CN113190200A - Exhibition data security protection method and device - Google Patents

Exhibition data security protection method and device Download PDF

Info

Publication number
CN113190200A
CN113190200A CN202110503627.9A CN202110503627A CN113190200A CN 113190200 A CN113190200 A CN 113190200A CN 202110503627 A CN202110503627 A CN 202110503627A CN 113190200 A CN113190200 A CN 113190200A
Authority
CN
China
Prior art keywords
data
terminal
exhibitor
protection
behavior information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110503627.9A
Other languages
Chinese (zh)
Other versions
CN113190200B (en
Inventor
王炎
安江华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Magic Big Data Research Institute Co ltd
Original Assignee
Zhengzhou Magic Big Data Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Magic Big Data Research Institute Co ltd filed Critical Zhengzhou Magic Big Data Research Institute Co ltd
Priority to CN202110503627.9A priority Critical patent/CN113190200B/en
Publication of CN113190200A publication Critical patent/CN113190200A/en
Application granted granted Critical
Publication of CN113190200B publication Critical patent/CN113190200B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/1454Digital output to display device ; Cooperation and interconnection of the display device with other functional units involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays, e.g. teledisplay
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Human Computer Interaction (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for protecting exhibition data safety, relates to the technical field of network safety, and mainly aims to solve the problem that the existing protection efficiency for displaying data safety is poor. The method comprises the following steps: when the server side terminal and the exhibitor side terminal carry out data interaction, receiving backup data forwarded by the server side terminal, and determining behavior information of the exhibitor side terminal according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data; performing prediction processing on the behavior information according to the trained behavior prediction model; determining a data protection strategy of the server side terminal according to the processing result of the prediction processing; constructing a monitoring network model between the exhibitor terminal and the third party terminal according to the protection grade determined by the data protection strategy; and extracting interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model, and performing security verification on the interactive data based on a network protection strategy.

