CN109308330A - The method of enterprise's leakage information extraction, analysis and classification Internet-based - Google Patents

The method of enterprise's leakage information extraction, analysis and classification Internet-based Download PDF

Info

Publication number
CN109308330A
CN109308330A CN201810821897.2A CN201810821897A CN109308330A CN 109308330 A CN109308330 A CN 109308330A CN 201810821897 A CN201810821897 A CN 201810821897A CN 109308330 A CN109308330 A CN 109308330A
Authority
CN
China
Prior art keywords
enterprise
information
key message
data
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810821897.2A
Other languages
Chinese (zh)
Inventor
杨鹏
黄元飞
陈禹
张家旺
张晓娜
杜薇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Computer Network and Information Security Management Center
Original Assignee
National Computer Network and Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Computer Network and Information Security Management Center filed Critical National Computer Network and Information Security Management Center
Priority to CN201810821897.2A priority Critical patent/CN109308330A/en
Publication of CN109308330A publication Critical patent/CN109308330A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention belongs to network environment Security Construction technical fields, specifically disclose a kind of method and system that enterprise Internet-based reveals information extraction, analyzes classification, wherein method includes: S1: the data information in crawler capturing leaking data channel;S2: using enterprise's keyword as search condition, the data information comprising enterprise's keyword is extracted from the data information obtained in S1 as key message;S3: duplicate removal merger processing is carried out to the key message obtained in S2, and establishes the parallel relationship between each key message, obtains key message group;S4: the key message group obtained in S3 is shown by visualization interface.By above-mentioned internet grasping means, the important reference that enterprise divulges information is provided, helps enterprise to cope with the attack being likely to occur in time, and can also effective guarantee employee information safety.

