CN106789964A - Cloud resource pool data safety detection method and system - Google Patents

Cloud resource pool data safety detection method and system Download PDF

Info

Publication number
CN106789964A
CN106789964A CN201611102263.9A CN201611102263A CN106789964A CN 106789964 A CN106789964 A CN 106789964A CN 201611102263 A CN201611102263 A CN 201611102263A CN 106789964 A CN106789964 A CN 106789964A
Authority
CN
China
Prior art keywords
data
sensitive data
module
cloud resource
resource pool
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611102263.9A
Other languages
Chinese (zh)
Other versions
CN106789964B (en
Inventor
黎新川
林强
方艺
窦胜军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinjiang Co Ltd china Mobile Communication Group Corp
Original Assignee
Xinjiang Co Ltd china Mobile Communication Group Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinjiang Co Ltd china Mobile Communication Group Corp filed Critical Xinjiang Co Ltd china Mobile Communication Group Corp
Priority to CN201611102263.9A priority Critical patent/CN106789964B/en
Publication of CN106789964A publication Critical patent/CN106789964A/en
Application granted granted Critical
Publication of CN106789964B publication Critical patent/CN106789964B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of cloud resource pool data safety detection method, the method includes:Obtain the sensitive data formulated;The derivation data that acquisition is drained from cloud resource pool;Scan and recognize the sensitive data derived in data;Sensitive data life cycle is set up, differentiated control is carried out to sensitive data;Sensitive data host's virtual machine in crawl cloud resource environment, traffic policing is carried out to it;The abnormal operation behavior of analysis sensitive data and sensitive data host's virtual machine, sends alarm.In addition, present invention also offers a kind of cloud resource pool sensitive data safety detecting system, including control module, acquisition module, processing module, administration module, Audit Module.Realized under cloud computing environment in domain using the present invention and cross-domain virtual machine business datum transfer the establishment of all kinds of sensitive datas in transmission, service interaction and transition process, production, using, the Life cycle security management and control of each link such as destroy, note abnormalities and unlawful practice.

