CN113190200B - Exhibition data security protection method and device - Google Patents

Exhibition data security protection method and device Download PDF

Info

Publication number
CN113190200B
CN113190200B CN202110503627.9A CN202110503627A CN113190200B CN 113190200 B CN113190200 B CN 113190200B CN 202110503627 A CN202110503627 A CN 202110503627A CN 113190200 B CN113190200 B CN 113190200B
Authority
CN
China
Prior art keywords
data
exhibitor
terminal
protection
behavior information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110503627.9A
Other languages
Chinese (zh)
Other versions
CN113190200A (en
Inventor
王炎
安江华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Magic Big Data Research Institute Co ltd
Original Assignee
Zhengzhou Magic Big Data Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Magic Big Data Research Institute Co ltd filed Critical Zhengzhou Magic Big Data Research Institute Co ltd
Priority to CN202110503627.9A priority Critical patent/CN113190200B/en
Publication of CN113190200A publication Critical patent/CN113190200A/en
Application granted granted Critical
Publication of CN113190200B publication Critical patent/CN113190200B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/1454Digital output to display device ; Cooperation and interconnection of the display device with other functional units involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays, e.g. teledisplay
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention discloses a method and a device for protecting exhibition data safety, relates to the technical field of network safety, and mainly aims to solve the problem that the existing protection efficiency for displaying data safety is poor. The method comprises the following steps: when the server side terminal and the exhibitor side terminal carry out data interaction, receiving backup data forwarded by the server side terminal, and determining behavior information of the exhibitor side terminal according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data; performing prediction processing on the behavior information according to the trained behavior prediction model; determining a data protection strategy of the service side terminal according to a processing result of the prediction processing; constructing a monitoring network model between the exhibitor terminal and the third party terminal according to the protection grade determined by the data protection strategy; and extracting interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model, and performing security verification on the interactive data based on a network protection strategy.

Description

Exhibition data security protection method and device
Technical Field
The present invention relates to the field of network security technologies, and in particular, to a method and an apparatus for protecting exhibition data security.
Background
The exhibition is a service means for promoting sales and purchase by cooperating multiple parties, and is applied by enterprise parties in various fields. In the exhibition process, no matter a host party, an exhibitor party, a service party, a purchasing party and the like, digital services on the exhibition site cannot be developed, namely, data generated by users of all parties in the exhibition are processed based on a big data technology, so that the exhibition condition is managed. Because the exhibition is offline activity involving multiple parties, the security of the exhibition data needs to be strictly controlled, so as to prevent dangerous behaviors such as network attack and the like through the exhibition data.
At present, the existing security protection mode for display data is only to identify a user party generating display data by using an identity right, and limit the authority of exhibition data generated by each user party, for example, a user enters a meeting place after determining the authority by using the identity, and uploads a server according to data generated by operations such as inputting, processing, trading and the like in the exhibition, so that the server processes the display data. However, the identity authority limit mode protects exhibition data safety, so that the use efficiency of exhibition data is greatly reduced, the processing of safety verification requirements generated by users in various aspects in exhibition in real time is limited, data safety support cannot be timely provided for different service requirements in exhibition, and the protection effectiveness of exhibition data safety is reduced.
Disclosure of Invention
In view of this, the present invention provides a method and an apparatus for protecting exhibition data security, and mainly aims to solve the problem of poor protection efficiency of the existing exhibition data security.
According to one aspect of the invention, a method for protecting exhibition data security is provided, which comprises the following steps:
when a server side terminal and a exhibitor side terminal carry out data interaction, receiving backup data forwarded by the server side terminal, and determining behavior information of the exhibitor side terminal according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data;
performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing a threshold parameter into a training sample set, screening and then performing model training;
determining a data protection strategy of the server side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance;
determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal;
and extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model, and carrying out security verification on the interactive data based on a network protection strategy so as to determine the protection operation on the interactive data.
