitation, php language is high-efficient with operation front end, deployment is simple, and more using php language development personnel, ties up conducive to the later period
The features such as shield, can save the cost of exploitation and maintenance.Be additionally provided with instruction module in presentation layer, instruction module respectively with multiple crawls
Scheduler module signal connection, for assigning work order.The function of presentation layer include: log in, password modification, enterprise's essential information
The modification of (enterprise's name, enterprise's mailbox, enterprise domain name, enterprise phone etc.) is deleted;Setting crawl frequency is simultaneously passed by instruction module
Crawl scheduler module is reached, crawl frequency can arbitrarily be arranged as needed, such as can such as be grabbed once daily, grab one per hour
Secondary or fixed point crawl;It reveals information to show, leakage information shows to include that classification (leakage mailbox, leakage account etc.) shows, grabs
Fetch source (enterprise official website, internet search engine, social media, Github etc.) filtering displaying, the arrangement exhibition of time positive sequence inverted order
Show and by searching for generally, business name search, mailbox search, telephonic searches are shown etc.;Reveal Information Statistics, leakage letter
Breath statistics includes: time statistics, and source statistic, type statistics, figure includes histogram, cake chart etc..It, can by above-mentioned setting
Very clear to know that the information when revealed is more, what categorical data leakage is maximum, and where is data dominant leakage.
Above system is equivalent to enterprise's leak data member library index, can carry out quick-searching.
As shown in figure 3, further, above system is that pc client server is relied on to realize that operator passes through service
Device open system, system open crawler timed task process, and the crawler capturing of leakage information is carried out to each leaking data channel, and
It is stored in system supporting layer, is shown after treatment by presentation layer.
Specifically, the invention also discloses the system process flows of above system:
1) typing: typing enterprise essential information is arranged enterprise's keyword (network address, mailbox, IP network section etc.), and then setting is grabbed
Take frequency;
2) it grabs: according to crawl frequency, periodically grabbing related enterprise's sensitive information from each data source;
3) parsing storage: the data information of crawl is classified, polymerize storage;
4) it shows: from data base querying data and showing.
In each leaking data channel of crawler capturing when data information, it can realize that search engine is asked by agency etc.
Topic can be solved the problems, such as access identifying code by stamp platform etc., can be logged in by simulation browser and the modes such as heartbeat detection
Crawler capturing object is logged in, cookie is extracted.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (10)
1. a kind of method of enterprise's leakage information extraction, analysis and classification Internet-based, which is characterized in that including following step
It is rapid:
S1: the data information in crawler capturing leaking data channel;
S2: using enterprise's keyword as search condition, extracting from the data information obtained in S1 includes enterprise's keyword
Data information as key message;
S3: duplicate removal merger processing is carried out to the key message obtained in S2, and establishes the parallel relationship between each key message, is obtained
To key message group;
S4: the key message group obtained in S3 is shown by visualization interface.
2. the method for enterprise's leakage information extraction, analysis and classification Internet-based according to claim 1, feature
It is,
In S1, the leaking data channel includes enterprise official website, internet search engine, social media, Github, cloud disk, text
One of online sharing platform of shelves is a variety of.
3. the method for enterprise's leakage information extraction, analysis and classification Internet-based according to claim 1, feature
It is,
In S2, enterprise's keyword includes enterprise's mailbox, enterprise domain name, enterprise phone, one in enterprise staff identity information
Kind is a variety of;The enterprise staff identity information includes: name, contact method, job information.
4. the method for enterprise's leakage information extraction, analysis and classification Internet-based according to claim 3, feature
It is,
The parallel relationship includes: the corresponding relationship between the account and password of enterprise's mailbox;Enterprise's mailbox and enterprise staff body
Corresponding relationship between part information;Name in enterprise staff identity information, contact method, the corresponding relationship between job information.
5. the method for enterprise's leakage information extraction, analysis and classification Internet-based according to claim 1, feature
It is,
In S4 step, the exhibition method of the key message group includes: to show, count using enterprise's keyword as the classification of displaying condition
According to the classification displaying in information scratching source, leaking data time-sequencing show one of or it is a variety of.