Description

Cloud resource pool data safety detection method and system
Technical field
The invention belongs to field of information security technology, and in particular to a kind of cloud resource pool data safety detection guard system and Its method.
Background technology
It is exactly to form resource virtualizing that cloud resource pool builds topmost difference in terms of system composition with traditional platform Unified resource pool, simplifies the configuration and management of resource, the utilization rate of hardware is improved, so as to realize flexibility and the bullet of cloud computing Property.The introducing of virtual level makes the security protection system with access control as core build protection system with traditional business platform to be had A great difference, in addition to including traditional Host Security, network security etc., in addition it is also necessary to pacify comprising virtualization special in cloud computing Entirely.
In cloud resource pool, the multiple operation system main frame such as CRM saves the interactive log of UIP daily records and CRM, and Comprising crucial sensitive datas such as user profile, payment, credit rating, peripheral collection charges daily records, part main frame also saving business system Final program code before system renewal.At present for the middle sensitive data safety of cloud resource pool environment, not over technological means Protection and monitoring, transmission, storage and data protection for sensitive data in virtualization pool etc., are badly in need of complete set Security protection and monitoring to sensitive data are realized in construction scheme.
The content of the invention
The technical problems to be solved by the invention are by the management to sensitive data in cloud resource pool environment and monitor, real Now to the management and monitoring of each life cycle of cloud resource pool sensitive data, it is to avoid unauthorized person obtains quick by technological means Sense data, cause information leakage equivalent risk.
To solve the above problems, the invention provides a kind of cloud resource pool data safety detection method, comprise the following steps:
S1:Obtain the sensitive data formulated;
S2:The derivation data that acquisition is drained from cloud resource pool;
S3:Scan and recognize the sensitive data derived in data;
S4:Sensitive data life cycle is set up, differentiated control is carried out to sensitive data;
S5:Sensitive data host's virtual machine in crawl cloud resource environment, traffic policing is carried out to it;
S6:The abnormal operation behavior of analysis sensitive data and sensitive data host's virtual machine, sends alarm.
Further, obtaining the step of data are derived described in S2 includes:
S201:The target data in cloud resource pool is captured in real time;
S202:The target data of crawl is filtered, and forwards the data to the target location in designated virtual machine.
Further, the S3 specifically includes following steps:
S301:Derivation data described in scanning S202 in target location;
S302:With the sensitive data matched in S1 in identification derivation data, library storage is incorporated to;
S303:With unmatched nonsensitive data in S1 in identification derivation data, destruction label is carried out to nonsensitive data Mark.
Further, the sensitivity in data is derived using keyword, regular expression, file fingerprint or file MD5 identification Data.
Further, the nonsensitive data for destroying mark is indicated in the S303 and passes through erasing instrument before virtual machine is offline Deleted.Realizing the data that virtual machine needs are desensitized or destroyed carries out tagging management, realizes the storehouse of format data Desensitized outside interior and storehouse
Further, the S4 carries out differentiated control using clustering algorithm to sensitive data.
Further, the S5 is specifically included to the transmission channel monitoring of sensitive data host's virtual machine and network connection shape State, obtains sensitive data abnormal transmission, comprises the following steps that:
S501:Data transfer between identification, scanning sensitive data host's virtual machine host port, obtains sensitive data different Often transmission;
S502:Monitoring sensitive data deposits the port connection state of virtual machine host, obtains abnormal link information;
S503:Monitoring sensitive data host's virtual machine host network connection state, obtains abnormal network access request.
In addition, present invention also offers a kind of cloud resource pool sensitive data safety detecting system, including control module, collection Module, processing module, administration module, Audit Module;
Wherein, the control module:For defining sensitive data and being issued to each functional module;
The acquisition module:Data for will need detection are exported in physical security apparatus from cloud resource pool;
The sensitive data administration module:For scanning the derivation data in the acquisition module, identification is derived in data Sensitive data, and realize the differentiated control of sensitive data, and feed back to Audit Module;
The safe traffic monitoring module:For capturing sensitive data host's virtual machine in cloud resource pool, real-time monitoring is quick Feel the flow of data sink host virtual machine, and feed back to Audit Module;