Description

Exhibition data security protection method and device
Technical Field
The present invention relates to the field of network security technologies, and in particular, to a method and an apparatus for protecting exhibition data security.
Background
The exhibition is a service means for promoting sales and purchase by cooperating multiple parties, and is applied by enterprise parties in various fields. In the exhibition process, no matter a host party, an exhibitor party, a service party, a purchasing party and the like, digital services on the exhibition site cannot be opened, namely, data generated by users in all parties in the exhibition are processed based on a big data technology, so that the exhibition condition is managed. Because the exhibition is offline activity involving multiple parties, the security of the exhibition data needs to be strictly controlled, so as to prevent dangerous behaviors such as network attack and the like through the exhibition data.
At present, the existing security protection method for display data is only to identify a user party generating the display data by using an identity right, and to limit the authority of exhibition data generated by each user party, for example, a user enters a meeting place after determining the authority by using the identity, and uploads a server according to data generated by operations such as entering, processing, trading and the like in the exhibition, so that the server processes the display data. However, the identity authority limit mode protects exhibition data safety, so that the use efficiency of exhibition data is greatly reduced, the processing of safety verification requirements generated by users in various aspects in exhibition in real time is limited, data safety support cannot be timely provided for different service requirements in exhibition, and the protection effectiveness of exhibition data safety is reduced.
Disclosure of Invention
In view of this, the present invention provides a method and an apparatus for protecting exhibition data security, and mainly aims to solve the problem of poor protection efficiency of the existing exhibition data security.
According to one aspect of the invention, a method for protecting exhibition data security is provided, which comprises the following steps:
when a server side terminal and a exhibitor side terminal carry out data interaction, receiving backup data forwarded by the server side terminal, and determining behavior information of the exhibitor side terminal according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data;
performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing threshold parameters into a training sample set and then performing model training;
determining a data protection strategy of the server side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance;
determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal;
and extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model, and carrying out security verification on the interactive data based on a network protection strategy so as to determine the protection operation on the interactive data.
The determining the behavior information of the exhibitor terminal according to the interactive data type, the interactive scene information and the exhibitor identifier corresponding to the backup data comprises:
determining an interactive data type, interactive scene information and a participant identifier based on the data request type, the data structure type and the data storage position of the backup data;
and matching the interactive data type, the interactive scene information and the behavior information corresponding to the exhibitor identifier according to a preset behavior mapping list, wherein the preset behavior mapping list stores mapping relations among different interactive data types, interactive scene information, exhibitor identifiers and different behavior information.
Further, before the predicting the behavior information according to the trained behavior prediction model, the method further includes:
acquiring a training sample set of the behavior information, wherein the training sample set comprises at least 60 groups of behavior information sample data;
calculating a threshold parameter according to the interactive scene information and a preset threshold function, and performing sample replacement on the behavior information sample data for at least 10 times based on the threshold parameter to obtain behavior information sample data with the threshold parameter introduced;
training a behavior prediction model based on the behavior information sample data of the introduced threshold parameter so as to perform prediction processing according to the trained behavior prediction model.
Further, before determining the data protection policy of the service party terminal according to the processing result of the prediction processing, the method further includes:
acquiring a regular expression for carrying out security verification on behavior information in different states;
determining at least three combination relations among regular expressions for security verification according to the number of parameters in the regular expressions, and configuring the different state behavior information and the data protection strategies matched with the regular expressions based on the at least three combination relations;
the determining the data protection policy of the service party terminal according to the processing result of the prediction processing includes:
and if the behavior information is in an abnormal state, searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy.
Further, the determining a protection level according to a verification result of the data protection policy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and the third party terminal includes:
matching the behavior information according to the regular expression to determine protection grades, wherein the protection grades comprise a first protection grade, a second protection grade and a third protection grade;
and screening the number of third party terminals which perform data interaction with the exhibitor terminal according to the protection grade, and establishing a monitoring network model between the exhibitor terminal and the third party terminals according to the number.
Further, the extracting the interaction data of the exhibitor terminal and the third party terminal based on the monitoring network model, and performing security verification on the interaction data based on a network protection policy includes:
extracting interactive data of the exhibitor terminal and the third party terminal in the monitoring network model, and rendering and displaying the interactive data based on an exhibition display platform;
and loading a matched network protection strategy based on the interactive data, and carrying out security verification on the interactive data, wherein the network protection strategy is a firewall strategy matched with black and white rules of different behaviors.
Further, the method further comprises:
if the verification result of the security verification of the interactive data is abnormal writing, sending a write forbidding instruction to the server side terminal, wherein the write forbidding instruction carries the identity of the exhibitor side terminal so as to indicate the server side terminal to forbid the exhibitor side terminal from receiving data;
and if the verification result of the security verification of the interactive data is abnormal reading, sending alarm information to the exhibitor terminal, wherein the alarm information carries abnormal reading prompt information to indicate that the exhibitor terminal forbids to output data to the third party terminal.
According to another aspect of the present invention, there is provided an exhibition data security protection device, comprising:
the first determining module is used for receiving backup data forwarded by the server side terminal when the server side terminal and the exhibitor side terminal perform data interaction, and determining behavior information of the exhibitor side terminal according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data;
the processing module is used for carrying out prediction processing on the behavior information according to a trained behavior prediction model, and the behavior prediction model is obtained by introducing threshold parameters into a training sample set for screening and then carrying out model training;
a second determining module, configured to determine a data protection policy of the service party terminal according to a processing result of the prediction processing, where the data protection policy is a regular expression used for performing security verification on the behavior information by using at least three groups configured in advance;
the construction module is used for determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal;
and the verification module is used for extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model and carrying out safety verification on the interactive data based on a network protection strategy so as to determine the protection operation on the interactive data.
Further, the first determining module comprises:
the determining unit is used for determining the interactive data type, the interactive scene information and the participant identification based on the data request type, the data structure type and the data storage position for analyzing the backup data;
and the matching unit is used for matching the interactive data type, the interactive scene information and the behavior information corresponding to the exhibitor identifier according to a preset behavior mapping list, wherein the preset behavior mapping list stores mapping relations among different interactive data types, interactive scene information, exhibitor identifiers and different behavior information.
Further, the apparatus further comprises:
the first acquisition module is used for acquiring a training sample set of the behavior information, wherein the training sample set comprises at least 60 groups of behavior information sample data;
the calculation module is used for calculating a threshold parameter according to the interactive scene information and a preset threshold function, and performing sample replacement on the behavior information sample data for at least 10 times based on the threshold parameter to obtain behavior information sample data introduced with the threshold parameter;