The determining the behavior information of the exhibitor terminal according to the interactive data type, the interactive scene information and the exhibitor identifier corresponding to the backup data comprises:
determining an interactive data type, interactive scene information and a participant identifier based on the data request type, the data structure type and the data storage position of the backup data;
and matching the interactive data type, the interactive scene information and the behavior information corresponding to the exhibitor identifier according to a preset behavior mapping list, wherein the preset behavior mapping list stores mapping relations among different interactive data types, interactive scene information, exhibitor identifiers and different behavior information.
Further, before the predicting the behavior information according to the trained behavior prediction model, the method further includes:
acquiring a training sample set of the behavior information, wherein the training sample set comprises at least 60 groups of behavior information sample data;
calculating a threshold parameter according to the interactive scene information and a preset threshold function, and performing sample replacement on the behavior information sample data for at least 10 times based on the threshold parameter to obtain behavior information sample data with the threshold parameter introduced;
training a behavior prediction model based on the behavior information sample data of the introduced threshold parameter so as to perform prediction processing according to the trained behavior prediction model.
Further, before determining the data protection policy of the service party terminal according to the processing result of the prediction processing, the method further includes:
acquiring a regular expression for carrying out safety verification on behavior information in different states;
determining at least three combination relations among regular expressions for security verification according to the number of parameters in the regular expressions, and configuring the different state behavior information and the data protection strategies matched with the regular expressions based on the at least three combination relations;
the determining the data protection strategy of the service side terminal according to the processing result of the prediction processing comprises the following steps:
and if the behavior information is in an abnormal state, searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy.
Further, the determining a protection level according to a verification result of the data protection policy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and the third party terminal includes:
performing matching processing on the behavior information according to the regular expression to determine protection grades, wherein the protection grades comprise a first protection grade, a second protection grade and a third protection grade;
and screening the number of third party terminals which perform data interaction with the exhibitor terminal according to the protection grade, and establishing a monitoring network model between the exhibitor terminal and the third party terminals according to the number.
Further, the extracting the interaction data of the exhibitor terminal and the third party terminal based on the monitoring network model, and performing security verification on the interaction data based on a network protection policy includes:
extracting interactive data of the exhibitor terminal and the third party terminal in the monitoring network model, and rendering and displaying the interactive data based on an exhibition display platform;
and loading a matched network protection strategy based on the interactive data, and carrying out security verification on the interactive data, wherein the network protection strategy is a firewall strategy matched with black and white rules of different behaviors.
Further, the method further comprises:
if the verification result of the security verification of the interactive data is abnormal writing, sending a write forbidding instruction to the server side terminal, wherein the write forbidding instruction carries the identity of the exhibitor side terminal so as to indicate the server side terminal to forbid the exhibitor side terminal from receiving data;
and if the verification result of the security verification of the interactive data is abnormal reading, sending alarm information to the exhibitor terminal, wherein the alarm information carries abnormal reading prompt information to indicate that the exhibitor terminal forbids to output data to the third party terminal.
According to another aspect of the present invention, there is provided an exhibition data security protection device, comprising:
the first determining module is used for receiving backup data forwarded by the server side terminal when the server side terminal performs data interaction with the exhibitor side terminal, and determining behavior information of the exhibitor side terminal according to an interaction data type, interaction scene information and an exhibitor side identifier corresponding to the backup data;
the processing module is used for carrying out prediction processing on the behavior information according to a trained behavior prediction model, and the behavior prediction model is obtained by introducing a threshold parameter into a training sample set for screening and then carrying out model training;
a second determining module, configured to determine a data protection policy of the service party terminal according to a processing result of the prediction processing, where the data protection policy is a regular expression used for performing security verification on the behavior information by using at least three groups configured in advance;
the construction module is used for determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal;
and the verification module is used for extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model and carrying out safety verification on the interactive data based on a network protection strategy so as to determine the protection operation on the interactive data.