The Audit Module:For receiving modules feedack, analysis sensitive data and sensitive data host are empty The abnormal operation behavior of plan machine, sends alarm.
Further, the acquisition module includes virtual flow guiding machine and SDN switch;
Wherein, the virtual flow guiding machine derives target data in cloud resource pool to SDN switch, the SDN switch Target data is forwarded to specified target location.The data of monitoring will be needed to be led from virtual network environment by virtual flow guiding machine Go out in physical security apparatus, specific safety service logic is processed by physical security apparatus.This mode is to business and net Network influence is small, and processing safety service with physical security apparatus can obtain high performance so that the treatment of virtual flow guiding machine is patrolled Collecting becomes very simple, it is only necessary to take a small amount of virtual resources.
Further, the sensitive data management module includes scan components, recognizer component, erasing component, classification component;
The scan components:For scanning the data in the acquisition module;
The recognizer component:For sensitive data and nonsensitive data in data after identification scanning;
The erasing component:For wiping nonsensitive data;
The classification component:Different stage sensitive data for will identify that carries out differentiated control.
Further, the classification component carries out differentiated control using clustering algorithm to different sensitive datas.
Further, the safe traffic monitoring module includes host port monitoring module, transmission channel monitoring module, master Machine interconnecting relation module;
Wherein, the host port monitoring module:For monitoring sensitive data host's virtual machine host port connection state;
The transmission channel monitoring module:For monitoring the data transfer shape between sensitive data host's virtual machine port State;
The main frame interconnecting relation module:For monitoring sensitive data virtual machine host network connection state.
Further, the Audit Module includes receiver module, analysis module;
Wherein, the receiver module:Feedback information for receiving each functional module;
The analysis module:For analyzing the abnormal behaviour in feedback information, and alerted.
The present invention compared with prior art, has the following advantages and advantages:
1st, the present invention is with good expansibility, and possesses flexible System Framework;
2nd, the present invention realizes the identification of cloud resource pool environment lower network layer and host layer Life cycle sensitive data;
3rd, the present invention realizes classification, the Classification Management to sensitive data, and the state to sensitive data is monitored and pipe Reason, shows sensitive data distribution and the state under each life cycle scene;
4th, the present invention needs to desensitize to virtual machine or the data of destruction carry out tagging management, realizes the storehouse of format data Desensitized outside interior and storehouse;
5th, the present invention realizes traffic monitoring under cloud resource pool environment, to cloud resource pool in all fictitious host computers, it is real Transmission now to sensitive data, access, the real-time status monitoring of access port connection, to the port of sensitive data host's virtual machine With business information flow monitoring, note abnormalities and unlawful practice.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding the embodiment of the present invention, constitutes of the application Point, do not constitute the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is method of the present invention FB(flow block);
Fig. 2 is system block diagram of the invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention become more apparent, with reference to embodiment and accompanying drawing, to this Invention is described in further detail, and exemplary embodiment of the invention and its explanation are only used for explaining the present invention, do not make It is limitation of the invention.
In cloud resource pool, fictitious host computer is dynamically generated using shared resource, be there are shared preceding data and is not wiped free of, data Unencryption is transmitted, and the possibility of sensitive data is revealed by data decryptor, recovery technology.Realize in domain under cloud computing environment and across Domain virtual machine business datum transfers the establishment of all kinds of sensitive datas in transmission and transition process, production, uses each rings such as, destruction The Life cycle security management and control of section.Each virtual machine transmitting procedure and storage of the monitoring in each link of data life period are related to Any class sensitive data;To sensitive data transmission, classification, and the label for needing to destroy, secure erasure are stamped to virtual machine, it is to avoid empty Plan machine is shared rear data recovery.Meanwhile, the transmission monitor in real time to sensitive data host's virtual machine is realized, note abnormalities and disobey Rule behavior, it is to avoid violation or unauthorized person steal sensitive data by modes such as network access, convert channel, unconventional ports.
As shown in figure 1, the invention provides a kind of cloud resource pool data safety detection method, comprising the following steps:
