CN104700034A - Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy - Google Patents
Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy Download PDFInfo
- Publication number
- CN104700034A CN104700034A CN201310656098.1A CN201310656098A CN104700034A CN 104700034 A CN104700034 A CN 104700034A CN 201310656098 A CN201310656098 A CN 201310656098A CN 104700034 A CN104700034 A CN 104700034A
- Authority
- CN
- China
- Prior art keywords
- data
- net dish
- uploaded
- keyword extraction
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a method for monitoring the risk of uploaded network disk data, based on a keyword extraction strategy. The method is characterized by comprising the following steps: a main control unit monitors company network interface transmitted data in real time; once an active unit finds out that cache data in a data cache server is new uploaded network disk data, the active unit stops the transmission of the data and meanwhile sends the uploaded network disk data to a keyword extraction server; the keyword extraction server performs keyword extraction on the uploaded network disk data through a set keyword extraction algorithm and performs confluence analysis, and once the active unit finds out that the uploaded network disk data contains confidential information of company, the active unit immediately stops the transmission of the uploaded network disk data; if a confidential information checking server does not find out that the uploaded network disk data contains confidential information of company, the active unit sends the uploaded network disk data to an extranet. The method has the characteristics of convenience in use, high processing speed, easiness in realizing the technology and the like.
Description
Technical field
The present invention relates to based on keyword extraction strategy the method uploading net dish data Risk Monitoring.
Background technology
Along with the popularity of modernization of business, the information such as product information, contract contact mutual, has abandoned paper document substantially, mostly adopts electronic data to transmit.Wherein a lot of information relates to great commercial or private secret, needs to guarantee its safety.The major product of current IP Security protection has: fire wall, networking xegregating unit, intrusion detection, anti-virus etc.; The major product of application layer security protection has: safety certification, uniform authorization etc.; The major product of server layer security protection has: server protection, anti-virus, intrusion detection, main frame audit etc.; The major product of data Layer security protection has: database security enhancing, database audit, document protection etc., data Layer security protection is last one security barriers of the data deposited in server itself, if the security protection of network layer, application layer and server layer is broken.Along with the development of electronic information technology, the software and hardware of a lot of spy's character is open to be peddled on the net.And therefore how enterprise is effectively protected by the data in data transmission procedure, be with settled problem at present.In addition, the confirmation of data security, should be accurate, guarantees quick again.
Key word is exactly word or word that user inputs when using search engine, that at utmost can summarize the information content that user will search, is generalization and the centralization of information.Unresolved the problems referred to above provide the possibility that technology realizes.
Summary of the invention
The present invention is directed to the proposition of above problem, and develop based on keyword extraction strategy the method uploading net dish data Risk Monitoring.The technical solution used in the present invention is as follows:
Based on keyword extraction strategy to the method uploading net dish data Risk Monitoring, it is characterized in that comprising the steps:
1) main control unit is monitored in real time to corporate networks interface transmission data, and the net dish data of uploading being sent to corporate networks interface are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new upload net dish data, just stop the transmission of these data, this is uploaded net dish data simultaneously and be sent in keyword extraction server;
3) described keyword extraction server is uploaded net dish data by the keyword extraction algorithms that sets carry out keyword extraction to this, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that this is uploaded net dish data and contains company's secret, active cell immediately terminal this time uploads the transmission of net dish data, reports to the police simultaneously;
4) if confidential information checks server do not find that this is uploaded net dish data and contains company's secret, then active cell will be uploaded net dish data and will be sent on net dish.
Also comprise in step 4):
Main control unit will uploaded while net dish data send to net dish, to the step uploaded net dish data and back up.
Owing to have employed technique scheme, method provided by the invention has: easy to use, processing speed, technology realize the features such as easy.In addition, the method is based on the realization of computer system, and only the method need be compiled into the upgrading that corresponding program can realize active computer, therefore its cost is very cheap is suitable for extensive popularization.
Accompanying drawing explanation
Fig. 1 is the structured flowchart of system of the present invention;
Fig. 2 is realization flow figure of the present invention.
Embodiment
The method uploading net dish data Risk Monitoring is comprised the steps: based on keyword extraction strategy as depicted in figs. 1 and 2
1) main control unit is monitored in real time to corporate networks interface transmission data, and the net dish data of uploading being sent to corporate networks interface are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new upload net dish data, just stop the transmission of these data, this is uploaded net dish data simultaneously and be sent in keyword extraction server;
3) described keyword extraction server is uploaded net dish data by the keyword extraction algorithms that sets carry out keyword extraction to this, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that this is uploaded net dish data and contains company's secret, active cell immediately terminal this time uploads the transmission of net dish data, reports to the police simultaneously;
4) if confidential information checks server do not find that this is uploaded net dish data and contains company's secret, then active cell will be uploaded net dish data and will be sent on net dish.