Further, the first determining module comprises:
the determining unit is used for determining the interactive data type, the interactive scene information and the participant identification based on the data request type, the data structure type and the data storage position for analyzing the backup data;
and the matching unit is used for matching the interactive data type, the interactive scene information and the behavior information corresponding to the exhibitor identifier according to a preset behavior mapping list, wherein the preset behavior mapping list stores mapping relations among different interactive data types, interactive scene information, exhibitor identifiers and different behavior information.
Further, the apparatus further comprises:
the first acquisition module is used for acquiring a training sample set of the behavior information, wherein the training sample set comprises at least 60 groups of behavior information sample data;
the calculation module is used for calculating a threshold parameter according to the interactive scene information and a preset threshold function, and performing sample replacement on the behavior information sample data for at least 10 times based on the threshold parameter to obtain behavior information sample data introduced with the threshold parameter;
and the training module is used for training a behavior prediction model based on the behavior information sample data with the introduced threshold parameter so as to perform prediction processing according to the trained behavior prediction model.
Further, the apparatus further comprises: a second obtaining module, a third determining module,
the second acquisition module is used for acquiring a regular expression for performing security verification on behavior information in different states;
the third determining module is configured to determine at least three combination relationships among regular expressions for security verification according to the number of parameters in the regular expressions, and configure the different-state behavior information and the data protection policy matched with the regular expression based on the at least three combination relationships;
and the second determining module is used for searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy if the behavior information is in the abnormal state.
Further, the building module comprises:
the determining unit is used for performing matching processing on the behavior information according to the regular expression to determine protection grades, and the protection grades comprise a first protection grade, a second protection grade and a third protection grade;
and the establishing unit is used for screening the number of the third party terminals which carry out data interaction with the exhibitor terminal according to the protection grade, and establishing a monitoring network model between the exhibitor terminal and the third party terminals according to the number.
Further, the verification module includes:
the extraction unit is used for extracting the interactive data of the exhibitor terminal and the third party terminal in the monitoring network model and rendering and displaying the interactive data based on an exhibition display platform;
and the verification unit is used for loading a matched network protection strategy based on the interactive data and carrying out safety verification on the interactive data, wherein the network protection strategy is a firewall strategy matched with black and white rules of different behaviors.
Further, the apparatus further comprises:
a first sending module, configured to send a write forbidding instruction to the server terminal if a verification result of performing security verification on the interactive data is abnormal write-in, where the write forbidding instruction carries an identity of the exhibitor terminal, so as to instruct the server terminal to prohibit the exhibitor terminal from receiving data;
and the second sending module is used for sending alarm information to the exhibitor terminal if the verification result of the security verification of the interactive data is abnormal reading, wherein the alarm information carries abnormal reading prompt information so as to indicate that the exhibitor terminal forbids to output data to the third party terminal.
According to another aspect of the present invention, a storage medium is provided, where at least one executable instruction is stored, and the executable instruction causes a processor to perform operations corresponding to the protection method for exhibition data security as described above.
According to still another aspect of the present invention, there is provided a terminal including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction enables the processor to execute the operation corresponding to the protection method for the exhibition data security.
By the technical scheme, the technical scheme provided by the embodiment of the invention at least has the following advantages:
the invention provides a method and a device for protecting exhibition data safety. Compared with the prior art, the embodiment of the invention receives the backup data forwarded by the server side terminal when the server side terminal and the exhibitor side terminal perform data interaction, and determines the behavior information of the exhibitor side terminal according to the interactive data type, the interactive scene information and the exhibitor side identification corresponding to the backup data; performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing threshold parameters into a training sample set and then performing model training; determining a data protection strategy of the server side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance; determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal; the interactive data of the exhibitor terminal and the third-party terminal are extracted based on the monitoring network model, and the interactive data is subjected to security verification based on a network protection strategy so as to determine the protection operation of the interactive data, thereby greatly improving the security verification efficiency of the data generated in the display, increasing the processing effectiveness of the security verification requirements generated by each user in the display in real time, and providing data security support for different service requirements in the display in time, thereby improving the protection efficiency of the display data security.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various additional advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart illustrating a method for protecting exhibition data security according to an embodiment of the present invention;
FIG. 2 is a block diagram illustrating an exhibition data security protection apparatus according to an embodiment of the present invention;
fig. 3 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
An embodiment of the present invention provides a method for protecting exhibition data security, as shown in fig. 1, the method includes:
101. when the server side terminal and the exhibitor side terminal carry out data interaction, the server side terminal receives backup data forwarded by the server side terminal, and behavior information of the exhibitor side terminal is determined according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data.