Step S1:Obtain the sensitive data formulated;
Sensitive data and sensitive data grade scale are formulated according to data type, data content according to business demand, is such as pressed It is divided into one-level, the different brackets such as two grades according to sensitivity level;It is divided into the different brackets such as extremely important, important according to security attribute; It is divided into strictly limited, confidential information, internal information according to level of security, limiter stage, is related to privacy, authorizes level, sensitivity level etc. no Same level.
S2:The derivation data that acquisition is drained from cloud resource pool;
To need the flow of monitoring that physical security apparatus are exported to from virtual network environment using by virtual flow guiding machine Principle, specific safety service logic is processed by physical security apparatus.This mode is to customer service and web influence It is small;Processing safety service with physical security apparatus can obtain high performance so that the treatment logic of virtual flow guide system becomes Obtain very simple, it is only necessary to take a small amount of virtual resources.
According to this principle, by S201:The target data in cloud resource pool is captured in real time;The number of targets of S202 filtering crawls According to, and the target location in designated virtual machine is forwarded the data to, realization drains derivation data from first resource pool.
S3:Scan and recognize the sensitive data derived in data;
By S301:Derivation data described in scanning S202 in target location;S302:Identification derive data in S1 in The sensitive data of matching, is incorporated to library storage;S303:With unmatched nonsensitive data in S1 in identification derivation data, to non-quick Sense data carry out destruction tag identifier.
Existing cloud resource pool fictitious host computer template is changed, embedded sensitive data scanning account carry out it is automatic find it is newly-increased, Newly-built fictitious host computer.Sensitive data scanning is carried out by scanning strategy, sensitive data scans through agent and is scanned, Agent clients are mourned in silence installation on computers, and are observed in the way of " onlooker " and recorded employee to computer, file, software Using operation, and be sent to service end;Service end (file signature, sensitive word identification and weight analysis, just in several ways Then expression formula filtering) the sensitive confidential information of identification, it is incorporated to stock's shelves;Service end draws personnel, text by data summarization and analysis The trend of part, security incident these three dimensions, and defined by corresponding security strategy, the operation to user is identified, from And it is confirmed whether there is risk of divulging a secret.Sensitive data concerning security matters identification technology uses keyword, regular expression, file fingerprint, text Part MD5 is identified to sensitive document.
Cause sensitive information leakage during the data sharing of cloud resource pool virtual machine, realized by sensitive information identification technology Desensitization, destruction and tagging management to data.So as to the reliability " zero " for realizing virtual data is wiped.To prevent virtual machine from existing It is resumed after offline or leaking data that share and access causes, identification information is entered using accumulation layer sensitive data management and control module Row erasing operation, lifts the technical difficulty recovered, and succeeding state to virtual machine is monitored and tracks.
S4:Sensitive data life cycle is set up, differentiated control is carried out to sensitive data;
Sensitive data discovery, using efficient clustering algorithm, can be classified with classification for sensitive data, pipe of classifying Reason, the document triggering different event action of different security level.Each can be showed with reference to sensitive data asset life-cycle scene The sensitive document or sensitive data state in stage.
S5:Sensitive data host's virtual machine in crawl cloud resource environment, traffic policing is carried out to it;
By S501:Data transfer between identification, scanning sensitive data host's virtual machine host port, obtains sensitive number According to abnormal transmission;S502:Monitoring sensitive data deposits the port connection state of virtual machine host, obtains abnormal connection letter Breath;S503:Monitoring sensitive data host's virtual machine host network connection state, obtains abnormal network access request.
By virtual air deflector is drained come flow, crawl cloud resource pool environment in sensitive data host's virtual machine, Data interaction, transmission, the business information stream of the own security domain of each subdomain, security domain and other enterprises, form inside security domain Visual interconnected relationship view.The discovery and real-time traffic monitoring of virtual machine are realized, in combination with APT and conjunction rule thinking, and Shi Faxian does not conform to the connection behavior of rule, ensures Host Security.
S6:The abnormal operation behavior of analysis sensitive data and sensitive data host's virtual machine, sends alarm.