Description

The method of enterprise's leakage information extraction, analysis and classification Internet-based
Technical field
The invention belongs to network environment Security Construction technical fields, and in particular to a kind of enterprise's leakage letter Internet-based The method and system that breath extracts, analysis is classified.
Background technique
With universal and dependence of the people to internet of Internet application, the safety problem of internet is also increasingly prominent. Rogue program, all kinds of fishing and fraud continue to keep rapid growth, while hacker attack and large-scale leakage of personal information thing Part takes place frequently, and increases substantially with various network attacks associated, be a large amount of netizen's personal information leakage and property loss it is continuous Increase.According to public information, 2011 so far, and existing 11.27 hundred million user privacy informations are leaked.Including essential information, equipment Information, account information, privacy information, social relationships information and network behavior information etc..
The leakage of personal information is also stepped up the harm of enterprise, thus enterprise information security construction demand also with Increase.By analysis it is found that the behavior of company information leakage at present is divided into two parts reason: first is that based on enterprise caused by loophole Industry data are stolen by hacker, and then are hacked the case where production is actively sold using the case where peddling or intra-enterprise business personnel; Second is that intentionally or being not intended to voluntarily propagate identity letter on network since enterprise staff is due to lacking awareness of safety and technological means Leakage caused by breath, for example leaked being similar to identity information caused by microblogging social platform, the caused code on Github Mailbox even encrypted message leaks, and sensitive data etc. is remained in all kinds of document repositories.
Solving the problems, such as part is capable of by internal vulnerability monitoring and personnel's control in enterprise of first part, there is certain solution Certainly thinking and product, and it is not fine at present for second part leakage behavior as caused by the consciousness of employee itself is weak Monitoring and resolving ideas.Hacker has exactly carried out a large amount of attack using the leak data of this part, causes to enterprise Very big influence.And enterprises can not cope with the external number as caused by employee itself behavior by disposing Protection Product According to leakage problem.How the enterprise staff information revealed in discovery internet automated by technological means, is looked forward in time for emphasis Industry blocks hidden danger, and oneself becomes an important content of assessment business risk.
Therefore, against the above deficiency, present invention urgent need provides a kind of enterprise Internet-based leakage information extraction, analysis The method and system of classification.
Summary of the invention
The purpose of the present invention is to provide a kind of enterprise Internet-based leakage information extraction, analysis classification method and System, to solve the problems, such as to increase because company information is not intended to business risk caused by revealing in the prior art.
On the one hand, the present invention provides the method for a kind of enterprise Internet-based leakage information extraction, analysis and classification, The following steps are included:
S1: the data information in crawler capturing leaking data channel;
S2: it using enterprise's keyword as search condition, extracts from the data information obtained in S1 and is closed comprising the enterprise The data information of key word is as key message;
S3: carrying out duplicate removal merger processing to the key message obtained in S2, and establishes the pass in parallel between each key message System, obtains key message group;
S4: the key message group obtained in S3 is shown by visualization interface.
The method of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably, In S1, the leaking data channel includes that enterprise official website, internet search engine, social media, Github, cloud disk, document exist One of line sharing platform is a variety of.
The method of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably, In S2, enterprise's keyword include one of enterprise's mailbox, enterprise domain name, enterprise phone, enterprise staff identity information or It is a variety of;The enterprise staff identity information includes: name, contact method, job information.
The method of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably, The parallel relationship includes: the corresponding relationship between the account and password of enterprise's mailbox;Enterprise's mailbox and enterprise staff identity are believed Corresponding relationship between breath;Name in enterprise staff identity information, contact method, the corresponding relationship between job information.
The method of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably, In S4 step, the exhibition method of the key message group includes: to believe by the classification displaying of displaying condition, data of enterprise's keyword Breath grabs one of the classification displaying in source, the displaying of leaking data time-sequencing or a variety of.
The method of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably, The displaying content of the key message group include: leaking data time statistical graph, data information crawl source statistic chart, with Enterprise's keyword is the statistical graph of displaying condition, and the statistical graph of the key message group includes: histogram, cake chart, section Point diagram.
On the other hand, the present invention also provides a kind of enterprise's leakage information extraction, analysis and classification Internet-based System, for realizing enterprise Internet-based described in above-mentioned any one leakage information extraction, analysis and classification method, Include:
System support layer, for supporting crawler capturing and data cached information;