and the training module is used for training a behavior prediction model based on the behavior information sample data with the introduced threshold parameter so as to perform prediction processing according to the trained behavior prediction model.
Further, the apparatus further comprises: a second obtaining module, a third determining module,
the second acquisition module is used for acquiring a regular expression for performing security verification on behavior information in different states;
the third determining module is configured to determine at least three combination relationships between regular expressions for security verification according to the number of parameters in the regular expressions, and configure the different state behavior information and the data protection policy matched with the regular expressions based on the at least three combination relationships;
and the second determining module is used for searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy if the behavior information is in the abnormal state.
Further, the building module comprises:
the determining unit is used for performing matching processing on the behavior information according to the regular expression to determine protection grades, and the protection grades comprise a first protection grade, a second protection grade and a third protection grade;
and the establishing unit is used for screening the number of the third party terminals which carry out data interaction with the exhibitor terminal according to the protection grade, and establishing a monitoring network model between the exhibitor terminal and the third party terminals according to the number.
Further, the verification module includes:
the extraction unit is used for extracting the interactive data of the exhibitor terminal and the third party terminal in the monitoring network model and rendering and displaying the interactive data based on an exhibition display platform;
and the verification unit is used for loading a matched network protection strategy based on the interactive data and carrying out safety verification on the interactive data, wherein the network protection strategy is a firewall strategy matched with black and white rules of different behaviors.
Further, the apparatus further comprises:
a first sending module, configured to send a write forbidding instruction to the server terminal if a verification result of performing security verification on the interactive data is abnormal write-in, where the write forbidding instruction carries an identity of the exhibitor terminal, so as to instruct the server terminal to prohibit the exhibitor terminal from receiving data;
and the second sending module is used for sending alarm information to the exhibitor terminal if the verification result of the security verification of the interactive data is abnormal reading, wherein the alarm information carries abnormal reading prompt information so as to indicate that the exhibitor terminal forbids to output data to the third party terminal.
According to another aspect of the present invention, a storage medium is provided, where at least one executable instruction is stored, and the executable instruction causes a processor to perform operations corresponding to the protection method for exhibition data security as described above.
According to still another aspect of the present invention, there is provided a terminal including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction enables the processor to execute the operation corresponding to the protection method for the exhibition data security.
By the technical scheme, the technical scheme provided by the embodiment of the invention at least has the following advantages:
the invention provides a method and a device for protecting exhibition data safety. Compared with the prior art, the embodiment of the invention receives the backup data forwarded by the server side terminal when the server side terminal and the exhibitor side terminal perform data interaction, and determines the behavior information of the exhibitor side terminal according to the interactive data type, the interactive scene information and the exhibitor side identification corresponding to the backup data; performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing threshold parameters into a training sample set and then performing model training; determining a data protection strategy of the server side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance; determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal; the interactive data of the exhibitor terminal and the third party terminal are extracted based on the monitoring network model, and the interactive data are subjected to security verification based on a network protection strategy so as to determine the protection operation on the interactive data, thereby greatly improving the security verification efficiency of the data generated in the display, increasing the processing effectiveness of the security verification requirements generated by each user in the display in real time, and timely providing data security support for different service requirements in the display, thereby improving the protection efficiency of the display data security.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart illustrating a method for protecting exhibition data security according to an embodiment of the present invention;
FIG. 2 is a block diagram illustrating an exhibition data security protection apparatus according to an embodiment of the present invention;
fig. 3 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
An embodiment of the present invention provides a method for protecting exhibition data security, as shown in fig. 1, the method includes:
101. when the server side terminal and the exhibitor side terminal carry out data interaction, the server side terminal receives backup data forwarded by the server side terminal, and behavior information of the exhibitor side terminal is determined according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data.
In the embodiment of the invention, the service party is a party for organizing the exhibition and providing technical support services for all users participating in the exhibition, such as an exhibition host and the like, the exhibitor is a party for providing exhibitor products in the exhibition, including but not limited to enterprises, individuals, groups and the like, for example, an enterprise is an exhibitor, generally, the service party provides data interaction services for the exhibitor through a plurality of service party terminals, and different exhibitors perform data interaction with the service party terminals through the exhibitor terminals. The third party who participates in the exhibition as a mobile can be any personal user or enterprise user, and when the third party and the exhibitor perform offline activities or transactions, the exhibitor performs data interaction with the server terminal through the exhibitor terminal so as to request the exhibition organization for safety protection processing of the display data. The current execution end is a server which is configured in the exhibition and performs data transmission with at least the server side terminal and the exhibitor side terminal, therefore, when the server side terminal performs data interaction with the exhibitor side terminal, the current execution end is used as a total processing server to receive backup data forwarded by the server side terminal, namely the backup data is backup content of interactive data generated by the server side terminal performing data interaction with the exhibitor side terminal, so as to determine behavior information of the exhibitor side terminal according to interactive data types, interactive scene information and exhibitor side identification corresponding to the backup data.
It should be noted that, because different exhibition scenarios are different in organization scenario, for example, scientific and technological product exhibition, cartoon exhibition, etc., for different scenario scenarios, the interactive data types and interactive scenario information generated by the data interaction between the service side terminal and the exhibition side terminal are different, and meanwhile, the exhibition side identifiers corresponding to different exhibition sides are also different, so that the behavior information of the data interaction between the exhibition side terminal and the service side terminal can be determined, that is, the behavior information is used for representing the behavior content of the exhibition side terminal. The exhibition party identifier is used for representing the identity of the exhibition party, the interactive data type is used for representing the classification of specific content of data interaction, for example, the interactive data type can be a downloaded data type, a stored data type and the like, and the interactive scene information is used for representing scenes of organizing exhibitions, for example, science and technology scenes, business scenes, public welfare scenes and the like, so that behavior information is determined according to different interactive data types, interactive scene information and the exhibition party identifier, and safety protection is performed.
102. And performing prediction processing on the behavior information according to the trained behavior prediction model.
For the embodiment of the invention, in order to determine whether the behavior information needs to be subjected to safety protection, the prediction processing is performed through the trained behavior prediction model. The behavior prediction model is obtained by model training after screening introduced threshold parameters to a training sample set, namely, the optimization of the behavior prediction model training is realized by introducing the threshold parameters to the training samples of the behavior prediction model which is not trained. The threshold parameter is a pre-calculated matrix parameter and is used for replacing sample data in the sample training set, so that the model training precision is improved.