In the embodiment of the invention, the service party is a party for organizing the exhibition and providing technical support services for all users participating in the exhibition, such as an exhibition host and the like, the exhibitor is a party for providing exhibitor products in the exhibition, including but not limited to enterprises, individuals, groups and the like, for example, an enterprise is an exhibitor, generally, the service party provides data interaction services for the exhibitor through a plurality of service party terminals, and different exhibitors perform data interaction with the service party terminals through the exhibitor terminals. The third party who participates in the exhibition as a mobile can be any personal user or enterprise user, and when the third party and the exhibitor perform offline activities or transactions, the exhibitor performs data interaction with the server terminal through the exhibitor terminal so as to request the exhibition organization for safety protection processing of the display data. The current execution end is a server which is configured in the exhibition and performs data transmission with at least the server side terminal and the exhibitor side terminal, therefore, when the server side terminal performs data interaction with the exhibitor side terminal, the current execution end is used as a total processing server to receive backup data forwarded by the server side terminal, namely the backup data is backup content of interactive data generated by the server side terminal performing data interaction with the exhibitor side terminal, so as to determine behavior information of the exhibitor side terminal according to interactive data types, interactive scene information and exhibitor side identification corresponding to the backup data.
It should be noted that, because different exhibition scenarios are different in organization scenario, for example, scientific and technological product exhibition, cartoon exhibition, etc., for different scenario scenarios, the interactive data types and interactive scenario information generated by the data interaction between the service side terminal and the exhibition side terminal are different, and meanwhile, the exhibition side identifiers corresponding to different exhibition sides are also different, so that the behavior information of the data interaction between the exhibition side terminal and the service side terminal can be determined, that is, the behavior information is used for representing the behavior content of the exhibition side terminal. The exhibition party identifier is used for representing the identity of the exhibition party, the interactive data type is used for representing the classification of specific content of data interaction, for example, the interactive data type can be a downloaded data type, a stored data type and the like, and the interactive scene information is used for representing scenes of organizing exhibitions, for example, science and technology scenes, business scenes, public welfare scenes and the like, so that behavior information is determined according to different interactive data types, interactive scene information and the exhibition party identifier, and safety protection is performed.
102. And performing prediction processing on the behavior information according to the trained behavior prediction model.
For the embodiment of the invention, in order to determine whether the behavior information needs to be subjected to safety protection, the prediction processing is performed through the trained behavior prediction model. The behavior prediction model is obtained by model training after screening introduced threshold parameters to a training sample set, namely, the optimization of the training of the behavior prediction model is realized by introducing the threshold parameters to the training samples of the untrained behavior prediction model. The threshold parameter is a pre-calculated matrix parameter and is used for replacing sample data in the sample training set, so that the model training precision is improved.
It should be noted that the behavior prediction model is a machine learning model for performing prediction processing on the behavior information, and is preferably a three-layer neural network model, and the three-layer neural network model is trained based on a training sample set into which a threshold parameter is introduced to perform prediction processing on the behavior information determined in step 101.
103. And determining a data protection strategy of the server side terminal according to the processing result of the prediction processing.
In the embodiment of the invention, because the prediction processing of the behavior information is based on the processing of the behavior prediction model, and the processing result comprises the normal state and the abnormal state of the behavior information, the data protection strategy executed by the service side terminal is determined according to the processing result so as to ensure the safety protection of the service side terminal. The data protection strategy is a pre-configured regular expression for performing security verification on the behavior information by at least three groups, specifically, the regular expression is a logical relation for checking whether the behavior information contains specific parameters and character strings, and may include a white regular expression, a black regular expression and a non-black non-white regular expression, so that the data protection strategy is a combination of at least three regular expressions to improve protection on the behavior information in a processing result.