System interface, for Interworking Data leakage channel and the leak data information processing platform;The leak data information Processing platform is for handling the data information crawled;
Kernel business tier, the kernel business tier include crawl scheduler module, and the crawl scheduler module is for grabbing institute The data information in leaking data channel is stated, extracts key message in the data information grabbed, and by the key Information butt joint is handled to the leakage information data processing platform, to obtain key message group;The crawl scheduler module To be multiple, each crawl scheduler module is corresponding with a leaking data channel;
Presentation layer, the key message group shown for visualization interface.
The system of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably, The crawl scheduler module include crawl search engine scheduler module, crawl microblogging scheduler module, crawl github scheduler module, Grab one of social network sites scheduler module module or a variety of.
The system of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably, It further include instruction module, described instruction module is set to presentation layer and connect respectively with multiple crawl scheduler module signals, For assigning work order.
The system of enterprise's leakage information extraction, analysis and classification Internet-based as described above, further preferably, The system support layer includes redis database, mysql database, and the mysql database is suitable for storage enterprise's keyword letter Breath, the redis database are used to store the data cached data information with crawler capturing of presentation layer.
The present invention has the advantage that compared with prior art
The method and system that the invention discloses a kind of enterprises Internet-based to reveal information extraction, analysis is classified, Middle method includes: S1: the data information in crawler capturing leaking data channel;S2: using enterprise's keyword as search condition, from The data information comprising enterprise's keyword is extracted in the data information obtained in S1 as key message;S3: to being obtained in S2 The key message taken carries out duplicate removal merger processing, and establishes the parallel relationship between each key message, obtains key message group; S4: the key message group obtained in S3 is shown by visualization interface.By above-mentioned internet grasping means, enterprise is provided The important reference that industry divulges information helps enterprise to cope with the attack being likely to occur in time, and can also effective guarantee Employee information safety.
Detailed description of the invention
Fig. 1 is a kind of flow chart that enterprise Internet-based reveals information extraction, analyzes the method classified in the present invention;
Fig. 2 is a kind of schematic diagram that enterprise Internet-based reveals information extraction, analyzes the system classified in the present invention;
Fig. 3 is the network topological diagram of system in Fig. 2.
Specific embodiment
Technical solution of the present invention is clearly and completely described below in conjunction with attached drawing, it is clear that described implementation Example is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill Personnel's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical", The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation, It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ", " third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
As shown in Figure 1, present embodiment discloses the sides that a kind of enterprise Internet-based reveals information extraction, analysis classification Method, this method comprises the following steps: S1: the data information in crawler capturing leaking data channel;S2: using enterprise's keyword as Search condition extracts the data information comprising enterprise's keyword as key message from the data information obtained in S1; S3: duplicate removal merger processing is carried out to the key message obtained in S2, and establishes the parallel relationship between each key message, is closed Key information group;S4: the key message group obtained in S3 is shown by visualization interface.Currently, leaking data channel includes But it is not limited to enterprise official website, internet search engine, social media, Github, cloud disk, the online sharing platform of document (i.e. text Library), and have in the online sharing platform of document including disclosed word document, excel table and ppt document, therefore in S1, crawler It needs to cover above-mentioned various channels when crawl, carries out the crawler capturing of data respectively.
In S2, used enterprise's keyword includes but is not limited to: enterprise's mailbox, enterprise domain name, enterprise phone, enterprise person Work identity information, enterprise staff identity information include: name, contact method, job information.
In S3, parallel relationship includes: the corresponding relationship between the account and password of enterprise's mailbox;Enterprise's mailbox and enterprise person Corresponding relationship between work identity information;Name in enterprise staff identity information, contact method, corresponding between job information are closed System.Then above-mentioned key message group is grabbed into source according to by the classification displaying of displaying condition, data information of enterprise's keyword A displaying is selected in the various ways such as classification is shown, leaking data time-sequencing is shown;And it shows content when including: leaking data Between statistical graph, data information crawl source statistic chart, using enterprise's keyword as the statistical graph of displaying condition, key message The statistical graph of group includes: histogram, cake chart, node diagram.
