CN104700034A - Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy - Google Patents

Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy Download PDF

Info

Publication number
CN104700034A
CN104700034A CN201310656098.1A CN201310656098A CN104700034A CN 104700034 A CN104700034 A CN 104700034A CN 201310656098 A CN201310656098 A CN 201310656098A CN 104700034 A CN104700034 A CN 104700034A
Authority
CN
China
Prior art keywords
data
net dish
uploaded
keyword extraction
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310656098.1A
Other languages
Chinese (zh)
Inventor
王榕英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DALIAN DONGPU MECHANICAL & ELECTRICAL Co Ltd
Original Assignee
DALIAN DONGPU MECHANICAL & ELECTRICAL Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DALIAN DONGPU MECHANICAL & ELECTRICAL Co Ltd filed Critical DALIAN DONGPU MECHANICAL & ELECTRICAL Co Ltd
Priority to CN201310656098.1A priority Critical patent/CN104700034A/en
Publication of CN104700034A publication Critical patent/CN104700034A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a method for monitoring the risk of uploaded network disk data, based on a keyword extraction strategy. The method is characterized by comprising the following steps: a main control unit monitors company network interface transmitted data in real time; once an active unit finds out that cache data in a data cache server is new uploaded network disk data, the active unit stops the transmission of the data and meanwhile sends the uploaded network disk data to a keyword extraction server; the keyword extraction server performs keyword extraction on the uploaded network disk data through a set keyword extraction algorithm and performs confluence analysis, and once the active unit finds out that the uploaded network disk data contains confidential information of company, the active unit immediately stops the transmission of the uploaded network disk data; if a confidential information checking server does not find out that the uploaded network disk data contains confidential information of company, the active unit sends the uploaded network disk data to an extranet. The method has the characteristics of convenience in use, high processing speed, easiness in realizing the technology and the like.

Description

Based on keyword extraction strategy to the method uploading net dish data Risk Monitoring
Technical field
The present invention relates to based on keyword extraction strategy the method uploading net dish data Risk Monitoring.
Background technology
Along with the popularity of modernization of business, the information such as product information, contract contact mutual, has abandoned paper document substantially, mostly adopts electronic data to transmit.Wherein a lot of information relates to great commercial or private secret, needs to guarantee its safety.The major product of current IP Security protection has: fire wall, networking xegregating unit, intrusion detection, anti-virus etc.; The major product of application layer security protection has: safety certification, uniform authorization etc.; The major product of server layer security protection has: server protection, anti-virus, intrusion detection, main frame audit etc.; The major product of data Layer security protection has: database security enhancing, database audit, document protection etc., data Layer security protection is last one security barriers of the data deposited in server itself, if the security protection of network layer, application layer and server layer is broken.Along with the development of electronic information technology, the software and hardware of a lot of spy's character is open to be peddled on the net.And therefore how enterprise is effectively protected by the data in data transmission procedure, be with settled problem at present.In addition, the confirmation of data security, should be accurate, guarantees quick again.
Key word is exactly word or word that user inputs when using search engine, that at utmost can summarize the information content that user will search, is generalization and the centralization of information.Unresolved the problems referred to above provide the possibility that technology realizes.
Summary of the invention
The present invention is directed to the proposition of above problem, and develop based on keyword extraction strategy the method uploading net dish data Risk Monitoring.The technical solution used in the present invention is as follows:
Based on keyword extraction strategy to the method uploading net dish data Risk Monitoring, it is characterized in that comprising the steps:
1) main control unit is monitored in real time to corporate networks interface transmission data, and the net dish data of uploading being sent to corporate networks interface are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new upload net dish data, just stop the transmission of these data, this is uploaded net dish data simultaneously and be sent in keyword extraction server;
3) described keyword extraction server is uploaded net dish data by the keyword extraction algorithms that sets carry out keyword extraction to this, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that this is uploaded net dish data and contains company's secret, active cell immediately terminal this time uploads the transmission of net dish data, reports to the police simultaneously;
4) if confidential information checks server do not find that this is uploaded net dish data and contains company's secret, then active cell will be uploaded net dish data and will be sent on net dish.
Also comprise in step 4):
Main control unit will uploaded while net dish data send to net dish, to the step uploaded net dish data and back up.
Owing to have employed technique scheme, method provided by the invention has: easy to use, processing speed, technology realize the features such as easy.In addition, the method is based on the realization of computer system, and only the method need be compiled into the upgrading that corresponding program can realize active computer, therefore its cost is very cheap is suitable for extensive popularization.
Accompanying drawing explanation
Fig. 1 is the structured flowchart of system of the present invention;
Fig. 2 is realization flow figure of the present invention.
Embodiment
The method uploading net dish data Risk Monitoring is comprised the steps: based on keyword extraction strategy as depicted in figs. 1 and 2
1) main control unit is monitored in real time to corporate networks interface transmission data, and the net dish data of uploading being sent to corporate networks interface are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new upload net dish data, just stop the transmission of these data, this is uploaded net dish data simultaneously and be sent in keyword extraction server;
3) described keyword extraction server is uploaded net dish data by the keyword extraction algorithms that sets carry out keyword extraction to this, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that this is uploaded net dish data and contains company's secret, active cell immediately terminal this time uploads the transmission of net dish data, reports to the police simultaneously;
4) if confidential information checks server do not find that this is uploaded net dish data and contains company's secret, then active cell will be uploaded net dish data and will be sent on net dish.
Also comprise in step 4): main control unit will uploaded while net dish data send to net dish, to the step uploaded net dish data and back up.
The above; be only the present invention's preferably embodiment; but protection scope of the present invention is not limited thereto; anyly be familiar with those skilled in the art in the technical scope that the present invention discloses; be equal to according to technical scheme of the present invention and inventive concept thereof and replace or change, all should be encompassed within protection scope of the present invention.