It should be noted that the behavior prediction model is a machine learning model for performing prediction processing on the behavior information, and is preferably a three-layer neural network model, and the three-layer neural network model is trained based on a training sample set into which a threshold parameter is introduced, so as to perform prediction processing on the behavior information determined in step 101.
103. And determining a data protection strategy of the server side terminal according to the processing result of the prediction processing.
In the embodiment of the invention, because the prediction processing of the behavior information is based on the processing of the behavior prediction model, and the processing result comprises the normal state and the abnormal state of the behavior information, the data protection strategy executed on the service side terminal is determined according to the processing result so as to ensure the safety protection of the service side terminal. The data protection strategy is a pre-configured regular expression for performing security verification on the behavior information by at least three groups, specifically, the regular expression is a logical relation for checking whether the behavior information contains specific parameters and character strings, and may include a white regular expression, a black regular expression and a non-black non-white regular expression, so that the data protection strategy is a combination of at least three regular expressions to improve protection on the behavior information in a processing result.
It should be noted that, because the processing result includes the normal state and the abnormal state of the behavior information, the behavior information of the normal state and the abnormal state in the correspondingly determined data protection policy is mapped to different regular expressions in advance.
104. And determining a protection grade according to a verification result of the safety verification of the behavior information by the data protection strategy, and constructing a monitoring network model between the exhibitor terminal and the third party terminal.
In the embodiment of the invention, after the safety verification is carried out on the behavior information based on the data protection strategy, the verification result can be determined to comprise the safety or dangerous behavior, so that a monitoring network model between the exhibitor terminal and the third-party terminal is constructed in order to realize the protection monitoring on the exhibitor terminal generating the safety or threatening behavior. The monitoring network model is used for carrying out display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal, wherein the preset interaction range is a preset exhibitor geographical position specific range, the constructed monitoring network model is specifically used for positioning the exhibitor terminal and the third party terminal through an indoor positioning technology including but not limited to WIFI, Bluetooth, radio frequency technology RFID and the like, and monitoring network models of all the exhibitor terminals and the third party terminals are established by dividing all the exhibitor terminals and the third party terminals in the exhibitor position specific range, namely one preset interaction range corresponds to one monitoring network, so that targeted safety protection is realized.
It should be noted that, the third party, as a mobile user who participates in the exhibition and obtains the exhibition content, such as an individual, a group, an enterprise, and the like, registers as a third party user by adding or loading the exhibition application program in the terminal device, and correspondingly, both the service party and the exhibitor can perform terminal operations through the exhibition application program. In the embodiment of the invention, the exhibition application program is an online exhibition service platform and provides management contents with different authorities for users with different identities, for example, the management contents can provide contents such as data processing, business management and the like for a service party, provide contents such as product display, information output and the like for a participating party, provide contents such as product transaction, storage and the like for a third party, and the current execution end is used as a general processing server of the exhibition service platform to provide data technical support.
105. And extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model, and carrying out security verification on the interactive data based on a network protection strategy.
For the embodiment of the invention, in order to realize accurate protection of exhibition data, interactive data generated by a exhibitor terminal and a third party terminal is extracted according to a constructed monitoring network model, the interactive data is data generated by data interaction between the third party terminal and the exhibitor terminal, and a current execution end carries out safety verification on the interactive data based on a network protection strategy in the current execution end in order to protect the interactive data in different monitoring network models, so as to determine protection operation on the interactive data, namely forbid writing or reading. The network protection strategy is a firewall strategy matched with black and white rules of different behaviors, namely interactive data generated in the monitoring network model in the current execution end is verified and protected based on the firewall, so that the applicability of safety protection of the displayed data is realized.
In an embodiment of the present invention, for further limitation and description, the determining, according to the interactive data type, the interactive scene information, and the exhibitor identifier corresponding to the backup data, the behavior information of the exhibitor terminal includes: determining an interactive data type, interactive scene information and a participant identifier based on the data request type, the data structure type and the data storage position of the backup data; and matching the interactive data type, the interactive scene information and the behavior information corresponding to the exhibitor identifier according to a preset behavior mapping list, wherein the preset behavior mapping list stores mapping relations among different interactive data types, interactive scene information, exhibitor identifiers and different behavior information.
In order to accurately determine the behavior information and realize the behavior prediction processing of the behavior information, firstly, the data request type, the data structure type and the data storage position of the backup data are analyzed to determine the interactive data type, the interactive scene information and the exhibitor identifier, so that the behavior information is matched and searched according to a preset behavior mapping list. Specifically, since the backup data is backup content of the interactive data generated by the data interaction between the server terminal and the exhibitor terminal, the type of the interactive data may be determined according to the type of the data request, for example, the type of the data request is a download request, the type of the interactive data is identified as a download data type, the interactive scene information may be determined according to the type of the data structure, the type of the data structure includes, but is not limited to, an array, a stack, a queue, a linked list, a hash table, a graph, and the like.
It should be noted that, since the preset behavior mapping list stores mapping relationships between different interaction data types, interaction scene information, exhibitor identifiers and different behavior information, after the data request type, the data structure type and the data storage location are analyzed, the matching behavior information is found according to the mapping relationships in the preset behavior mapping list. In addition, the behavior information represents the behavior content of the terminal of the exhibitor, and the behavior content and the exhibitor identifier have a mapping relation, namely the mapping relation in the preset behavior mapping list is generated when the authority of the exhibitor is determined. Specifically, when a participant applies for participation in an exhibition through an exhibition application program, the current execution end allocates an exhibition participant identifier to the participant, and allocates different operation permissions according to identity information added by the participant, that is, different operation permissions can correspond to different behavior information, so that the participant identifier is added into the corresponding relationship in combination with a pre-configured interactive data type and the corresponding relationship between the interactive scene information and the behavior information to obtain a preset behavior mapping list with mapping relationships between different interactive data types, interactive scene information and the exhibition participant identifier and the different behavior information, where the behavior information includes, but is not limited to, downloading public information, uploading file data, and the like.
In an embodiment of the present invention, for further definition and explanation, before the performing the prediction processing on the behavior information according to the trained behavior prediction model, the method further includes: acquiring a training sample set of the behavior information, wherein the training sample set comprises at least 60 groups of behavior information sample data; calculating a threshold parameter according to the interactive scene information and a preset threshold function, and performing sample replacement on the behavior information sample data for at least 10 times based on the threshold parameter to obtain behavior information sample data with the threshold parameter introduced; training a behavior prediction model based on the behavior information sample data of the introduced threshold parameter so as to perform prediction processing according to the trained behavior prediction model.