As shown in Fig. 2, further, the invention also discloses a kind of enterprises Internet-based for the above method to let out Reveal the system of information extraction, analysis and classification, is mentioned for realizing the enterprise Internet-based leakage information of above-mentioned any one The method for taking, analyzing and classifying comprising: system support layer, for supporting crawler capturing and data cached information;System connects Mouthful, for Interworking Data leakage channel and the leak data information processing platform;The leak data information processing platform for pair The data information crawled is handled;Kernel business tier, the kernel business tier include crawl scheduler module, the crawl scheduling Module is used to grab the data information in the leaking data channel, and crucial letter is extracted in the data information grabbed Breath, and the key message is docked to the leakage information data processing platform and is handled, to obtain key message group;Institute State crawl scheduler module be it is multiple, each crawl scheduler module is corresponding with a leaking data channel;Presentation layer, being used for can The key message group obtained depending on changing showing interface.
In above system, system support layer is mainly used for providing memory space, to support crawler to crawl and cache.This implementation Example in, storage content include three parts: enterprise's essential information, leak data information and by enterprise's keyword extraction simultaneously By the key message for display of post-processing.After system is opened, is inputted, opened based on enterprise's keyword of typing Dynamic docker environment and redis, mysql are to support crawler and caching, wherein enterprise's keyword message is stored in mysql, exhibition Show that layer is data cached and be stored in REDIS, reveals information data storing in mysql and ES.
System interface is for being docked to existing network platform and leakage information data processing platform.This system passes through The api interface of RESTFUL format realizes docking, the data letter that crawler capturing takes from existing network platform, that is, leaking data channel Breath, and is transmitted by JSON format, data information include enterprise name, leakage type, source, source address, reveal information, when Between field.It by ID export, is temporally exported to support various scenes, supporting simultaneously, this system also supports the importing of external data Interface, to carry out deeper association analysis.
Kernel business tier includes multiple crawl scheduler modules, and multiple crawl scheduler modules include at least crawl search engine tune Spend module, crawl microblogging scheduler module, crawl github scheduler module, crawl social network sites scheduler module module, above-mentioned crawl Each one leaking data channel of correspondence of scheduler module grabs data information, such as crawl will be respectively started in crawl search engine module Baidu, google, Microsoft must should wait TU task units, and it is micro- that crawl Sina weibo, Tencent will be respectively started in crawl microblogging scheduler module It is rich to wait TU task units etc..Each TU task unit is concurrently executed by starting multiple worker task distributions by sidekip, each in this way A each crawl TU task unit of module is mutually indepedent, is independent of each other, convenient for the exploitation and later maintenance of early period, O&M, and if Later period is further added by picking unit, need to only write a TU task unit again and directly add just, starts multiple worker and goes crawl in this way Crawl effect can be greatly improved, prevent single exception, guarantee that system being capable of long-term, stable operation when information is revealed in crawl. Worker grabs the identifying code of object when grabbing information using pattern recognition technique, using proxy access around access frequency The limitation such as rate.After grabbing content, extracted according to the keyword (mailbox, enterprise name, enterprise's mailbox, domain name etc.) of enterprise effective Information is classified, re-scheduling, polymerization storage, classification according to mailbox feature be classified as mailbox leakage, according to be accounting features sort out For account leakage, according to be code characteristic be classified as code leakage, according to be telephone feature be classified as phone leakage etc..Re-scheduling is According to source, source address, one md5 value of category combinations as unique identification.The type of the information grabbed, source, source Address, leakage information, time storage, use for presentation layer.
Presentation layer for visualization display treated information, use php development language, zenframework frame into Row exploitation, php language is high-efficient with operation front end, deployment is simple, and more using php language development personnel, ties up conducive to the later period The features such as shield, can save the cost of exploitation and maintenance.Be additionally provided with instruction module in presentation layer, instruction module respectively with multiple crawls Scheduler module signal connection, for assigning work order.The function of presentation layer include: log in, password modification, enterprise's essential information The modification of (enterprise's name, enterprise's mailbox, enterprise domain name, enterprise phone etc.) is deleted;Setting crawl frequency is simultaneously passed by instruction module Crawl scheduler module is reached, crawl frequency can arbitrarily be arranged as needed, such as can such as be grabbed once daily, grab one per hour Secondary or fixed point crawl;It reveals information to show, leakage information shows to include that classification (leakage mailbox, leakage account etc.) shows, grabs Fetch source (enterprise official website, internet search engine, social media, Github etc.) filtering displaying, the arrangement exhibition of time positive sequence inverted order Show and by searching for generally, business name search, mailbox search, telephonic searches are shown etc.;Reveal Information Statistics, leakage letter Breath statistics includes: time statistics, and source statistic, type statistics, figure includes histogram, cake chart etc..It, can by above-mentioned setting Very clear to know that the information when revealed is more, what categorical data leakage is maximum, and where is data dominant leakage.
Above system is equivalent to enterprise's leak data member library index, can carry out quick-searching.
As shown in figure 3, further, above system is that pc client server is relied on to realize that operator passes through service Device open system, system open crawler timed task process, and the crawler capturing of leakage information is carried out to each leaking data channel, and It is stored in system supporting layer, is shown after treatment by presentation layer.