Claims (2)

1. based on keyword extraction strategy to the method uploading net dish data Risk Monitoring, it is characterized in that comprising the steps:
1) main control unit is monitored in real time to corporate networks interface transmission data, and the net dish data of uploading being sent to corporate networks interface are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new upload net dish data, just stop the transmission of these data, this is uploaded net dish data simultaneously and be sent in keyword extraction server;
3) described keyword extraction server is uploaded net dish data by the keyword extraction algorithms that sets carry out keyword extraction to this, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that this is uploaded net dish data and contains company's secret, active cell immediately terminal this time uploads the transmission of net dish data, reports to the police simultaneously;
4) if confidential information checks server do not find that this is uploaded net dish data and contains company's secret, then active cell will be uploaded net dish data and will be sent on net dish.
2. according to claim 1 a kind of based on keyword extraction strategy to the method uploading net dish data Risk Monitoring, it is characterized in that also comprising in step 4):
Main control unit will uploaded while net dish data send to net dish, to the step uploaded net dish data and back up.
CN201310656098.1A 2013-12-04 2013-12-04 Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy Pending CN104700034A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310656098.1A CN104700034A (en) 2013-12-04 2013-12-04 Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310656098.1A CN104700034A (en) 2013-12-04 2013-12-04 Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy

Publications (1)

Publication Number Publication Date
CN104700034A true CN104700034A (en) 2015-06-10

Family

ID=53347135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310656098.1A Pending CN104700034A (en) 2013-12-04 2013-12-04 Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy

Country Status (1)

Country Link
CN (1) CN104700034A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483422A (en) * 2017-08-03 2017-12-15 深信服科技股份有限公司 Leakage of data retroactive method, equipment and computer-readable recording medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483422A (en) * 2017-08-03 2017-12-15 深信服科技股份有限公司 Leakage of data retroactive method, equipment and computer-readable recording medium
CN107483422B (en) * 2017-08-03 2020-10-27 深信服科技股份有限公司 Data leakage tracing method and device and computer readable storage medium

Similar Documents

Publication Publication Date Title
US20240250995A1 (en) Cybersecurity reconnaissance, analysis, and scoring using distributed systems
US20240305671A1 (en) Self-adjusting cybersecurity analysis and score generation
US10623431B2 (en) Discerning psychological state from correlated user behavior and contextual information
US11134087B2 (en) System identifying ingress of protected data to mitigate security breaches
CN104871484A (en) System and method for an endpoint hardware assisted network firewall in a security environment
US20220060512A1 (en) System and methods for automatically assessing and improving a cybersecurity risk score
US20240244090A1 (en) Cybersecurity analysis and protection using distributed systems
CN106022080A (en) Cipher card based on PCIe (peripheral component interface express) interface and data encryption method of cipher card
Vignesh Saravanan et al. Data protection and security enhancement in cyber-physical systems using AI and blockchain
Magare et al. Security and privacy issues in smart city: Threats and their countermeasures
CN104702451A (en) Method for monitoring risk of sent public mail based on keyword extraction strategy
CN104702454A (en) Method for monitoring risks of QQ transmitted data based on keyword extraction strategy
CN104700034A (en) Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy
CN104702456A (en) Method for monitoring local area network transmission data risk based on keyword extraction strategy
KR101370511B1 (en) Method and apparatus for inspecting packet by using meta-data classification
CN104699703A (en) Method for monitoring risk of database received data, based on keyword extraction strategy
CN104700035A (en) Method for monitoring risk of USB interface copied data, based on keyword extraction strategy
Arya et al. Integrating IoT with cloud computing and big data analytics: Security perspective
CN104699680A (en) Method for monitoring risk of network updated data, based on keyword extraction strategy
CN104702448A (en) Method for monitoring risk of communication window outgoing data based on keyword extraction strategy
CN104702455A (en) Method for monitoring risk of company published information based on keyword extraction strategy
CN104699683A (en) Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy
CN104702453A (en) Method for monitoring risk of data received via printer interface based on keyword extraction strategy
CN104702640A (en) Method for monitoring risk of data copied into company server based on keyword extraction strategy
CN104702452A (en) Method for monitoring risk of parallel port received data based on keyword extraction strategy

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150610