In order to achieve improved optimization of the behavior prediction model training to improve the prediction accuracy of the behavior prediction model, the behavior prediction model is improved and trained before step 102. Specifically, a training sample set of behavior information is obtained, where the training sample set includes at least 60 groups of sample data labeled in a normal state or an abnormal state, and each group of sample data includes 5 different kinds of behavior information (digitized processing is performed in a model training process) and an abnormal state (represented as 0) or a normal state (represented as 1) corresponding to a training result. In the embodiment of the invention, the threshold parameter is calculated through the interactive scene information and the preset threshold function, namely, the introduced threshold parameter is associated with the interactive scene information, and the preset threshold function is
Figure BDA0003057416160000121
Alpha is a scene constant and is configured according to different interactive scene information, alpha belongs to (0,1), i, j are respectively expressed as the row number and the column number, i, j belongs to [1,5 ]]And replacing the threshold parameter calculated according to the preset threshold function as sample data into the behavior information sample data for at least 10 times so as to realize the introduction of the threshold parameter, training the three-layer neural network model based on the behavior information sample data introduced with the threshold parameter to obtain a trained behavior prediction model, and realizing the improved optimization of the behavior prediction model.
In an embodiment of the present invention, for further limitation and description, before the determining the data protection policy of the service terminal according to the processing result of the prediction processing, the method further includes: acquiring a regular expression for carrying out security verification on behavior information in different states; determining at least three combination relations among the regular expressions for security verification according to the number of parameters in the regular expressions, and configuring the different state behavior information and the data protection strategies matched with the regular expressions based on the at least three combination relations.
In order to improve the security protection efficiency of the display data and achieve the determination of the data protection policy after predicting the behavior information, before step 103, the data protection policy is configured. The display organization side uploads regular expressions which need to be subjected to safety verification according to the behavior information of the normal state and the abnormal state, and the regular expressions are used for checking whether the behavior information contains the logic relation of specific parameters and character strings, so that at least three combinations among the regular expressions can be determined according to the number of the parameters in the regular expressions. Specifically, the sum of the number of parameters of each at least three combined regular expressions reaches 5, for example, the number of parameters in the regular expression 1 is 2, the number of parameters in the regular expression 2 is 1, and the number of parameters in the regular expression 3 with a combined relationship is determined to be at least 2, so that the accuracy of protecting the display data is improved. In addition, when the regular expressions of at least three combination relations are determined, the configuration of the data protection strategy is the regular expressions which respectively correspond to the at least three combination relations according to the behavior information of the abnormal state and the normal state and serve as the data protection strategy for the behavior information.
Correspondingly, the determining the data protection policy of the service party terminal according to the processing result of the prediction processing includes: and if the behavior information is in an abnormal state, searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy.
For further explanation, after the data protection policy is configured, the regular expressions in the data protection policy are specifically matched according to the processing result of the prediction processing, that is, the behavior information in the normal state or the behavior information in the abnormal state. And if the behavior information is in an abnormal state, searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy so as to carry out safety verification on the behavior information according to the regular expression and determine the protection level.
In an embodiment of the present invention, for further limitation and description, the determining a protection level according to a verification result of the data protection policy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal includes: matching the behavior information according to the regular expression to determine protection grades, wherein the protection grades comprise a first protection grade, a second protection grade and a third protection grade; and screening the number of third party terminals which perform data interaction with the exhibitor terminal according to the protection grade, and establishing a monitoring network model between the exhibitor terminal and the third party terminals according to the number.
In the embodiment of the invention, as the combination of at least 3 regular expressions is corresponding to one behavior information in the data protection strategy, in order to realize the protection accuracy of the behavior information, after the behavior information is matched by using each regular expression, if all the behavior information is matched, the behavior information is determined to be a first protection grade, if one of the behavior information is not matched, the behavior information is determined to be a second protection grade, if more than two of the behavior information are not matched, the behavior information is determined to be three protection grades, and the first protection grade to the third protection grade are dangerous grades in sequence, so that a monitoring network model is established for further verifying whether safe behaviors exist between a exhibitor and a third party. Because different protection grades indicate different danger degrees, the number of the third party terminals to be subjected to data interaction with the exhibitor terminal is screened according to the protection grades so as to establish a monitoring network model between the third party terminals and at least two third party terminals. The monitoring network models between the exhibitor terminals and the third terminals are established according to the number of the third-party terminals, the number of the established specific monitoring network models can be multiple, each monitoring network model is respectively matched with one exhibitor terminal, namely, one exhibitor terminal and multiple third-party terminals can be identified from one monitoring network model, and therefore the safety protection of data generated by each exhibitor terminal is determined based on the monitoring network models.
In the embodiment of the present invention, preferably, if the number of the third-party terminals is the first protection level, the number of the third-party terminals is determined to be 2, if the number of the third-party terminals is the second protection level, the number of the third-party terminals is determined to be 5, and if the number of the third-party terminals is the third protection level, the number of the third-party terminals is determined to be 10, that is, data generated by monitoring a corresponding number of the third-party terminals in the network model in real time is monitored.
In an embodiment of the present invention, for further limitation and description, the extracting, based on the monitoring network model, the interaction data of the exhibitor terminal and the third party terminal, and performing security verification on the interaction data based on a network protection policy includes: extracting interactive data of the exhibitor terminal and the third party terminal in the monitoring network model, and rendering and displaying the interactive data based on an exhibition display platform; and loading a matched network protection strategy based on the interactive data, and carrying out security verification on the interactive data, wherein the network protection strategy is a firewall strategy matched with black and white rules of different behaviors.
In order to achieve the purpose of safety protection of data generated by exhibitors and third parties in an exhibition, aiming at each monitoring network model, interactive data of the exhibitor terminal and the third party terminal are extracted, the interactive data comprise data contents generated by any interactive operation, and rendering display is carried out in an exhibition display platform, namely, the current execution end renders different colors for data streams in different monitoring network models, and displays data interaction conditions generated by different monitoring network models, so that service personnel can carry out real-time monitoring. In addition, after the interactive data is obtained, a matched network protection strategy, namely a firewall strategy matched with black and white rules of different behaviors is loaded and used for verifying the interactive data to obtain a verification result.
It should be noted that, in the embodiment of the present invention, in order to implement security verification on display data generated in an exhibition, that is, behavior information, interactive data, and the like, a matching network protection policy is loaded according to the interactive data, so that the firewall policy is used to perform security verification on the interactive data.
In an embodiment of the present invention, in order to implement security verification on data generated in an exhibition, and greatly meet the security processing requirement on the data generated in the exhibition, the method further includes: if the verification result of the safety verification of the interactive data is abnormal writing, sending a writing forbidding instruction to the server side terminal; and if the verification result of the safety verification of the interactive data is abnormal reading, sending alarm information to the exhibitor terminal.