It should be noted that, since the processing result includes the normal state and the abnormal state of the behavior information, the behavior information of the normal state and for the abnormal state in the correspondingly determined data protection policy is mapped to different regular expressions in advance.
104. And determining a protection grade according to a verification result of the safety verification of the behavior information by the data protection strategy, and constructing a monitoring network model between the exhibitor terminal and the third party terminal.
In the embodiment of the invention, after the safety verification is carried out on the behavior information based on the data protection strategy, the verification result can be determined to comprise the safety or dangerous behavior, so that a monitoring network model between the exhibitor terminal and the third-party terminal is constructed in order to realize the protection monitoring on the exhibitor terminal generating the safety or threatening behavior. The monitoring network model is used for carrying out display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal, wherein the preset interaction range is a preset exhibitor geographical position specific range, the constructed monitoring network model is specifically used for positioning the exhibitor terminal and the third party terminal through an indoor positioning technology including but not limited to WIFI, bluetooth, radio frequency technology RFID and the like, and monitoring network models of all the exhibitor terminals and the third party terminals are established by dividing all the exhibitor terminals and the third party terminals in the exhibitor position specific range, namely one preset interaction range corresponds to one monitoring network, so that targeted safety protection is realized.
It should be noted that, the third party, such as an individual, a group, an enterprise, etc., who is a mobile user participating in the exhibition and obtains the exhibition content, registers as a third party user by adding or loading the exhibition application program in the terminal device, and accordingly, both the service party and the exhibition party can perform terminal operations through the exhibition application program. In the embodiment of the invention, the exhibition application program is an online exhibition service platform and provides management contents with different authorities for users with different identities, for example, the management contents can provide contents such as data processing, business management and the like for a service party, provide contents such as product display, information output and the like for a participating party, provide contents such as product transaction, storage and the like for a third party, and the current execution end is used as a general processing server of the exhibition service platform to provide data technical support.
105. And extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model, and carrying out security verification on the interactive data based on a network protection strategy.
For the embodiment of the invention, in order to realize accurate protection of exhibition data, interactive data generated by a exhibitor terminal and a third party terminal is extracted according to a constructed monitoring network model, the interactive data is data generated by data interaction between the third party terminal and the exhibitor terminal, and a current execution end carries out safety verification on the interactive data based on a network protection strategy in the current execution end in order to protect the interactive data in different monitoring network models, so as to determine protection operation on the interactive data, namely forbid writing or reading. The network protection strategy is a firewall strategy matched with black and white rules of different behaviors, namely interactive data generated in the monitoring network model in the current execution end is verified and protected based on the firewall, and the applicability of safety protection of the displayed data is realized.
In an embodiment of the present invention, for further limitation and description, the determining, according to the interactive data type, the interactive scene information, and the exhibitor identifier corresponding to the backup data, the behavior information of the exhibitor terminal includes: determining an interactive data type, interactive scene information and a participant identifier based on the data request type, the data structure type and the data storage position of the backup data; and matching the interactive data type, the interactive scene information and the behavior information corresponding to the exhibitor identifier according to a preset behavior mapping list, wherein the preset behavior mapping list stores mapping relations among different interactive data types, interactive scene information, exhibitor identifiers and different behavior information.
In order to accurately determine the behavior information and realize the behavior prediction processing of the behavior information, the data request type, the data structure type and the data storage position of backup data are analyzed to determine the interactive data type, the interactive scene information and the exhibitor identifier, so that the behavior information is matched and found according to a preset behavior mapping list. Specifically, since the backup data is backup content of interactive data generated by data interaction between the service party terminal and the exhibitor terminal, the type of the interactive data may be determined according to the type of the data request, for example, if the type of the data request is a download request, the type of the interactive data is identified as a download data type, and the interactive scenario information may be determined according to the type of the data structure, where the type of the data structure includes, but is not limited to, an array, a stack, a queue, a linked list, a hash table, a graph, and the like.