Specifically, the invention also discloses the system process flows of above system:
1) typing: typing enterprise essential information is arranged enterprise's keyword (network address, mailbox, IP network section etc.), and then setting is grabbed Take frequency;
2) it grabs: according to crawl frequency, periodically grabbing related enterprise's sensitive information from each data source;
3) parsing storage: the data information of crawl is classified, polymerize storage;
4) it shows: from data base querying data and showing.
In each leaking data channel of crawler capturing when data information, it can realize that search engine is asked by agency etc. Topic can be solved the problems, such as access identifying code by stamp platform etc., can be logged in by simulation browser and the modes such as heartbeat detection Crawler capturing object is logged in, cookie is extracted.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of method of enterprise's leakage information extraction, analysis and classification Internet-based, which is characterized in that including following step It is rapid:
S1: the data information in crawler capturing leaking data channel;
S2: using enterprise's keyword as search condition, extracting from the data information obtained in S1 includes enterprise's keyword Data information as key message;
S3: duplicate removal merger processing is carried out to the key message obtained in S2, and establishes the parallel relationship between each key message, is obtained To key message group;
S4: the key message group obtained in S3 is shown by visualization interface.
2. the method for enterprise's leakage information extraction, analysis and classification Internet-based according to claim 1, feature It is,
In S1, the leaking data channel includes enterprise official website, internet search engine, social media, Github, cloud disk, text One of online sharing platform of shelves is a variety of.
3. the method for enterprise's leakage information extraction, analysis and classification Internet-based according to claim 1, feature It is,
In S2, enterprise's keyword includes enterprise's mailbox, enterprise domain name, enterprise phone, one in enterprise staff identity information Kind is a variety of;The enterprise staff identity information includes: name, contact method, job information.
4. the method for enterprise's leakage information extraction, analysis and classification Internet-based according to claim 3, feature It is,
The parallel relationship includes: the corresponding relationship between the account and password of enterprise's mailbox;Enterprise's mailbox and enterprise staff body Corresponding relationship between part information;Name in enterprise staff identity information, contact method, the corresponding relationship between job information.
5. the method for enterprise's leakage information extraction, analysis and classification Internet-based according to claim 1, feature It is,
In S4 step, the exhibition method of the key message group includes: to show, count using enterprise's keyword as the classification of displaying condition According to the classification displaying in information scratching source, leaking data time-sequencing show one of or it is a variety of.
6. the method for enterprise's leakage information extraction, analysis and classification Internet-based according to claim 5, feature It is,
The displaying content of the key message group includes: leaking data time statistical graph, data information crawl source statistic figure Table, using enterprise's keyword as the statistical graph of displaying condition, the statistical graph of the key message group includes: histogram, pie Figure, node diagram.
7. a kind of system of enterprise's leakage information extraction, analysis and classification Internet-based, for realizing in claim 1-6 The method of enterprise Internet-based described in any one leakage information extraction, analysis and classification characterized by comprising
System support layer, for supporting crawler capturing and data cached information;
System interface, for Interworking Data leakage channel and the leak data information processing platform;The leak data information processing Platform is for handling the data information crawled;
Kernel business tier, the kernel business tier include crawl scheduler module, and the crawl scheduler module is for grabbing the number According to the data information in leakage channel, key message is extracted in the data information grabbed, and by the key message It is docked to the leakage information data processing platform to be handled, to obtain key message group;The crawl scheduler module is more A, each crawl scheduler module is corresponding with a leaking data channel;
Presentation layer, the key message group shown for visualization interface.
8. the system of enterprise's leakage information extraction, analysis and classification Internet-based according to claim 7, feature It is,
The crawl scheduler module includes crawl search engine scheduler module, crawl microblogging scheduler module, crawl github scheduling One of module, crawl social network sites scheduler module module are a variety of.
9. the system of enterprise's leakage information extraction, analysis and classification Internet-based according to claim 8, feature It is,
It further include instruction module, described instruction module is set to presentation layer and connects respectively with multiple crawl scheduler module signals It connects, for assigning work order.
10. the system of enterprise's leakage information extraction, analysis and classification Internet-based according to claim 7, special Sign is,
The system support layer includes redis database, mysql database, and the mysql database is suitable for storing the enterprise of enterprise Industry keyword message, the redis database are used to store the data cached data information with crawler capturing of presentation layer.
CN201810821897.2A 2018-07-24 2018-07-24 The method of enterprise's leakage information extraction, analysis and classification Internet-based Pending CN109308330A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810821897.2A CN109308330A (en) 2018-07-24 2018-07-24 The method of enterprise's leakage information extraction, analysis and classification Internet-based