Specifically, if a verification result obtained by performing security verification on the interactive data according to the firewall policy is abnormal write-in, that is, it indicates that the third-party terminal writes abnormal data into the exhibitor terminal, a write prohibition instruction is sent to the server terminal, where the write prohibition instruction carries an identity of the exhibitor terminal to instruct the server terminal to prohibit the exhibitor terminal from receiving the data. When the server side terminal receives the write prohibition instruction, the data write prohibition of the exhibitor and the third party can be prohibited in an offline mode according to the carried identity, and the write prohibition can also be realized by locking the operation authority of the exhibitor side terminal in an online mode by using the exhibition application program. Similarly, if the verification result obtained by performing security verification on the interactive data according to the firewall policy is abnormal reading, that is, it indicates that the data output by the third party to the exhibitor is abnormal, the exhibitor terminal is sent with warning information, where the warning information carries abnormal reading prompt information to instruct the exhibitor terminal to prohibit the data output to the third party terminal.
The invention provides a protection method for exhibition data safety, compared with the prior art, the embodiment of the invention receives backup data forwarded by a server side terminal when the server side terminal and an exhibitor side terminal perform data interaction, and determines behavior information of the exhibitor side terminal according to an interaction data type, interaction scene information and an exhibitor side identifier corresponding to the backup data; performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing threshold parameters into a training sample set and then performing model training; determining a data protection strategy of the server side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance; determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal; the interactive data of the exhibitor terminal and the third party terminal are extracted based on the monitoring network model, and the interactive data are subjected to security verification based on a network protection strategy so as to determine the protection operation on the interactive data, thereby greatly improving the security verification efficiency of the data generated in the display, increasing the processing effectiveness of the security verification requirements generated by each user in the display in real time, and timely providing data security support for different service requirements in the display, thereby improving the protection efficiency of the display data security.
Further, as an implementation of the method shown in fig. 1, an embodiment of the present invention provides a device for protecting exhibition data, as shown in fig. 3, the device includes:
the first determining module 21 is configured to receive backup data forwarded by the server side terminal when the server side terminal performs data interaction with the exhibitor side terminal, and determine behavior information of the exhibitor side terminal according to an interaction data type, interaction scene information, and an exhibitor side identifier corresponding to the backup data;
the processing module 22 is configured to perform prediction processing on the behavior information according to a trained behavior prediction model, where the behavior prediction model is obtained by performing model training after a threshold parameter is introduced into a training sample set for screening;
a second determining module 23, configured to determine a data protection policy of the service party terminal according to the processing result of the prediction processing, where the data protection policy is a regular expression obtained by performing security verification on the behavior information by using at least three groups configured in advance;
the building module 24 is configured to determine a protection level according to a verification result of the data protection policy for performing security verification on the behavior information, and build a monitoring network model between the exhibitor terminal and a third-party terminal, where the monitoring network model is used to perform display monitoring in a preset interaction range on the third-party terminal and the exhibitor terminal;
and the verification module 25 is configured to extract the interactive data of the exhibitor terminal and the third-party terminal based on the monitoring network model, and perform security verification on the interactive data based on a network protection policy to determine a protection operation on the interactive data.
Further, the first determining module comprises:
the determining unit is used for determining the interactive data type, the interactive scene information and the participant identification based on the data request type, the data structure type and the data storage position for analyzing the backup data;
and the matching unit is used for matching the interactive data type, the interactive scene information and the behavior information corresponding to the exhibitor identifier according to a preset behavior mapping list, wherein the preset behavior mapping list stores mapping relations among different interactive data types, interactive scene information, exhibitor identifiers and different behavior information.
Further, the apparatus further comprises:
the first acquisition module is used for acquiring a training sample set of the behavior information, wherein the training sample set comprises at least 60 groups of behavior information sample data;
the calculation module is used for calculating a threshold parameter according to the interactive scene information and a preset threshold function, and performing sample replacement on the behavior information sample data for at least 10 times based on the threshold parameter to obtain behavior information sample data introduced with the threshold parameter;
and the training module is used for training a behavior prediction model based on the behavior information sample data with the introduced threshold parameter so as to perform prediction processing according to the trained behavior prediction model.
Further, the apparatus further comprises: a second obtaining module, a third determining module,
the second acquisition module is used for acquiring a regular expression for performing security verification on behavior information in different states;
the third determining module is configured to determine at least three combination relationships between regular expressions for security verification according to the number of parameters in the regular expressions, and configure the different state behavior information and the data protection policy matched with the regular expressions based on the at least three combination relationships;
and the second determining module is used for searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy if the behavior information is in the abnormal state.
Further, the building module comprises:
the determining unit is used for performing matching processing on the behavior information according to the regular expression to determine protection grades, and the protection grades comprise a first protection grade, a second protection grade and a third protection grade;
and the establishing unit is used for screening the number of the third party terminals which carry out data interaction with the exhibitor terminal according to the protection grade, and establishing a monitoring network model between the exhibitor terminal and the third party terminals according to the number.
Further, the verification module includes:
the extraction unit is used for extracting the interactive data of the exhibitor terminal and the third party terminal in the monitoring network model and rendering and displaying the interactive data based on an exhibition display platform;
and the verification unit is used for loading a matched network protection strategy based on the interactive data and carrying out safety verification on the interactive data, wherein the network protection strategy is a firewall strategy matched with black and white rules of different behaviors.
Further, the apparatus further comprises:
a first sending module, configured to send a write forbidding instruction to the server terminal if a verification result of performing security verification on the interactive data is abnormal write-in, where the write forbidding instruction carries an identity of the exhibitor terminal, so as to instruct the server terminal to prohibit the exhibitor terminal from receiving data;
and the second sending module is used for sending alarm information to the exhibitor terminal if the verification result of the security verification of the interactive data is abnormal reading, wherein the alarm information carries abnormal reading prompt information so as to indicate that the exhibitor terminal forbids to output data to the third party terminal.
The invention provides a protective device for exhibition data safety, compared with the prior art, the embodiment of the invention receives backup data forwarded by a server side terminal when the server side terminal and an exhibitor side terminal perform data interaction, and determines behavior information of the exhibitor side terminal according to an interaction data type, interaction scene information and an exhibitor side identifier corresponding to the backup data; performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing threshold parameters into a training sample set and then performing model training; determining a data protection strategy of the server side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance; determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal; the interactive data of the exhibitor terminal and the third party terminal are extracted based on the monitoring network model, and the interactive data are subjected to security verification based on a network protection strategy so as to determine the protection operation on the interactive data, thereby greatly improving the security verification efficiency of the data generated in the display, increasing the processing effectiveness of the security verification requirements generated by each user in the display in real time, and timely providing data security support for different service requirements in the display, thereby improving the protection efficiency of the display data security.