Scene according to sensitive data carries out the monitoring of network traffics and database to the virtual unit for storing sensitive data And audit, the abnormal operation behavior to sensitive data is found in time.System in real time or periodically believe in monitoring cloud resource pool by sensitivity Breath is access and the alteration of Internet in accumulation layer, is analyzed with life cycle model, the safe thing of identification data Part.Data safety event will dock protection data assets, anti-norm in time by alarm or work order mode with SMP or EOMS According to leakage.
In addition, as shown in Fig. 2 present invention also offers a kind of cloud resource pool sensitive data safety detecting system, including control Molding block, acquisition module, processing module, administration module, Audit Module.
Wherein, control module is used to define sensitive data and be issued to each functional module, according to business demand according to number Sensitive data and sensitive data grade scale are formulated according to type, data content.
It is during acquisition module is used to needing the data of detection to export to physical security apparatus from cloud resource pool including virtual Flow guiding machine and SDN switch.Virtual flow guiding machine derives target data in cloud resource pool to SDN switch, the SDN switch Target data is forwarded to specified target location.The data of monitoring will be needed to be led from virtual network environment by virtual flow guiding machine Go out in physical security apparatus, specific safety service logic is processed by physical security apparatus.This mode is to business and net Network influence is small, and processing safety service with physical security apparatus can obtain high performance so that the treatment of virtual flow guiding machine is patrolled Collecting becomes very simple, it is only necessary to take a small amount of virtual resources.
Sensitive data administration module is used to scan the derivation data in the acquisition module, and the sensitivity in data is derived in identification Data, and the differentiated control of sensitive data is realized, and feed back to Audit Module;Including scan components, recognizer component, erasing group Part, classification component.Scan components are used to scan the data in the acquisition module;Recognizer component is used for after identification is scanned in data Sensitive data and nonsensitive data;Erasing component is used to wipe nonsensitive data;Classification component will be recognized using clustering algorithm The different stage sensitive data for going out carries out differentiated control.
Safe traffic monitoring module is used to capture sensitive data host's virtual machine, real-time monitoring sensitive data in cloud resource pool The flow of host's virtual machine, and feed back to Audit Module.Safe traffic monitoring module includes that host port monitoring module, transmission are logical Road monitoring module, main frame interconnecting relation module.Wherein, host port monitoring module:For monitoring sensitive data host's virtual machine Host port connection status;Transmission channel monitoring module:Passed for monitoring the data between sensitive data host's virtual machine port Defeated state;Main frame interconnecting relation module:For monitoring sensitive data virtual machine host network connection state.
Audit Module:For receiving modules feedack, sensitive data and sensitive data host's virtual machine are analyzed Abnormal operation behavior, send alarm.Audit Module includes receiver module, analysis module.Wherein, the receiver module is used to connect Receive the feedback information of each functional module;Analysis module is used to analyze the abnormal behaviour in feedback information, and is alerted.
The present invention realizes each life cycle to cloud resource pool sensitive data by the management to sensitive data and monitoring Management and monitoring, protection sensitive data illegally leaks, and pair can be realized instant with outgoing and the access operation behavior of sensitive data Auditing and supervisory, alarm and blocking.By scanning recognition technology, the identification to cloud resource pool sensitive data and mark, set up full life Cycle monitoring administrative model;Classification, the Classification Management to sensitive data are realized, the state to sensitive data is monitored and pipe Reason, shows sensitive data distribution and the state under each life cycle scene;The data for desensitizing or destroying are needed to enter virtual machine Row labelization is managed, and realizes being desensitized outside in the storehouse of format data and storehouse;Realize the interconnection shape to sensitive data host's virtual machine State and transmission channel are monitored, and implementation discovers whether that illegal external connection transmits sensitive data;Realize to sensitive data host's virtual machine Port and business information flow monitoring, note abnormalities and unlawful practice.
Above-described specific embodiment, has been carried out further to the purpose of the present invention, technical scheme and beneficial effect Describe in detail, should be understood that and the foregoing is only specific embodiment of the invention, be not intended to limit the present invention Protection domain, all any modification, equivalent substitution and improvements within the spirit and principles in the present invention, done etc. all should include Within protection scope of the present invention.