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810821897.2A CN109308330A (en) 2018-07-24 2018-07-24 The method of enterprise's leakage information extraction, analysis and classification Internet-based

Publications (1)

Publication Number Publication Date
CN109308330A true CN109308330A (en) 2019-02-05

Family

ID=65225844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810821897.2A Pending CN109308330A (en) 2018-07-24 2018-07-24 The method of enterprise's leakage information extraction, analysis and classification Internet-based

Country Status (1)

Country Link
CN (1) CN109308330A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110209901A (en) * 2019-05-29 2019-09-06 四川长虹电器股份有限公司 To the method for specific objective sensitive information monitoring on Github
CN110334280A (en) * 2019-07-10 2019-10-15 中国民航信息网络股份有限公司 A kind of method and device of discovery confidential information leakage
CN111026945A (en) * 2019-12-05 2020-04-17 北京创鑫旅程网络技术有限公司 Multi-platform crawler scheduling method and device and storage medium
CN112417329A (en) * 2020-10-19 2021-02-26 中国互联网金融协会 Method and device for monitoring illegal internet foreign exchange deposit transaction platform
CN113821754A (en) * 2021-09-18 2021-12-21 上海观安信息技术股份有限公司 Sensitive data interface crawler identification method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8359472B1 (en) * 2010-03-25 2013-01-22 Trend Micro Incorporated Document fingerprinting with asymmetric selection of anchor points
CN103888287A (en) * 2013-12-18 2014-06-25 北京首都国际机场股份有限公司 Information system integrated operation and maintenance monitoring service early warning platform and realization method thereof
CN107577939A (en) * 2017-09-12 2018-01-12 中国石油集团川庆钻探工程有限公司 A kind of data leakage prevention method based on key technology
CN108123933A (en) * 2017-12-05 2018-06-05 南京南邮信息产业技术研究院有限公司 Information leakage automatic monitoring method and system based on internet big data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8359472B1 (en) * 2010-03-25 2013-01-22 Trend Micro Incorporated Document fingerprinting with asymmetric selection of anchor points
CN103888287A (en) * 2013-12-18 2014-06-25 北京首都国际机场股份有限公司 Information system integrated operation and maintenance monitoring service early warning platform and realization method thereof
CN107577939A (en) * 2017-09-12 2018-01-12 中国石油集团川庆钻探工程有限公司 A kind of data leakage prevention method based on key technology
CN108123933A (en) * 2017-12-05 2018-06-05 南京南邮信息产业技术研究院有限公司 Information leakage automatic monitoring method and system based on internet big data

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110209901A (en) * 2019-05-29 2019-09-06 四川长虹电器股份有限公司 To the method for specific objective sensitive information monitoring on Github
CN110334280A (en) * 2019-07-10 2019-10-15 中国民航信息网络股份有限公司 A kind of method and device of discovery confidential information leakage
CN111026945A (en) * 2019-12-05 2020-04-17 北京创鑫旅程网络技术有限公司 Multi-platform crawler scheduling method and device and storage medium
CN111026945B (en) * 2019-12-05 2024-01-26 北京创鑫旅程网络技术有限公司 Multi-platform crawler scheduling method, device and storage medium
CN112417329A (en) * 2020-10-19 2021-02-26 中国互联网金融协会 Method and device for monitoring illegal internet foreign exchange deposit transaction platform
CN113821754A (en) * 2021-09-18 2021-12-21 上海观安信息技术股份有限公司 Sensitive data interface crawler identification method and device

Similar Documents

Publication Publication Date Title
CN109308330A (en) The method of enterprise's leakage information extraction, analysis and classification Internet-based
US11032312B2 (en) Programmatic discovery, retrieval, and analysis of communications to identify abnormal communication activity
US11743294B2 (en) Retrospective learning of communication patterns by machine learning models for discovering abnormal behavior
US11973772B2 (en) Multistage analysis of emails to identify security threats
Sapienza et al. Early warnings of cyber threats in online discussions
Mittal et al. Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities
Le Sceller et al. Sonar: Automatic detection of cyber security events over the twitter stream
CA3120469A1 (en) Threat detection platforms for detecting, characterizing, and remediating email-based threats in real time
US20220394057A1 (en) Investigation of threats using queryable records of behavior
CN108776671A (en) A kind of network public sentiment monitoring system and method
US20140165195A1 (en) Method and system for thwarting insider attacks through informational network analysis
US9667644B2 (en) Risk identification
US9563770B2 (en) Spammer group extraction apparatus and method
CN113556254B (en) Abnormal alarm method and device, electronic equipment and readable storage medium
Nikiforova Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first
Ali et al. Framework for surveillance of instant messages
US20230396640A1 (en) Security event management system and associated method
Ali et al. Deceptive phishing detection system: from audio and text messages in instant messengers using data mining approach
CN113904828B (en) Method, apparatus, device, medium and program product for detecting sensitive information of interface
Xing Design of a network security audit system based on log data mining
CA2804851A1 (en) Monitoring communications
CN105468768A (en) System monitoring method of WeChat public sentiment
CN113852641A (en) Network attack tracing system, method and equipment based on graph database
Babu et al. Examining Login URLS to Identify Phishing Threats
Nandhini et al. An integrated approach to encompass Big data cloud adoption using data mining

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190205