According to an embodiment of the present invention, a storage medium is provided, where at least one executable instruction is stored, and the computer executable instruction may execute the method for protecting the exhibition data in any of the above method embodiments.
Fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the terminal.
As shown in fig. 3, the terminal may include: a processor (processor)302, a communication Interface 304, a memory 306, and a communication bus 308.
Wherein: the processor 302, communication interface 304, and memory 306 communicate with each other via a communication bus 308.
A communication interface 304 for communicating with network elements of other devices, such as clients or other servers.
The processor 302 is configured to execute the program 310, and may specifically execute the relevant steps in the above embodiment of the protection method for securing exhibition data.
In particular, program 310 may include program code comprising computer operating instructions.
The processor 302 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement an embodiment of the present invention. The terminal comprises one or more processors, which can be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 306 for storing a program 310. Memory 306 may comprise high-speed RAM memory and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 310 may specifically be configured to cause the processor 302 to perform the following operations:
when a server side terminal and a exhibitor side terminal carry out data interaction, receiving backup data forwarded by the server side terminal, and determining behavior information of the exhibitor side terminal according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data;
performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing threshold parameters into a training sample set and then performing model training;
determining a data protection strategy of the server side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance;
determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal;
and extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model, and carrying out security verification on the interactive data based on a network protection strategy so as to determine the protection operation on the interactive data.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for protecting exhibition data security is characterized by comprising the following steps:
when a server side terminal and a exhibitor side terminal carry out data interaction, receiving backup data forwarded by the server side terminal, and determining behavior information of the exhibitor side terminal according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data;
performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing threshold parameters into a training sample set and then performing model training;
determining a data protection strategy of the server side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance;
determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal;
and extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model, and carrying out security verification on the interactive data based on a network protection strategy so as to determine the protection operation on the interactive data.
2. The method according to claim 1, wherein the determining the behavior information of the exhibitor terminal according to the interactive data type, the interactive scenario information, and the exhibitor identifier corresponding to the backup data comprises:
determining an interactive data type, interactive scene information and a participant identifier based on the data request type, the data structure type and the data storage position of the backup data;
and matching the interactive data type, the interactive scene information and the behavior information corresponding to the exhibitor identifier according to a preset behavior mapping list, wherein the preset behavior mapping list stores mapping relations among different interactive data types, interactive scene information, exhibitor identifiers and different behavior information.
3. The method of claim 2, wherein prior to the predictive processing of the behavior information according to the trained behavior prediction model, the method further comprises:
acquiring a training sample set of the behavior information, wherein the training sample set comprises at least 60 groups of behavior information sample data;
calculating a threshold parameter according to the interactive scene information and a preset threshold function, and performing sample replacement on the behavior information sample data for at least 10 times based on the threshold parameter to obtain behavior information sample data with the threshold parameter introduced;
training a behavior prediction model based on the behavior information sample data of the introduced threshold parameter so as to perform prediction processing according to the trained behavior prediction model.
4. The method according to claim 1, wherein before determining the data protection policy of the server terminal according to the processing result of the prediction processing, the method further comprises:
acquiring a regular expression for carrying out security verification on behavior information in different states;
determining at least three combination relations among regular expressions for security verification according to the number of parameters in the regular expressions, and configuring the different state behavior information and the data protection strategies matched with the regular expressions based on the at least three combination relations;
the determining the data protection policy of the service party terminal according to the processing result of the prediction processing includes:
and if the behavior information is in an abnormal state, searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy.
5. The method according to claim 1, wherein the determining a protection level according to the verification result of the data protection policy for security verification of the behavior information, and the constructing a monitoring network model between the exhibitor terminal and a third party terminal comprises:
matching the behavior information according to the regular expression to determine protection grades, wherein the protection grades comprise a first protection grade, a second protection grade and a third protection grade;
and screening the number of third party terminals which perform data interaction with the exhibitor terminal according to the protection grade, and establishing a monitoring network model between the exhibitor terminal and the third party terminals according to the number.
6. The method of claim 5, wherein the extracting interaction data of the exhibitor terminal and the third party terminal based on the monitoring network model and performing security verification on the interaction data based on a network protection policy comprises:
extracting interactive data of the exhibitor terminal and the third party terminal in the monitoring network model, and rendering and displaying the interactive data based on an exhibition display platform;
and loading a matched network protection strategy based on the interactive data, and carrying out security verification on the interactive data, wherein the network protection strategy is a firewall strategy matched with black and white rules of different behaviors.
7. The method of claim 1, further comprising:
if the verification result of the security verification of the interactive data is abnormal writing, sending a write forbidding instruction to the server side terminal, wherein the write forbidding instruction carries the identity of the exhibitor side terminal so as to indicate the server side terminal to forbid the exhibitor side terminal from receiving data;
and if the verification result of the security verification of the interactive data is abnormal reading, sending alarm information to the exhibitor terminal, wherein the alarm information carries abnormal reading prompt information to indicate that the exhibitor terminal forbids to output data to the third party terminal.
8. A protective device for exhibition data security, comprising:
the first determining module is used for receiving backup data forwarded by the server side terminal when the server side terminal and the exhibitor side terminal perform data interaction, and determining behavior information of the exhibitor side terminal according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data;
the processing module is used for carrying out prediction processing on the behavior information according to a trained behavior prediction model, and the behavior prediction model is obtained by introducing threshold parameters into a training sample set for screening and then carrying out model training;
a second determining module, configured to determine a data protection policy of the service party terminal according to a processing result of the prediction processing, where the data protection policy is a regular expression used for performing security verification on the behavior information by using at least three groups configured in advance;
the construction module is used for determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal;
and the verification module is used for extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model and carrying out safety verification on the interactive data based on a network protection strategy so as to determine the protection operation on the interactive data.
9. A storage medium having stored therein at least one executable instruction for causing a processor to perform operations corresponding to the method for securing exhibition data according to any one of claims 1-7.
10. A terminal, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the protection method for the exhibition data security according to any one of claims 1-7.
CN202110503627.9A 2021-05-10 2021-05-10 Exhibition data security protection method and device Active CN113190200B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110503627.9A CN113190200B (en) 2021-05-10 2021-05-10 Exhibition data security protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110503627.9A CN113190200B (en) 2021-05-10 2021-05-10 Exhibition data security protection method and device