It should be noted that, since the preset behavior mapping list stores mapping relationships between different interaction data types, interaction scene information, exhibitor identifiers and different behavior information, after the data request type, the data structure type, and the data storage location are analyzed, the matching behavior information is found according to the mapping relationships in the preset behavior mapping list. In addition, the behavior information represents the behavior content of the terminal of the exhibitor, and the behavior content and the exhibitor identifier have a mapping relation, namely the mapping relation in the preset behavior mapping list is generated when the authority of the exhibitor is determined. Specifically, when a participant applies for participation in an exhibition through an exhibition application program, the current execution end allocates an exhibition participant identifier to the participant, and allocates different operation permissions according to identity information added by the participant, that is, different operation permissions can correspond to different behavior information, so that the participant identifier is added into the corresponding relationship in combination with a pre-configured interactive data type and the corresponding relationship between the interactive scene information and the behavior information to obtain a preset behavior mapping list with mapping relationships between different interactive data types, interactive scene information and the exhibition participant identifier and the different behavior information, where the behavior information includes, but is not limited to, downloading public information, uploading file data, and the like.
In an embodiment of the present invention, for further definition and explanation, before the performing the prediction processing on the behavior information according to the trained behavior prediction model, the method further includes: acquiring a training sample set of the behavior information, wherein the training sample set comprises at least 60 groups of behavior information sample data; calculating a threshold parameter according to the interactive scene information and a preset threshold function, and performing sample replacement on the behavior information sample data for at least 10 times based on the threshold parameter to obtain behavior information sample data with the threshold parameter introduced; training a behavior prediction model based on the behavior information sample data of the introduced threshold parameter so as to perform prediction processing according to the trained behavior prediction model.
In order to achieve improved optimization of the behavior prediction model training to improve the prediction accuracy of the behavior prediction model, the behavior prediction model is improved and trained before step 102. Specifically, a training sample set of behavior information is obtained, where the training sample set includes at least 60 groups of sample data labeled in a normal state or an abnormal state, and each group of sample data includes 5 different kinds of behavior information (digitized processing is performed in a model training process) and an abnormal state (represented as 0) or a normal state (represented as 1) corresponding to a training result. In the embodiment of the invention, the threshold parameter is calculated through the interactive scene information and the preset threshold function, namely, the introduced threshold parameter is associated with the interactive scene information, and the preset threshold function is
Figure BDA0003057416160000121
Alpha is a scene constant and is configured according to different interactive scene information, and alpha belongs to (0, 1), i and j are respectively shown inShown as the number of rows and columns, i, j ∈ [1,5 ]]And replacing the threshold parameter calculated according to the preset threshold function as sample data into the behavior information sample data for at least 10 times so as to realize the introduction of the threshold parameter, training the three-layer neural network model based on the behavior information sample data introduced with the threshold parameter to obtain a trained behavior prediction model, and realizing the improved optimization of the behavior prediction model.
In an embodiment of the present invention, for further limitation and description, before the determining the data protection policy of the service terminal according to the processing result of the prediction processing, the method further includes: acquiring a regular expression for carrying out security verification on behavior information in different states; determining at least three combination relations among regular expressions for safety verification according to the number of parameters in the regular expressions, and configuring the behavior information in different states and the data protection strategies matched with the regular expressions based on the at least three combination relations.
In order to improve the security protection efficiency of the display data and achieve the determination of the data protection policy after predicting the behavior information, before step 103, the data protection policy is configured. The display organization side uploads regular expressions which need to be subjected to safety verification according to the behavior information of the normal state and the abnormal state, and the regular expressions are used for checking whether the behavior information contains the logic relation of specific parameters and character strings, so that at least three combinations among the regular expressions can be determined according to the number of the parameters in the regular expressions. Specifically, the sum of the number of parameters of each at least three combined regular expressions reaches 5, for example, the number of parameters in the regular expression 1 is 2, the number of parameters in the regular expression 2 is 1, and the number of parameters in the regular expression 3 with a combined relationship is determined to be at least 2, so that the accuracy of protecting the display data is improved. In addition, when the regular expressions of the at least three combination relationships are determined, the configuration of the data protection policy is the regular expressions respectively corresponding to the at least three combination relationships according to the behavior information of the abnormal state and the normal state, and the regular expressions are used as the data protection policy for the behavior information.
Correspondingly, the determining the data protection policy of the service party terminal according to the processing result of the prediction processing includes: and if the behavior information is in an abnormal state, searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy.
For further explanation, after the data protection policy is configured, the regular expressions in the data protection policy are specifically matched according to the processing result of the prediction processing, that is, the behavior information in the normal state or the behavior information in the abnormal state. If the behavior information is in an abnormal state, searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy so as to carry out security verification on the behavior information according to the regular expression and determine the protection level.
In an embodiment of the present invention, for further limitation and description, the determining a protection level according to a verification result of the data protection policy performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal includes: matching the behavior information according to the regular expression to determine protection grades, wherein the protection grades comprise a first protection grade, a second protection grade and a third protection grade; and screening the number of third party terminals which perform data interaction with the exhibitor terminal according to the protection grade, and establishing a monitoring network model between the exhibitor terminal and the third party terminals according to the number.
In the embodiment of the invention, as the combination of at least 3 regular expressions is corresponding to one behavior information in the data protection strategy, in order to realize the protection accuracy of the behavior information, after the behavior information is matched by using each regular expression, if all the behavior information is matched, the behavior information is determined to be a first protection grade, if one of the behavior information is not matched, the behavior information is determined to be a second protection grade, if more than two of the behavior information are not matched, the behavior information is determined to be three protection grades, and the first protection grade to the third protection grade are dangerous grades in sequence, so that a monitoring network model is established for further verifying whether safe behaviors exist between a exhibitor and a third party. Because different protection grades indicate different danger degrees, the number of the third party terminals to be subjected to data interaction with the exhibitor terminal is screened according to the protection grades so as to establish a monitoring network model between the third party terminals and at least two third party terminals. The monitoring network models between the exhibitor terminals and the third terminals are established according to the number of the third-party terminals, the number of the established specific monitoring network models can be multiple, each monitoring network model is respectively matched with one exhibitor terminal, namely, one exhibitor terminal and multiple third-party terminals can be identified from one monitoring network model, and therefore the safety protection of data generated by each exhibitor terminal is determined based on the monitoring network models.
In the embodiment of the present invention, preferably, if the number of the third-party terminals is the first protection level, the number of the third-party terminals is determined to be 2, if the number of the third-party terminals is the second protection level, the number of the third-party terminals is determined to be 5, and if the number of the third-party terminals is the third protection level, the number of the third-party terminals is determined to be 10, that is, data generated by monitoring a corresponding number of the third-party terminals in the network model in real time is monitored.
In an embodiment of the present invention, for further limitation and description, the extracting, based on the monitoring network model, the interaction data of the exhibitor terminal and the third party terminal, and performing security verification on the interaction data based on a network protection policy includes: extracting interactive data of the exhibitor terminal and the third party terminal in the monitoring network model, and rendering and displaying the interactive data based on an exhibition display platform; and loading a matched network protection strategy based on the interactive data, and carrying out security verification on the interactive data, wherein the network protection strategy is a firewall strategy matched with black and white rules of different behaviors.
In order to achieve the purpose of safety protection of data generated by exhibitors and third parties in an exhibition, aiming at each monitoring network model, interactive data of the exhibitor terminal and the third party terminal are extracted, the interactive data comprise data contents generated by any interactive operation, and rendering display is carried out in an exhibition display platform, namely, the current execution end renders different colors for data streams in different monitoring network models, and displays data interaction conditions generated by different monitoring network models, so that service personnel can carry out real-time monitoring. In addition, after the interactive data is obtained, a matched network protection strategy, namely a firewall strategy matched with black and white rules of different behaviors is loaded and used for verifying the interactive data to obtain a verification result.