Claims (13)

1. cloud resource pool data safety detection method, it is characterised in that comprise the following steps:
S1:Obtain the sensitive data formulated;
S2:The derivation data that acquisition is drained from cloud resource pool;
S3:Scan and recognize the sensitive data derived in data;
S4:Sensitive data life cycle is set up, differentiated control is carried out to sensitive data;
S5:Sensitive data host's virtual machine in crawl cloud resource environment, traffic policing is carried out to it;
S6:The abnormal operation behavior of analysis sensitive data and sensitive data host's virtual machine, sends alarm.
2. cloud resource pool data safety detection method according to claim 1, it is characterised in that obtain and derived described in S2 The step of data, includes:
S201:The target data in cloud resource pool is captured in real time;
S202:The target data of crawl is filtered, and forwards the data to the target location in designated virtual machine.
3. cloud resource pool data safety detection method according to claim 1 and 2, it is characterised in that the S3 is specifically wrapped Include following steps:
S301:Derivation data described in scanning S202 in target location;
S302:With the sensitive data matched in S1 in identification derivation data, library storage is incorporated to;
S303:With unmatched nonsensitive data in S1 in identification derivation data, destruction tag identifier is carried out to nonsensitive data.
4. cloud resource pool sensitive data detection method according to claim 3, it is characterised in that using keyword, canonical The sensitive data in data is derived in expression formula, file fingerprint or file MD5 identification.
5. cloud resource pool data safety detection method according to claim 3, it is characterised in that indicate pin in the S303 The nonsensitive data for ruining mark is deleted before virtual machine is offline by erasing instrument.
6. cloud resource pool data safety detection method according to claim 1, it is characterised in that the S4 is calculated using cluster Method carries out differentiated control to sensitive data.
7. cloud resource pool data safety detection method according to claim 1, it is characterised in that it is right that the S5 is specifically included The transmission channel monitoring of sensitive data host's virtual machine and network connection state, obtain sensitive data abnormal transmission, specific steps It is as follows:
S501:Data transfer between identification, scanning sensitive data host's virtual machine host port, obtains sensitive data and passes extremely It is defeated;
S502:Monitoring sensitive data deposits the port connection state of virtual machine host, obtains abnormal link information;
S503:Monitoring sensitive data host's virtual machine host network connection state, obtains abnormal network access request.
8. cloud resource pool sensitive data safety detecting system, it is characterised in that including control module, acquisition module, processing module, Administration module, Audit Module;
Wherein, the control module:For defining sensitive data and being issued to each functional module;
The acquisition module:Data for will need detection are exported in physical security apparatus from cloud resource pool;
The sensitive data administration module:It is quick in identification derivation data for scanning the derivation data in the acquisition module Sense data, and the differentiated control of sensitive data is realized, and feed back to Audit Module;
The safe traffic monitoring module:For capturing sensitive data host's virtual machine in cloud resource pool, real-time monitoring sensitivity number According to the flow of host's virtual machine, and feed back to Audit Module;
The Audit Module:For receiving modules feedack, sensitive data and sensitive data host's virtual machine are analyzed Abnormal operation behavior, send alarm.
9. cloud resource pool sensitive data safety detecting system according to claim 8, it is characterised in that the acquisition module Including virtual flow guiding machine and SDN switch;
Wherein, the virtual flow guiding machine derives target data in cloud resource pool to SDN switch, and the SDN switch is by mesh Mark data forwarding to specified target location.
10. cloud resource pool sensitive data safety detecting system according to claim 8, it is characterised in that the sensitive number Include scan components, recognizer component, erasing component, classification component according to management module;
The scan components:For scanning the data in the acquisition module;
The recognizer component:For sensitive data and nonsensitive data in data after identification scanning;
The erasing component:For wiping nonsensitive data;
The classification component:Different stage sensitive data for will identify that carries out differentiated control.
11. cloud resource pool sensitive data safety detecting systems according to claim 10, it is characterised in that the rank groups Part carries out differentiated control using clustering algorithm to different sensitive datas.
12. cloud resource pool sensitive data safety detecting systems according to claim 8, it is characterised in that the secure flows Amount monitoring module includes host port monitoring module, transmission channel monitoring module, main frame interconnecting relation module;
Wherein, the host port monitoring module:For monitoring sensitive data host's virtual machine host port connection state;
The transmission channel monitoring module:For monitoring the data transmission state between sensitive data host's virtual machine port;
The main frame interconnecting relation module:For monitoring sensitive data virtual machine host network connection state.
13. cloud resource pool sensitive data safety detecting systems according to claim 8, it is characterised in that the audit mould Block includes receiver module, analysis module;
Wherein, the receiver module:Feedback information for receiving each functional module;
The analysis module:For analyzing the abnormal behaviour in feedback information, and alerted.
CN201611102263.9A 2016-12-02 2016-12-02 Cloud resource pool data security detection method and system Expired - Fee Related CN106789964B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611102263.9A CN106789964B (en) 2016-12-02 2016-12-02 Cloud resource pool data security detection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611102263.9A CN106789964B (en) 2016-12-02 2016-12-02 Cloud resource pool data security detection method and system