6. the method for enterprise's leakage information extraction, analysis and classification Internet-based according to claim 5, feature
It is,
The displaying content of the key message group includes: leaking data time statistical graph, data information crawl source statistic figure
Table, using enterprise's keyword as the statistical graph of displaying condition, the statistical graph of the key message group includes: histogram, pie
Figure, node diagram.
7. a kind of system of enterprise's leakage information extraction, analysis and classification Internet-based, for realizing in claim 1-6
The method of enterprise Internet-based described in any one leakage information extraction, analysis and classification characterized by comprising
System support layer, for supporting crawler capturing and data cached information;
System interface, for Interworking Data leakage channel and the leak data information processing platform;The leak data information processing
Platform is for handling the data information crawled;
Kernel business tier, the kernel business tier include crawl scheduler module, and the crawl scheduler module is for grabbing the number
According to the data information in leakage channel, key message is extracted in the data information grabbed, and by the key message
It is docked to the leakage information data processing platform to be handled, to obtain key message group;The crawl scheduler module is more
A, each crawl scheduler module is corresponding with a leaking data channel;
Presentation layer, the key message group shown for visualization interface.
8. the system of enterprise's leakage information extraction, analysis and classification Internet-based according to claim 7, feature
It is,
The crawl scheduler module includes crawl search engine scheduler module, crawl microblogging scheduler module, crawl github scheduling
One of module, crawl social network sites scheduler module module are a variety of.
9. the system of enterprise's leakage information extraction, analysis and classification Internet-based according to claim 8, feature
It is,
It further include instruction module, described instruction module is set to presentation layer and connects respectively with multiple crawl scheduler module signals
It connects, for assigning work order.
10. the system of enterprise's leakage information extraction, analysis and classification Internet-based according to claim 7, special
Sign is,
The system support layer includes redis database, mysql database, and the mysql database is suitable for storing the enterprise of enterprise
Industry keyword message, the redis database are used to store the data cached data information with crawler capturing of presentation layer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810821897.2A CN109308330A (en) | 2018-07-24 | 2018-07-24 | The method of enterprise's leakage information extraction, analysis and classification Internet-based |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810821897.2A CN109308330A (en) | 2018-07-24 | 2018-07-24 | The method of enterprise's leakage information extraction, analysis and classification Internet-based |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109308330A true CN109308330A (en) | 2019-02-05 |
Family
ID=65225844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810821897.2A Pending CN109308330A (en) | 2018-07-24 | 2018-07-24 | The method of enterprise's leakage information extraction, analysis and classification Internet-based |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109308330A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110209901A (en) * | 2019-05-29 | 2019-09-06 | 四川长虹电器股份有限公司 | To the method for specific objective sensitive information monitoring on Github |
CN110334280A (en) * | 2019-07-10 | 2019-10-15 | 中国民航信息网络股份有限公司 | A kind of method and device of discovery confidential information leakage |
CN111026945A (en) * | 2019-12-05 | 2020-04-17 | 北京创鑫旅程网络技术有限公司 | Multi-platform crawler scheduling method and device and storage medium |
CN112417329A (en) * | 2020-10-19 | 2021-02-26 | 中国互联网金融协会 | Method and device for monitoring illegal internet foreign exchange deposit transaction platform |
CN113821754A (en) * | 2021-09-18 | 2021-12-21 | 上海观安信息技术股份有限公司 | Sensitive data interface crawler identification method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8359472B1 (en) * | 2010-03-25 | 2013-01-22 | Trend Micro Incorporated | Document fingerprinting with asymmetric selection of anchor points |