Also comprise in step 4): main control unit will uploaded while net dish data send to net dish, to the step uploaded net dish data and back up.
The above; be only the present invention's preferably embodiment; but protection scope of the present invention is not limited thereto; anyly be familiar with those skilled in the art in the technical scope that the present invention discloses; be equal to according to technical scheme of the present invention and inventive concept thereof and replace or change, all should be encompassed within protection scope of the present invention.
Claims (2)
1. based on keyword extraction strategy to the method uploading net dish data Risk Monitoring, it is characterized in that comprising the steps:
1) main control unit is monitored in real time to corporate networks interface transmission data, and the net dish data of uploading being sent to corporate networks interface are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new upload net dish data, just stop the transmission of these data, this is uploaded net dish data simultaneously and be sent in keyword extraction server;
3) described keyword extraction server is uploaded net dish data by the keyword extraction algorithms that sets carry out keyword extraction to this, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that this is uploaded net dish data and contains company's secret, active cell immediately terminal this time uploads the transmission of net dish data, reports to the police simultaneously;
4) if confidential information checks server do not find that this is uploaded net dish data and contains company's secret, then active cell will be uploaded net dish data and will be sent on net dish.
2. according to claim 1 a kind of based on keyword extraction strategy to the method uploading net dish data Risk Monitoring, it is characterized in that also comprising in step 4):
Main control unit will uploaded while net dish data send to net dish, to the step uploaded net dish data and back up.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310656098.1A CN104700034A (en) | 2013-12-04 | 2013-12-04 | Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310656098.1A CN104700034A (en) | 2013-12-04 | 2013-12-04 | Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104700034A true CN104700034A (en) | 2015-06-10 |
Family
ID=53347135
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310656098.1A Pending CN104700034A (en) | 2013-12-04 | 2013-12-04 | Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104700034A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483422A (en) * | 2017-08-03 | 2017-12-15 | 深信服科技股份有限公司 | Leakage of data retroactive method, equipment and computer-readable recording medium |
-
2013
- 2013-12-04 CN CN201310656098.1A patent/CN104700034A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483422A (en) * | 2017-08-03 | 2017-12-15 | 深信服科技股份有限公司 | Leakage of data retroactive method, equipment and computer-readable recording medium |
CN107483422B (en) * | 2017-08-03 | 2020-10-27 | 深信服科技股份有限公司 | Data leakage tracing method and device and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240250995A1 (en) | Cybersecurity reconnaissance, analysis, and scoring using distributed systems | |
US20240305671A1 (en) | Self-adjusting cybersecurity analysis and score generation | |
US10623431B2 (en) | Discerning psychological state from correlated user behavior and contextual information | |
US11134087B2 (en) | System identifying ingress of protected data to mitigate security breaches | |
CN104871484A (en) | System and method for an endpoint hardware assisted network firewall in a security environment | |
US20220060512A1 (en) | System and methods for automatically assessing and improving a cybersecurity risk score | |
US20240244090A1 (en) | Cybersecurity analysis and protection using distributed systems | |
CN106022080A (en) | Cipher card based on PCIe (peripheral component interface express) interface and data encryption method of cipher card | |
Vignesh Saravanan et al. | Data protection and security enhancement in cyber-physical systems using AI and blockchain | |
Magare et al. | Security and privacy issues in smart city: Threats and their countermeasures | |
CN104702451A (en) | Method for monitoring risk of sent public mail based on keyword extraction strategy | |
CN104702454A (en) | Method for monitoring risks of QQ transmitted data based on keyword extraction strategy | |
CN104700034A (en) | Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy | |
CN104702456A (en) | Method for monitoring local area network transmission data risk based on keyword extraction strategy | |
KR101370511B1 (en) | Method and apparatus for inspecting packet by using meta-data classification | |
CN104699703A (en) | Method for monitoring risk of database received data, based on keyword extraction strategy | |
CN104700035A (en) | Method for monitoring risk of USB interface copied data, based on keyword extraction strategy | |
Arya et al. | Integrating IoT with cloud computing and big data analytics: Security perspective | |
CN104699680A (en) | Method for monitoring risk of network updated data, based on keyword extraction strategy | |
CN104702448A (en) | Method for monitoring risk of communication window outgoing data based on keyword extraction strategy | |
CN104702455A (en) | Method for monitoring risk of company published information based on keyword extraction strategy | |
CN104699683A (en) | Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy | |
CN104702453A (en) | Method for monitoring risk of data received via printer interface based on keyword extraction strategy | |
CN104702640A (en) | Method for monitoring risk of data copied into company server based on keyword extraction strategy | |
CN104702452A (en) | Method for monitoring risk of parallel port received data based on keyword extraction strategy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150610 |