Publications (2)

Publication Number Publication Date
CN106789964A true CN106789964A (en) 2017-05-31
CN106789964B CN106789964B (en) 2020-10-16

Family

ID=58883709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611102263.9A Expired - Fee Related CN106789964B (en) 2016-12-02 2016-12-02 Cloud resource pool data security detection method and system

Country Status (1)

Country Link
CN (1) CN106789964B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107944283A (en) * 2017-11-15 2018-04-20 中国农业银行股份有限公司 A kind of data sensitive recognition methods and device
CN108038373A (en) * 2017-12-20 2018-05-15 北京明朝万达科技股份有限公司 A kind of data scanning method and system for cloud terminal
CN108133143A (en) * 2017-12-12 2018-06-08 北京明朝万达科技股份有限公司 A kind of data leakage prevention method and system of facing cloud desktop application environment
CN108763245A (en) * 2018-03-28 2018-11-06 北京明朝万达科技股份有限公司 A kind of document management method and system based on NTFS system file labels
CN109145630A (en) * 2017-06-19 2019-01-04 中国移动通信集团湖北有限公司 Sensitive data method for deleting, device, equipment and computer readable storage medium
CN109962891A (en) * 2017-12-25 2019-07-02 中国移动通信集团安徽有限公司 Monitor method, apparatus, equipment and the computer storage medium of cloud security
CN110020553A (en) * 2019-04-12 2019-07-16 山东浪潮云信息技术有限公司 A kind of method and system for protecting sensitive data
CN110365577A (en) * 2019-07-24 2019-10-22 北京神州绿盟信息安全科技股份有限公司 A kind of drainage system in secure resources pond
CN110958152A (en) * 2019-10-13 2020-04-03 苏州浪潮智能科技有限公司 Method, system and equipment for monitoring virtual machine service network
CN111708932A (en) * 2020-06-08 2020-09-25 中联云港数据科技股份有限公司 Cloud computing platform and scheduling and data analysis method and system thereof
WO2020234682A1 (en) * 2019-05-23 2020-11-26 International Business Machines Corporation Sensitive data management
CN112417477A (en) * 2020-11-24 2021-02-26 恒安嘉新(北京)科技股份公司 Data security monitoring method, device, equipment and storage medium
CN113360522A (en) * 2020-03-05 2021-09-07 奇安信科技集团股份有限公司 Method and device for quickly identifying sensitive data
CN113704050A (en) * 2021-07-19 2021-11-26 国网河南省电力公司信息通信公司 Virtual resource pool safety detection and monitoring system with cloud safety protection capability

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012035326A1 (en) * 2010-09-14 2012-03-22 Mastek (Uk) Ltd Method and system for data security in a cloud computing environment
CN103793646A (en) * 2014-02-14 2014-05-14 浪潮通信信息系统有限公司 Virtual machine safety monitoring method based on behavior recognition
US20140208119A1 (en) * 2013-01-21 2014-07-24 International Business Machines Corporation Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012035326A1 (en) * 2010-09-14 2012-03-22 Mastek (Uk) Ltd Method and system for data security in a cloud computing environment
US20140208119A1 (en) * 2013-01-21 2014-07-24 International Business Machines Corporation Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment
CN103793646A (en) * 2014-02-14 2014-05-14 浪潮通信信息系统有限公司 Virtual machine safety monitoring method based on behavior recognition

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘明辉: ""云环境下的敏感数据保护技术研究"", 《电信科学》 *
刘明辉: ""云环境下的敏感数据保护技术研究-"", 《电信科学》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145630A (en) * 2017-06-19 2019-01-04 中国移动通信集团湖北有限公司 Sensitive data method for deleting, device, equipment and computer readable storage medium
CN107944283B (en) * 2017-11-15 2021-01-01 中国农业银行股份有限公司 Data sensitivity identification method and device
CN107944283A (en) * 2017-11-15 2018-04-20 中国农业银行股份有限公司 A kind of data sensitive recognition methods and device
CN108133143A (en) * 2017-12-12 2018-06-08 北京明朝万达科技股份有限公司 A kind of data leakage prevention method and system of facing cloud desktop application environment
CN108038373A (en) * 2017-12-20 2018-05-15 北京明朝万达科技股份有限公司 A kind of data scanning method and system for cloud terminal
CN109962891B (en) * 2017-12-25 2021-10-22 中国移动通信集团安徽有限公司 Method, device and equipment for monitoring cloud security and computer storage medium
CN109962891A (en) * 2017-12-25 2019-07-02 中国移动通信集团安徽有限公司 Monitor method, apparatus, equipment and the computer storage medium of cloud security
CN108763245A (en) * 2018-03-28 2018-11-06 北京明朝万达科技股份有限公司 A kind of document management method and system based on NTFS system file labels
CN110020553A (en) * 2019-04-12 2019-07-16 山东浪潮云信息技术有限公司 A kind of method and system for protecting sensitive data
GB2597894A (en) * 2019-05-23 2022-02-09 Ibm Sensitive data management
WO2020234682A1 (en) * 2019-05-23 2020-11-26 International Business Machines Corporation Sensitive data management
US11182500B2 (en) 2019-05-23 2021-11-23 International Business Machines Corporation Sensitive data management
CN110365577A (en) * 2019-07-24 2019-10-22 北京神州绿盟信息安全科技股份有限公司 A kind of drainage system in secure resources pond
CN110365577B (en) * 2019-07-24 2021-10-15 绿盟科技集团股份有限公司 Drainage system of safety resource pool and safety inspection method
CN110958152A (en) * 2019-10-13 2020-04-03 苏州浪潮智能科技有限公司 Method, system and equipment for monitoring virtual machine service network
CN113360522B (en) * 2020-03-05 2023-10-31 奇安信科技集团股份有限公司 Method and device for rapidly identifying sensitive data
CN113360522A (en) * 2020-03-05 2021-09-07 奇安信科技集团股份有限公司 Method and device for quickly identifying sensitive data
CN111708932A (en) * 2020-06-08 2020-09-25 中联云港数据科技股份有限公司 Cloud computing platform and scheduling and data analysis method and system thereof
CN112417477A (en) * 2020-11-24 2021-02-26 恒安嘉新(北京)科技股份公司 Data security monitoring method, device, equipment and storage medium
CN113704050A (en) * 2021-07-19 2021-11-26 国网河南省电力公司信息通信公司 Virtual resource pool safety detection and monitoring system with cloud safety protection capability

Also Published As

Publication number Publication date
CN106789964B (en) 2020-10-16

Similar Documents

Publication Publication Date Title
CN106789964A (en) Cloud resource pool data safety detection method and system
Wang et al. An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks
CN108769048A (en) A kind of secure visualization and Situation Awareness plateform system
CN112417477A (en) Data security monitoring method, device, equipment and storage medium
CN103765432A (en) Visual component and drill down mapping
CN104509034A (en) Pattern consolidation to identify malicious activity
CN102999716A (en) virtual machine monitoring system and method
CN106961428A (en) A kind of centralized intruding detection system based on privately owned cloud platform
US20150358292A1 (en) Network security management
CN108833442A (en) A kind of distributed network security monitoring device and its method
CN103530918A (en) Management system for safe entering/exiting of bank cash box based on Internet of Things
CN108183901A (en) Host security defense physical card and its data processing method based on FPGA
CN107302530A (en) A kind of industrial control system attack detecting device and its detection method based on white list
CN111339050A (en) Centralized security audit method and system based on big data platform
Limsaiprom et al. Social network anomaly and attack patterns analysis
CN110334899A (en) A kind of enhanced operation audit method based on machine learning
CN110247888A (en) A kind of computer network security Situation Awareness platform architecture
CN115600189A (en) Commercial password application security evaluation system
CN115567241A (en) Multi-site network perception detection system
CN113923036A (en) Block chain information management method and device of continuous immune safety system
EP2911362B1 (en) Method and system for detecting intrusion in networks and systems based on business-process specification
Yeshwanth et al. Adoption and Assessment of Machine Learning Algorithms in Security Operations Centre for Critical Infrastructure
Pryshchepa et al. Modern IT problems and ways to solve them
Tafazzoli et al. Security operation center implementation on OpenStack
WO2017095017A1 (en) System and method for recognizing business information leakage situation, and storage medium including program recorded therein for processing said method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201016

Termination date: 20211202

CF01 Termination of patent right due to non-payment of annual fee