Publications (2)

Publication Number Publication Date
CN113190200A true CN113190200A (en) 2021-07-30
CN113190200B CN113190200B (en) 2023-04-07

Family

ID=76988516

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110503627.9A Active CN113190200B (en) 2021-05-10 2021-05-10 Exhibition data security protection method and device

Country Status (1)

Country Link
CN (1) CN113190200B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115865535A (en) * 2023-02-28 2023-03-28 网思科技股份有限公司 Cloud security management method, system and storage medium

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040181664A1 (en) * 2003-03-10 2004-09-16 Hoefelmeyer Ralph Samuel Secure self-organizing and self-provisioning anomalous event detection systems
US20050193427A1 (en) * 2004-02-26 2005-09-01 Pramod John Secure enterprise network
US20080262990A1 (en) * 2000-09-25 2008-10-23 Harsh Kapoor Systems and methods for processing data flows
CN102904921A (en) * 2011-07-30 2013-01-30 无锡博越信息技术有限公司 Assembly management monitoring system based on internet of things and information interaction method
US20150304457A1 (en) * 2012-10-29 2015-10-22 Tencent Technology (Shenzhen) Company Limited Method, System And Device For Monitoring Data
CN105243336A (en) * 2015-09-30 2016-01-13 北京奇虎科技有限公司 Data protection method and apparatus
CN106066882A (en) * 2016-06-03 2016-11-02 深圳市赛瑞产业研究有限公司 A kind of virtualization exhibition system and using method thereof
CN107169796A (en) * 2017-05-12 2017-09-15 深圳市浩天投资有限公司 A kind of analysis method of user behavior data, system and computer-readable recording medium
CN108449342A (en) * 2018-03-20 2018-08-24 北京搜狐互联网信息服务有限公司 Malicious requests detection method and device
US20180248902A1 (en) * 2015-08-28 2018-08-30 Mircea DÃNILÃ-DUMITRESCU Malicious activity detection on a computer network and network metadata normalisation
CN110691064A (en) * 2018-09-27 2020-01-14 国家电网有限公司 Safety access protection and detection system for field operation terminal
CN111181980A (en) * 2019-12-31 2020-05-19 奇安信科技集团股份有限公司 Network security-oriented regular expression matching method and device
US20200226043A1 (en) * 2015-11-20 2020-07-16 Sorbotics, LLC Method and System for Developing an Anomaly Detector for Detecting An Anomaly Parameter on Network Terminals in a Distributed Network
CN111523762A (en) * 2020-03-23 2020-08-11 深圳奇迹智慧网络有限公司 Exhibition data processing method and device, computer equipment and storage medium
CN112261033A (en) * 2020-10-19 2021-01-22 北京京航计算通讯研究所 Network security protection method based on enterprise intranet
CN112269324A (en) * 2020-10-19 2021-01-26 深圳市亿点物联科技有限公司 Digital exhibition cloud platform data analysis control system

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080262990A1 (en) * 2000-09-25 2008-10-23 Harsh Kapoor Systems and methods for processing data flows
US20040181664A1 (en) * 2003-03-10 2004-09-16 Hoefelmeyer Ralph Samuel Secure self-organizing and self-provisioning anomalous event detection systems
US20050193427A1 (en) * 2004-02-26 2005-09-01 Pramod John Secure enterprise network
CN102904921A (en) * 2011-07-30 2013-01-30 无锡博越信息技术有限公司 Assembly management monitoring system based on internet of things and information interaction method
US20150304457A1 (en) * 2012-10-29 2015-10-22 Tencent Technology (Shenzhen) Company Limited Method, System And Device For Monitoring Data
US20180248902A1 (en) * 2015-08-28 2018-08-30 Mircea DÃNILÃ-DUMITRESCU Malicious activity detection on a computer network and network metadata normalisation
CN105243336A (en) * 2015-09-30 2016-01-13 北京奇虎科技有限公司 Data protection method and apparatus
US20200226043A1 (en) * 2015-11-20 2020-07-16 Sorbotics, LLC Method and System for Developing an Anomaly Detector for Detecting An Anomaly Parameter on Network Terminals in a Distributed Network
CN106066882A (en) * 2016-06-03 2016-11-02 深圳市赛瑞产业研究有限公司 A kind of virtualization exhibition system and using method thereof
CN107169796A (en) * 2017-05-12 2017-09-15 深圳市浩天投资有限公司 A kind of analysis method of user behavior data, system and computer-readable recording medium
CN108449342A (en) * 2018-03-20 2018-08-24 北京搜狐互联网信息服务有限公司 Malicious requests detection method and device
CN110691064A (en) * 2018-09-27 2020-01-14 国家电网有限公司 Safety access protection and detection system for field operation terminal
CN111181980A (en) * 2019-12-31 2020-05-19 奇安信科技集团股份有限公司 Network security-oriented regular expression matching method and device
CN111523762A (en) * 2020-03-23 2020-08-11 深圳奇迹智慧网络有限公司 Exhibition data processing method and device, computer equipment and storage medium
CN112261033A (en) * 2020-10-19 2021-01-22 北京京航计算通讯研究所 Network security protection method based on enterprise intranet
CN112269324A (en) * 2020-10-19 2021-01-26 深圳市亿点物联科技有限公司 Digital exhibition cloud platform data analysis control system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHANG,JIANKANG: "The exploration of the exhibition informatization", 《3RD INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY ,ENVIRONMENT AND CHEMICAL ENGINEERING》 *
黎冬媛等: "基于RFID的会展网络信息管理系统设计", 《现代计算机(专业版)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115865535A (en) * 2023-02-28 2023-03-28 网思科技股份有限公司 Cloud security management method, system and storage medium
CN115865535B (en) * 2023-02-28 2023-05-23 网思科技股份有限公司 Cloud security management method, system and storage medium

Also Published As

Publication number Publication date
CN113190200B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN112132676B (en) Method and device for determining contribution degree of joint training target model and terminal equipment
Bayuk et al. An architectural systems engineering methodology for addressing cyber security
MX2012003721A (en) Systems and methods for social graph data analytics to determine connectivity within a community.
CN108876113B (en) Assessment management method, assessment management device, terminal equipment and assessment management system
CA3115124A1 (en) Continuous and anonymous risk evaluation
US11356451B2 (en) Cube-based user interface for online community
CN114186275A (en) Privacy protection method and device, computer equipment and storage medium
CN113190200B (en) Exhibition data security protection method and device
CN111931047A (en) Artificial intelligence-based black product account detection method and related device
CN115174148A (en) Cloud computing and information security oriented cloud service management method and artificial intelligence platform
CN112702410B (en) Evaluation system, method and related equipment based on blockchain network
CN113065748A (en) Business risk assessment method, device, equipment and storage medium
CN113486316A (en) User identity authentication method and device, electronic equipment and readable storage medium
CN116629423A (en) User behavior prediction method, device, equipment and storage medium
CN116089920A (en) Sensitive field early warning method, system, computer equipment and medium
CN114925033A (en) Information uplink method, device, system and storage medium
CN115358894A (en) Intellectual property life cycle trusteeship management method, device, equipment and medium
CN114006701A (en) Method, device and equipment for sharing name list and storage medium
CN112862648A (en) Block chain-based multi-department joint cooperation method, device, equipment and medium
CN113343288B (en) Block chain intelligent contract security management system based on TEE
CN117040927B (en) Password service monitoring system and method
Parthasarathy et al. A framework for managing ethics in data science projects
Ankile et al. I See You! Robust Measurement of Adversarial Behavior
KR102471731B1 (en) A method of managing network security for users
US20220247800A1 (en) Selective content sharing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant