CN106789964A - Cloud resource pool data safety detection method and system - Google Patents
Cloud resource pool data safety detection method and system Download PDFInfo
- Publication number
- CN106789964A CN106789964A CN201611102263.9A CN201611102263A CN106789964A CN 106789964 A CN106789964 A CN 106789964A CN 201611102263 A CN201611102263 A CN 201611102263A CN 106789964 A CN106789964 A CN 106789964A
- Authority
- CN
- China
- Prior art keywords
- data
- sensitive data
- module
- cloud resource
- resource pool
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of cloud resource pool data safety detection method, the method includes:Obtain the sensitive data formulated;The derivation data that acquisition is drained from cloud resource pool;Scan and recognize the sensitive data derived in data;Sensitive data life cycle is set up, differentiated control is carried out to sensitive data;Sensitive data host's virtual machine in crawl cloud resource environment, traffic policing is carried out to it;The abnormal operation behavior of analysis sensitive data and sensitive data host's virtual machine, sends alarm.In addition, present invention also offers a kind of cloud resource pool sensitive data safety detecting system, including control module, acquisition module, processing module, administration module, Audit Module.Realized under cloud computing environment in domain using the present invention and cross-domain virtual machine business datum transfer the establishment of all kinds of sensitive datas in transmission, service interaction and transition process, production, using, the Life cycle security management and control of each link such as destroy, note abnormalities and unlawful practice.
Description
Technical field
The invention belongs to field of information security technology, and in particular to a kind of cloud resource pool data safety detection guard system and
Its method.
Background technology
It is exactly to form resource virtualizing that cloud resource pool builds topmost difference in terms of system composition with traditional platform
Unified resource pool, simplifies the configuration and management of resource, the utilization rate of hardware is improved, so as to realize flexibility and the bullet of cloud computing
Property.The introducing of virtual level makes the security protection system with access control as core build protection system with traditional business platform to be had
A great difference, in addition to including traditional Host Security, network security etc., in addition it is also necessary to pacify comprising virtualization special in cloud computing
Entirely.
In cloud resource pool, the multiple operation system main frame such as CRM saves the interactive log of UIP daily records and CRM, and
Comprising crucial sensitive datas such as user profile, payment, credit rating, peripheral collection charges daily records, part main frame also saving business system
Final program code before system renewal.At present for the middle sensitive data safety of cloud resource pool environment, not over technological means
Protection and monitoring, transmission, storage and data protection for sensitive data in virtualization pool etc., are badly in need of complete set
Security protection and monitoring to sensitive data are realized in construction scheme.
The content of the invention
The technical problems to be solved by the invention are by the management to sensitive data in cloud resource pool environment and monitor, real
Now to the management and monitoring of each life cycle of cloud resource pool sensitive data, it is to avoid unauthorized person obtains quick by technological means
Sense data, cause information leakage equivalent risk.
To solve the above problems, the invention provides a kind of cloud resource pool data safety detection method, comprise the following steps:
S1:Obtain the sensitive data formulated;
S2:The derivation data that acquisition is drained from cloud resource pool;
S3:Scan and recognize the sensitive data derived in data;
S4:Sensitive data life cycle is set up, differentiated control is carried out to sensitive data;
S5:Sensitive data host's virtual machine in crawl cloud resource environment, traffic policing is carried out to it;
S6:The abnormal operation behavior of analysis sensitive data and sensitive data host's virtual machine, sends alarm.
Further, obtaining the step of data are derived described in S2 includes:
S201:The target data in cloud resource pool is captured in real time;
S202:The target data of crawl is filtered, and forwards the data to the target location in designated virtual machine.
Further, the S3 specifically includes following steps:
S301:Derivation data described in scanning S202 in target location;
S302:With the sensitive data matched in S1 in identification derivation data, library storage is incorporated to;
S303:With unmatched nonsensitive data in S1 in identification derivation data, destruction label is carried out to nonsensitive data
Mark.
Further, the sensitivity in data is derived using keyword, regular expression, file fingerprint or file MD5 identification
Data.
Further, the nonsensitive data for destroying mark is indicated in the S303 and passes through erasing instrument before virtual machine is offline
Deleted.Realizing the data that virtual machine needs are desensitized or destroyed carries out tagging management, realizes the storehouse of format data
Desensitized outside interior and storehouse
Further, the S4 carries out differentiated control using clustering algorithm to sensitive data.
Further, the S5 is specifically included to the transmission channel monitoring of sensitive data host's virtual machine and network connection shape
State, obtains sensitive data abnormal transmission, comprises the following steps that:
S501:Data transfer between identification, scanning sensitive data host's virtual machine host port, obtains sensitive data different
Often transmission;
S502:Monitoring sensitive data deposits the port connection state of virtual machine host, obtains abnormal link information;
S503:Monitoring sensitive data host's virtual machine host network connection state, obtains abnormal network access request.
In addition, present invention also offers a kind of cloud resource pool sensitive data safety detecting system, including control module, collection
Module, processing module, administration module, Audit Module;
Wherein, the control module:For defining sensitive data and being issued to each functional module;
The acquisition module:Data for will need detection are exported in physical security apparatus from cloud resource pool;
The sensitive data administration module:For scanning the derivation data in the acquisition module, identification is derived in data
Sensitive data, and realize the differentiated control of sensitive data, and feed back to Audit Module;
The safe traffic monitoring module:For capturing sensitive data host's virtual machine in cloud resource pool, real-time monitoring is quick
Feel the flow of data sink host virtual machine, and feed back to Audit Module;
The Audit Module:For receiving modules feedack, analysis sensitive data and sensitive data host are empty
The abnormal operation behavior of plan machine, sends alarm.
Further, the acquisition module includes virtual flow guiding machine and SDN switch;
Wherein, the virtual flow guiding machine derives target data in cloud resource pool to SDN switch, the SDN switch
Target data is forwarded to specified target location.The data of monitoring will be needed to be led from virtual network environment by virtual flow guiding machine
Go out in physical security apparatus, specific safety service logic is processed by physical security apparatus.This mode is to business and net
Network influence is small, and processing safety service with physical security apparatus can obtain high performance so that the treatment of virtual flow guiding machine is patrolled
Collecting becomes very simple, it is only necessary to take a small amount of virtual resources.
Further, the sensitive data management module includes scan components, recognizer component, erasing component, classification component;
The scan components:For scanning the data in the acquisition module;
The recognizer component:For sensitive data and nonsensitive data in data after identification scanning;
The erasing component:For wiping nonsensitive data;
The classification component:Different stage sensitive data for will identify that carries out differentiated control.
Further, the classification component carries out differentiated control using clustering algorithm to different sensitive datas.
Further, the safe traffic monitoring module includes host port monitoring module, transmission channel monitoring module, master
Machine interconnecting relation module;
Wherein, the host port monitoring module:For monitoring sensitive data host's virtual machine host port connection state;
The transmission channel monitoring module:For monitoring the data transfer shape between sensitive data host's virtual machine port
State;
The main frame interconnecting relation module:For monitoring sensitive data virtual machine host network connection state.
Further, the Audit Module includes receiver module, analysis module;
Wherein, the receiver module:Feedback information for receiving each functional module;
The analysis module:For analyzing the abnormal behaviour in feedback information, and alerted.
The present invention compared with prior art, has the following advantages and advantages:
1st, the present invention is with good expansibility, and possesses flexible System Framework;
2nd, the present invention realizes the identification of cloud resource pool environment lower network layer and host layer Life cycle sensitive data;
3rd, the present invention realizes classification, the Classification Management to sensitive data, and the state to sensitive data is monitored and pipe
Reason, shows sensitive data distribution and the state under each life cycle scene;
4th, the present invention needs to desensitize to virtual machine or the data of destruction carry out tagging management, realizes the storehouse of format data
Desensitized outside interior and storehouse;
5th, the present invention realizes traffic monitoring under cloud resource pool environment, to cloud resource pool in all fictitious host computers, it is real
Transmission now to sensitive data, access, the real-time status monitoring of access port connection, to the port of sensitive data host's virtual machine
With business information flow monitoring, note abnormalities and unlawful practice.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding the embodiment of the present invention, constitutes of the application
Point, do not constitute the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is method of the present invention FB(flow block);
Fig. 2 is system block diagram of the invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention become more apparent, with reference to embodiment and accompanying drawing, to this
Invention is described in further detail, and exemplary embodiment of the invention and its explanation are only used for explaining the present invention, do not make
It is limitation of the invention.
In cloud resource pool, fictitious host computer is dynamically generated using shared resource, be there are shared preceding data and is not wiped free of, data
Unencryption is transmitted, and the possibility of sensitive data is revealed by data decryptor, recovery technology.Realize in domain under cloud computing environment and across
Domain virtual machine business datum transfers the establishment of all kinds of sensitive datas in transmission and transition process, production, uses each rings such as, destruction
The Life cycle security management and control of section.Each virtual machine transmitting procedure and storage of the monitoring in each link of data life period are related to
Any class sensitive data;To sensitive data transmission, classification, and the label for needing to destroy, secure erasure are stamped to virtual machine, it is to avoid empty
Plan machine is shared rear data recovery.Meanwhile, the transmission monitor in real time to sensitive data host's virtual machine is realized, note abnormalities and disobey
Rule behavior, it is to avoid violation or unauthorized person steal sensitive data by modes such as network access, convert channel, unconventional ports.
As shown in figure 1, the invention provides a kind of cloud resource pool data safety detection method, comprising the following steps:
Step S1:Obtain the sensitive data formulated;
Sensitive data and sensitive data grade scale are formulated according to data type, data content according to business demand, is such as pressed
It is divided into one-level, the different brackets such as two grades according to sensitivity level;It is divided into the different brackets such as extremely important, important according to security attribute;
It is divided into strictly limited, confidential information, internal information according to level of security, limiter stage, is related to privacy, authorizes level, sensitivity level etc. no
Same level.
S2:The derivation data that acquisition is drained from cloud resource pool;
To need the flow of monitoring that physical security apparatus are exported to from virtual network environment using by virtual flow guiding machine
Principle, specific safety service logic is processed by physical security apparatus.This mode is to customer service and web influence
It is small;Processing safety service with physical security apparatus can obtain high performance so that the treatment logic of virtual flow guide system becomes
Obtain very simple, it is only necessary to take a small amount of virtual resources.
According to this principle, by S201:The target data in cloud resource pool is captured in real time;The number of targets of S202 filtering crawls
According to, and the target location in designated virtual machine is forwarded the data to, realization drains derivation data from first resource pool.
S3:Scan and recognize the sensitive data derived in data;
By S301:Derivation data described in scanning S202 in target location;S302:Identification derive data in S1 in
The sensitive data of matching, is incorporated to library storage;S303:With unmatched nonsensitive data in S1 in identification derivation data, to non-quick
Sense data carry out destruction tag identifier.
Existing cloud resource pool fictitious host computer template is changed, embedded sensitive data scanning account carry out it is automatic find it is newly-increased,
Newly-built fictitious host computer.Sensitive data scanning is carried out by scanning strategy, sensitive data scans through agent and is scanned,
Agent clients are mourned in silence installation on computers, and are observed in the way of " onlooker " and recorded employee to computer, file, software
Using operation, and be sent to service end;Service end (file signature, sensitive word identification and weight analysis, just in several ways
Then expression formula filtering) the sensitive confidential information of identification, it is incorporated to stock's shelves;Service end draws personnel, text by data summarization and analysis
The trend of part, security incident these three dimensions, and defined by corresponding security strategy, the operation to user is identified, from
And it is confirmed whether there is risk of divulging a secret.Sensitive data concerning security matters identification technology uses keyword, regular expression, file fingerprint, text
Part MD5 is identified to sensitive document.
Cause sensitive information leakage during the data sharing of cloud resource pool virtual machine, realized by sensitive information identification technology
Desensitization, destruction and tagging management to data.So as to the reliability " zero " for realizing virtual data is wiped.To prevent virtual machine from existing
It is resumed after offline or leaking data that share and access causes, identification information is entered using accumulation layer sensitive data management and control module
Row erasing operation, lifts the technical difficulty recovered, and succeeding state to virtual machine is monitored and tracks.
S4:Sensitive data life cycle is set up, differentiated control is carried out to sensitive data;
Sensitive data discovery, using efficient clustering algorithm, can be classified with classification for sensitive data, pipe of classifying
Reason, the document triggering different event action of different security level.Each can be showed with reference to sensitive data asset life-cycle scene
The sensitive document or sensitive data state in stage.
S5:Sensitive data host's virtual machine in crawl cloud resource environment, traffic policing is carried out to it;
By S501:Data transfer between identification, scanning sensitive data host's virtual machine host port, obtains sensitive number
According to abnormal transmission;S502:Monitoring sensitive data deposits the port connection state of virtual machine host, obtains abnormal connection letter
Breath;S503:Monitoring sensitive data host's virtual machine host network connection state, obtains abnormal network access request.
By virtual air deflector is drained come flow, crawl cloud resource pool environment in sensitive data host's virtual machine,
Data interaction, transmission, the business information stream of the own security domain of each subdomain, security domain and other enterprises, form inside security domain
Visual interconnected relationship view.The discovery and real-time traffic monitoring of virtual machine are realized, in combination with APT and conjunction rule thinking, and
Shi Faxian does not conform to the connection behavior of rule, ensures Host Security.
S6:The abnormal operation behavior of analysis sensitive data and sensitive data host's virtual machine, sends alarm.
Scene according to sensitive data carries out the monitoring of network traffics and database to the virtual unit for storing sensitive data
And audit, the abnormal operation behavior to sensitive data is found in time.System in real time or periodically believe in monitoring cloud resource pool by sensitivity
Breath is access and the alteration of Internet in accumulation layer, is analyzed with life cycle model, the safe thing of identification data
Part.Data safety event will dock protection data assets, anti-norm in time by alarm or work order mode with SMP or EOMS
According to leakage.
In addition, as shown in Fig. 2 present invention also offers a kind of cloud resource pool sensitive data safety detecting system, including control
Molding block, acquisition module, processing module, administration module, Audit Module.
Wherein, control module is used to define sensitive data and be issued to each functional module, according to business demand according to number
Sensitive data and sensitive data grade scale are formulated according to type, data content.
It is during acquisition module is used to needing the data of detection to export to physical security apparatus from cloud resource pool including virtual
Flow guiding machine and SDN switch.Virtual flow guiding machine derives target data in cloud resource pool to SDN switch, the SDN switch
Target data is forwarded to specified target location.The data of monitoring will be needed to be led from virtual network environment by virtual flow guiding machine
Go out in physical security apparatus, specific safety service logic is processed by physical security apparatus.This mode is to business and net
Network influence is small, and processing safety service with physical security apparatus can obtain high performance so that the treatment of virtual flow guiding machine is patrolled
Collecting becomes very simple, it is only necessary to take a small amount of virtual resources.
Sensitive data administration module is used to scan the derivation data in the acquisition module, and the sensitivity in data is derived in identification
Data, and the differentiated control of sensitive data is realized, and feed back to Audit Module;Including scan components, recognizer component, erasing group
Part, classification component.Scan components are used to scan the data in the acquisition module;Recognizer component is used for after identification is scanned in data
Sensitive data and nonsensitive data;Erasing component is used to wipe nonsensitive data;Classification component will be recognized using clustering algorithm
The different stage sensitive data for going out carries out differentiated control.
Safe traffic monitoring module is used to capture sensitive data host's virtual machine, real-time monitoring sensitive data in cloud resource pool
The flow of host's virtual machine, and feed back to Audit Module.Safe traffic monitoring module includes that host port monitoring module, transmission are logical
Road monitoring module, main frame interconnecting relation module.Wherein, host port monitoring module:For monitoring sensitive data host's virtual machine
Host port connection status;Transmission channel monitoring module:Passed for monitoring the data between sensitive data host's virtual machine port
Defeated state;Main frame interconnecting relation module:For monitoring sensitive data virtual machine host network connection state.
Audit Module:For receiving modules feedack, sensitive data and sensitive data host's virtual machine are analyzed
Abnormal operation behavior, send alarm.Audit Module includes receiver module, analysis module.Wherein, the receiver module is used to connect
Receive the feedback information of each functional module;Analysis module is used to analyze the abnormal behaviour in feedback information, and is alerted.
The present invention realizes each life cycle to cloud resource pool sensitive data by the management to sensitive data and monitoring
Management and monitoring, protection sensitive data illegally leaks, and pair can be realized instant with outgoing and the access operation behavior of sensitive data
Auditing and supervisory, alarm and blocking.By scanning recognition technology, the identification to cloud resource pool sensitive data and mark, set up full life
Cycle monitoring administrative model;Classification, the Classification Management to sensitive data are realized, the state to sensitive data is monitored and pipe
Reason, shows sensitive data distribution and the state under each life cycle scene;The data for desensitizing or destroying are needed to enter virtual machine
Row labelization is managed, and realizes being desensitized outside in the storehouse of format data and storehouse;Realize the interconnection shape to sensitive data host's virtual machine
State and transmission channel are monitored, and implementation discovers whether that illegal external connection transmits sensitive data;Realize to sensitive data host's virtual machine
Port and business information flow monitoring, note abnormalities and unlawful practice.
Above-described specific embodiment, has been carried out further to the purpose of the present invention, technical scheme and beneficial effect
Describe in detail, should be understood that and the foregoing is only specific embodiment of the invention, be not intended to limit the present invention
Protection domain, all any modification, equivalent substitution and improvements within the spirit and principles in the present invention, done etc. all should include
Within protection scope of the present invention.
Claims (13)
1. cloud resource pool data safety detection method, it is characterised in that comprise the following steps:
S1:Obtain the sensitive data formulated;
S2:The derivation data that acquisition is drained from cloud resource pool;
S3:Scan and recognize the sensitive data derived in data;
S4:Sensitive data life cycle is set up, differentiated control is carried out to sensitive data;
S5:Sensitive data host's virtual machine in crawl cloud resource environment, traffic policing is carried out to it;
S6:The abnormal operation behavior of analysis sensitive data and sensitive data host's virtual machine, sends alarm.
2. cloud resource pool data safety detection method according to claim 1, it is characterised in that obtain and derived described in S2
The step of data, includes:
S201:The target data in cloud resource pool is captured in real time;
S202:The target data of crawl is filtered, and forwards the data to the target location in designated virtual machine.
3. cloud resource pool data safety detection method according to claim 1 and 2, it is characterised in that the S3 is specifically wrapped
Include following steps:
S301:Derivation data described in scanning S202 in target location;
S302:With the sensitive data matched in S1 in identification derivation data, library storage is incorporated to;
S303:With unmatched nonsensitive data in S1 in identification derivation data, destruction tag identifier is carried out to nonsensitive data.
4. cloud resource pool sensitive data detection method according to claim 3, it is characterised in that using keyword, canonical
The sensitive data in data is derived in expression formula, file fingerprint or file MD5 identification.
5. cloud resource pool data safety detection method according to claim 3, it is characterised in that indicate pin in the S303
The nonsensitive data for ruining mark is deleted before virtual machine is offline by erasing instrument.
6. cloud resource pool data safety detection method according to claim 1, it is characterised in that the S4 is calculated using cluster
Method carries out differentiated control to sensitive data.
7. cloud resource pool data safety detection method according to claim 1, it is characterised in that it is right that the S5 is specifically included
The transmission channel monitoring of sensitive data host's virtual machine and network connection state, obtain sensitive data abnormal transmission, specific steps
It is as follows:
S501:Data transfer between identification, scanning sensitive data host's virtual machine host port, obtains sensitive data and passes extremely
It is defeated;
S502:Monitoring sensitive data deposits the port connection state of virtual machine host, obtains abnormal link information;
S503:Monitoring sensitive data host's virtual machine host network connection state, obtains abnormal network access request.
8. cloud resource pool sensitive data safety detecting system, it is characterised in that including control module, acquisition module, processing module,
Administration module, Audit Module;
Wherein, the control module:For defining sensitive data and being issued to each functional module;
The acquisition module:Data for will need detection are exported in physical security apparatus from cloud resource pool;
The sensitive data administration module:It is quick in identification derivation data for scanning the derivation data in the acquisition module
Sense data, and the differentiated control of sensitive data is realized, and feed back to Audit Module;
The safe traffic monitoring module:For capturing sensitive data host's virtual machine in cloud resource pool, real-time monitoring sensitivity number
According to the flow of host's virtual machine, and feed back to Audit Module;
The Audit Module:For receiving modules feedack, sensitive data and sensitive data host's virtual machine are analyzed
Abnormal operation behavior, send alarm.
9. cloud resource pool sensitive data safety detecting system according to claim 8, it is characterised in that the acquisition module
Including virtual flow guiding machine and SDN switch;
Wherein, the virtual flow guiding machine derives target data in cloud resource pool to SDN switch, and the SDN switch is by mesh
Mark data forwarding to specified target location.
10. cloud resource pool sensitive data safety detecting system according to claim 8, it is characterised in that the sensitive number
Include scan components, recognizer component, erasing component, classification component according to management module;
The scan components:For scanning the data in the acquisition module;
The recognizer component:For sensitive data and nonsensitive data in data after identification scanning;
The erasing component:For wiping nonsensitive data;
The classification component:Different stage sensitive data for will identify that carries out differentiated control.
11. cloud resource pool sensitive data safety detecting systems according to claim 10, it is characterised in that the rank groups
Part carries out differentiated control using clustering algorithm to different sensitive datas.
12. cloud resource pool sensitive data safety detecting systems according to claim 8, it is characterised in that the secure flows
Amount monitoring module includes host port monitoring module, transmission channel monitoring module, main frame interconnecting relation module;
Wherein, the host port monitoring module:For monitoring sensitive data host's virtual machine host port connection state;
The transmission channel monitoring module:For monitoring the data transmission state between sensitive data host's virtual machine port;
The main frame interconnecting relation module:For monitoring sensitive data virtual machine host network connection state.
13. cloud resource pool sensitive data safety detecting systems according to claim 8, it is characterised in that the audit mould
Block includes receiver module, analysis module;
Wherein, the receiver module:Feedback information for receiving each functional module;
The analysis module:For analyzing the abnormal behaviour in feedback information, and alerted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611102263.9A CN106789964B (en) | 2016-12-02 | 2016-12-02 | Cloud resource pool data security detection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611102263.9A CN106789964B (en) | 2016-12-02 | 2016-12-02 | Cloud resource pool data security detection method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106789964A true CN106789964A (en) | 2017-05-31 |
CN106789964B CN106789964B (en) | 2020-10-16 |
Family
ID=58883709
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611102263.9A Expired - Fee Related CN106789964B (en) | 2016-12-02 | 2016-12-02 | Cloud resource pool data security detection method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106789964B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107944283A (en) * | 2017-11-15 | 2018-04-20 | 中国农业银行股份有限公司 | A kind of data sensitive recognition methods and device |
CN108038373A (en) * | 2017-12-20 | 2018-05-15 | 北京明朝万达科技股份有限公司 | A kind of data scanning method and system for cloud terminal |
CN108133143A (en) * | 2017-12-12 | 2018-06-08 | 北京明朝万达科技股份有限公司 | A kind of data leakage prevention method and system of facing cloud desktop application environment |
CN108763245A (en) * | 2018-03-28 | 2018-11-06 | 北京明朝万达科技股份有限公司 | A kind of document management method and system based on NTFS system file labels |
CN109145630A (en) * | 2017-06-19 | 2019-01-04 | 中国移动通信集团湖北有限公司 | Sensitive data method for deleting, device, equipment and computer readable storage medium |
CN109962891A (en) * | 2017-12-25 | 2019-07-02 | 中国移动通信集团安徽有限公司 | Monitor method, apparatus, equipment and the computer storage medium of cloud security |
CN110020553A (en) * | 2019-04-12 | 2019-07-16 | 山东浪潮云信息技术有限公司 | A kind of method and system for protecting sensitive data |
CN110365577A (en) * | 2019-07-24 | 2019-10-22 | 北京神州绿盟信息安全科技股份有限公司 | A kind of drainage system in secure resources pond |
CN110958152A (en) * | 2019-10-13 | 2020-04-03 | 苏州浪潮智能科技有限公司 | Method, system and equipment for monitoring virtual machine service network |
CN111708932A (en) * | 2020-06-08 | 2020-09-25 | 中联云港数据科技股份有限公司 | Cloud computing platform and scheduling and data analysis method and system thereof |
WO2020234682A1 (en) * | 2019-05-23 | 2020-11-26 | International Business Machines Corporation | Sensitive data management |
CN112417477A (en) * | 2020-11-24 | 2021-02-26 | 恒安嘉新(北京)科技股份公司 | Data security monitoring method, device, equipment and storage medium |
CN113360522A (en) * | 2020-03-05 | 2021-09-07 | 奇安信科技集团股份有限公司 | Method and device for quickly identifying sensitive data |
CN113704050A (en) * | 2021-07-19 | 2021-11-26 | 国网河南省电力公司信息通信公司 | Virtual resource pool safety detection and monitoring system with cloud safety protection capability |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012035326A1 (en) * | 2010-09-14 | 2012-03-22 | Mastek (Uk) Ltd | Method and system for data security in a cloud computing environment |
CN103793646A (en) * | 2014-02-14 | 2014-05-14 | 浪潮通信信息系统有限公司 | Virtual machine safety monitoring method based on behavior recognition |
US20140208119A1 (en) * | 2013-01-21 | 2014-07-24 | International Business Machines Corporation | Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment |
-
2016
- 2016-12-02 CN CN201611102263.9A patent/CN106789964B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012035326A1 (en) * | 2010-09-14 | 2012-03-22 | Mastek (Uk) Ltd | Method and system for data security in a cloud computing environment |
US20140208119A1 (en) * | 2013-01-21 | 2014-07-24 | International Business Machines Corporation | Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment |
CN103793646A (en) * | 2014-02-14 | 2014-05-14 | 浪潮通信信息系统有限公司 | Virtual machine safety monitoring method based on behavior recognition |
Non-Patent Citations (2)
Title |
---|
刘明辉: ""云环境下的敏感数据保护技术研究"", 《电信科学》 * |
刘明辉: ""云环境下的敏感数据保护技术研究-"", 《电信科学》 * |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145630A (en) * | 2017-06-19 | 2019-01-04 | 中国移动通信集团湖北有限公司 | Sensitive data method for deleting, device, equipment and computer readable storage medium |
CN107944283B (en) * | 2017-11-15 | 2021-01-01 | 中国农业银行股份有限公司 | Data sensitivity identification method and device |
CN107944283A (en) * | 2017-11-15 | 2018-04-20 | 中国农业银行股份有限公司 | A kind of data sensitive recognition methods and device |
CN108133143A (en) * | 2017-12-12 | 2018-06-08 | 北京明朝万达科技股份有限公司 | A kind of data leakage prevention method and system of facing cloud desktop application environment |
CN108038373A (en) * | 2017-12-20 | 2018-05-15 | 北京明朝万达科技股份有限公司 | A kind of data scanning method and system for cloud terminal |
CN109962891B (en) * | 2017-12-25 | 2021-10-22 | 中国移动通信集团安徽有限公司 | Method, device and equipment for monitoring cloud security and computer storage medium |
CN109962891A (en) * | 2017-12-25 | 2019-07-02 | 中国移动通信集团安徽有限公司 | Monitor method, apparatus, equipment and the computer storage medium of cloud security |
CN108763245A (en) * | 2018-03-28 | 2018-11-06 | 北京明朝万达科技股份有限公司 | A kind of document management method and system based on NTFS system file labels |
CN110020553A (en) * | 2019-04-12 | 2019-07-16 | 山东浪潮云信息技术有限公司 | A kind of method and system for protecting sensitive data |
GB2597894A (en) * | 2019-05-23 | 2022-02-09 | Ibm | Sensitive data management |
WO2020234682A1 (en) * | 2019-05-23 | 2020-11-26 | International Business Machines Corporation | Sensitive data management |
US11182500B2 (en) | 2019-05-23 | 2021-11-23 | International Business Machines Corporation | Sensitive data management |
CN110365577A (en) * | 2019-07-24 | 2019-10-22 | 北京神州绿盟信息安全科技股份有限公司 | A kind of drainage system in secure resources pond |
CN110365577B (en) * | 2019-07-24 | 2021-10-15 | 绿盟科技集团股份有限公司 | Drainage system of safety resource pool and safety inspection method |
CN110958152A (en) * | 2019-10-13 | 2020-04-03 | 苏州浪潮智能科技有限公司 | Method, system and equipment for monitoring virtual machine service network |
CN113360522B (en) * | 2020-03-05 | 2023-10-31 | 奇安信科技集团股份有限公司 | Method and device for rapidly identifying sensitive data |
CN113360522A (en) * | 2020-03-05 | 2021-09-07 | 奇安信科技集团股份有限公司 | Method and device for quickly identifying sensitive data |
CN111708932A (en) * | 2020-06-08 | 2020-09-25 | 中联云港数据科技股份有限公司 | Cloud computing platform and scheduling and data analysis method and system thereof |
CN112417477A (en) * | 2020-11-24 | 2021-02-26 | 恒安嘉新(北京)科技股份公司 | Data security monitoring method, device, equipment and storage medium |
CN113704050A (en) * | 2021-07-19 | 2021-11-26 | 国网河南省电力公司信息通信公司 | Virtual resource pool safety detection and monitoring system with cloud safety protection capability |
Also Published As
Publication number | Publication date |
---|---|
CN106789964B (en) | 2020-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106789964A (en) | Cloud resource pool data safety detection method and system | |
Wang et al. | An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks | |
CN108769048A (en) | A kind of secure visualization and Situation Awareness plateform system | |
CN112417477A (en) | Data security monitoring method, device, equipment and storage medium | |
CN103765432A (en) | Visual component and drill down mapping | |
CN104509034A (en) | Pattern consolidation to identify malicious activity | |
CN102999716A (en) | virtual machine monitoring system and method | |
CN106961428A (en) | A kind of centralized intruding detection system based on privately owned cloud platform | |
US20150358292A1 (en) | Network security management | |
CN108833442A (en) | A kind of distributed network security monitoring device and its method | |
CN103530918A (en) | Management system for safe entering/exiting of bank cash box based on Internet of Things | |
CN108183901A (en) | Host security defense physical card and its data processing method based on FPGA | |
CN107302530A (en) | A kind of industrial control system attack detecting device and its detection method based on white list | |
CN111339050A (en) | Centralized security audit method and system based on big data platform | |
Limsaiprom et al. | Social network anomaly and attack patterns analysis | |
CN110334899A (en) | A kind of enhanced operation audit method based on machine learning | |
CN110247888A (en) | A kind of computer network security Situation Awareness platform architecture | |
CN115600189A (en) | Commercial password application security evaluation system | |
CN115567241A (en) | Multi-site network perception detection system | |
CN113923036A (en) | Block chain information management method and device of continuous immune safety system | |
EP2911362B1 (en) | Method and system for detecting intrusion in networks and systems based on business-process specification | |
Yeshwanth et al. | Adoption and Assessment of Machine Learning Algorithms in Security Operations Centre for Critical Infrastructure | |
Pryshchepa et al. | Modern IT problems and ways to solve them | |
Tafazzoli et al. | Security operation center implementation on OpenStack | |
WO2017095017A1 (en) | System and method for recognizing business information leakage situation, and storage medium including program recorded therein for processing said method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201016 Termination date: 20211202 |
|
CF01 | Termination of patent right due to non-payment of annual fee |