CN103888287A (en) * | 2013-12-18 | 2014-06-25 | 北京首都国际机场股份有限公司 | Information system integrated operation and maintenance monitoring service early warning platform and realization method thereof |
CN107577939A (en) * | 2017-09-12 | 2018-01-12 | 中国石油集团川庆钻探工程有限公司 | A kind of data leakage prevention method based on key technology |
CN108123933A (en) * | 2017-12-05 | 2018-06-05 | 南京南邮信息产业技术研究院有限公司 | Information leakage automatic monitoring method and system based on internet big data |
-
2018
- 2018-07-24 CN CN201810821897.2A patent/CN109308330A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8359472B1 (en) * | 2010-03-25 | 2013-01-22 | Trend Micro Incorporated | Document fingerprinting with asymmetric selection of anchor points |
CN103888287A (en) * | 2013-12-18 | 2014-06-25 | 北京首都国际机场股份有限公司 | Information system integrated operation and maintenance monitoring service early warning platform and realization method thereof |
CN107577939A (en) * | 2017-09-12 | 2018-01-12 | 中国石油集团川庆钻探工程有限公司 | A kind of data leakage prevention method based on key technology |
CN108123933A (en) * | 2017-12-05 | 2018-06-05 | 南京南邮信息产业技术研究院有限公司 | Information leakage automatic monitoring method and system based on internet big data |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110209901A (en) * | 2019-05-29 | 2019-09-06 | 四川长虹电器股份有限公司 | To the method for specific objective sensitive information monitoring on Github |
CN110334280A (en) * | 2019-07-10 | 2019-10-15 | 中国民航信息网络股份有限公司 | A kind of method and device of discovery confidential information leakage |
CN111026945A (en) * | 2019-12-05 | 2020-04-17 | 北京创鑫旅程网络技术有限公司 | Multi-platform crawler scheduling method and device and storage medium |
CN111026945B (en) * | 2019-12-05 | 2024-01-26 | 北京创鑫旅程网络技术有限公司 | Multi-platform crawler scheduling method, device and storage medium |
CN112417329A (en) * | 2020-10-19 | 2021-02-26 | 中国互联网金融协会 | Method and device for monitoring illegal internet foreign exchange deposit transaction platform |
CN113821754A (en) * | 2021-09-18 | 2021-12-21 | 上海观安信息技术股份有限公司 | Sensitive data interface crawler identification method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109308330A (en) | The method of enterprise's leakage information extraction, analysis and classification Internet-based | |
US11032312B2 (en) | Programmatic discovery, retrieval, and analysis of communications to identify abnormal communication activity | |
US11743294B2 (en) | Retrospective learning of communication patterns by machine learning models for discovering abnormal behavior | |
US11973772B2 (en) | Multistage analysis of emails to identify security threats | |
Sapienza et al. | Early warnings of cyber threats in online discussions | |
Mittal et al. | Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities | |
Le Sceller et al. | Sonar: Automatic detection of cyber security events over the twitter stream | |
CA3120469A1 (en) | Threat detection platforms for detecting, characterizing, and remediating email-based threats in real time | |
US20220394057A1 (en) | Investigation of threats using queryable records of behavior | |
CN108776671A (en) | A kind of network public sentiment monitoring system and method | |
US20140165195A1 (en) | Method and system for thwarting insider attacks through informational network analysis | |
US9667644B2 (en) | Risk identification | |
US9563770B2 (en) | Spammer group extraction apparatus and method | |
CN113556254B (en) | Abnormal alarm method and device, electronic equipment and readable storage medium | |
Nikiforova | Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first | |
Ali et al. | Framework for surveillance of instant messages | |
US20230396640A1 (en) | Security event management system and associated method | |
Ali et al. | Deceptive phishing detection system: from audio and text messages in instant messengers using data mining approach | |
CN113904828B (en) | Method, apparatus, device, medium and program product for detecting sensitive information of interface | |
Design of a network security audit system based on log data mining | ||
CA2804851A1 (en) | Monitoring communications | |
CN105468768A (en) | System monitoring method of WeChat public sentiment | |
CN113852641A (en) | Network attack tracing system, method and equipment based on graph database | |
Babu et al. | Examining Login URLS to Identify Phishing Threats | |
Nandhini et al. | An integrated approach to encompass Big data cloud adoption using data mining |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190205 |