It should be noted that, in the embodiment of the present invention, in order to implement security verification on display data generated in an exhibition, that is, behavior information, interactive data, and the like, a matching network protection policy is loaded according to the interactive data, so that the firewall policy is used to perform security verification on the interactive data.
In an embodiment of the present invention, in order to implement security verification on data generated in an exhibition and greatly meet the security processing requirement on the data generated in the exhibition, the method further includes: if the verification result of the safety verification of the interactive data is abnormal writing, sending a writing forbidding instruction to the server side terminal; and if the verification result of the safety verification of the interactive data is abnormal reading, sending alarm information to the exhibitor terminal.
Specifically, if a verification result obtained by performing security verification on the interactive data according to the firewall policy is abnormal write-in, that is, it indicates that the third-party terminal writes abnormal data into the exhibitor terminal, a write prohibition instruction is sent to the server terminal, where the write prohibition instruction carries an identity of the exhibitor terminal to instruct the server terminal to prohibit the exhibitor terminal from receiving the data. When receiving the write prohibition instruction, the service side terminal prohibits the data write-in of the exhibitor and the third party in an off-line mode according to the carried identity identifier, and also locks the operation authority of the exhibitor terminal in an on-line mode by adopting an exhibition application program, so that the write prohibition is realized. Similarly, if the verification result obtained by performing security verification on the interactive data according to the firewall policy is abnormal reading, that is, it indicates that the data output by the third party to the exhibitor is abnormal, the exhibitor terminal is sent with warning information, where the warning information carries abnormal reading prompt information to instruct the exhibitor terminal to prohibit the data output to the third party terminal.
The invention provides a protection method for exhibition data safety, compared with the prior art, the embodiment of the invention receives backup data forwarded by a server side terminal when the server side terminal and an exhibitor side terminal perform data interaction, and determines behavior information of the exhibitor side terminal according to an interaction data type, interaction scene information and an exhibitor side identifier corresponding to the backup data; performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing threshold parameters into a training sample set and then performing model training; determining a data protection strategy of the service side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance; determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal; the interactive data of the exhibitor terminal and the third party terminal are extracted based on the monitoring network model, and the interactive data are subjected to security verification based on a network protection strategy so as to determine the protection operation on the interactive data, thereby greatly improving the security verification efficiency of the data generated in the display, increasing the processing effectiveness of the security verification requirements generated by each user in the display in real time, and timely providing data security support for different service requirements in the display, thereby improving the protection efficiency of the display data security.
Further, as an implementation of the method shown in fig. 1, an embodiment of the present invention provides a device for protecting exhibition data, as shown in fig. 3, the device includes:
the first determining module 21 is configured to receive backup data forwarded by the server side terminal when the server side terminal performs data interaction with the exhibitor side terminal, and determine behavior information of the exhibitor side terminal according to an interaction data type, interaction scene information, and an exhibitor side identifier corresponding to the backup data;
the processing module 22 is configured to perform prediction processing on the behavior information according to a trained behavior prediction model, where the behavior prediction model is obtained by performing model training after a threshold parameter is introduced into a training sample set for screening;
a second determining module 23, configured to determine a data protection policy of the service party terminal according to the processing result of the prediction processing, where the data protection policy is a regular expression obtained by performing security verification on the behavior information by using at least three groups configured in advance;
the building module 24 is configured to determine a protection level according to a verification result of the data protection policy for performing security verification on the behavior information, and build a monitoring network model between the exhibitor terminal and a third party terminal, where the monitoring network model is used to perform display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal;
and the verification module 25 is configured to extract the interactive data of the exhibitor terminal and the third-party terminal based on the monitoring network model, and perform security verification on the interactive data based on a network protection policy to determine a protection operation on the interactive data.
Further, the first determining module comprises:
the determining unit is used for determining the interactive data type, the interactive scene information and the participant identification based on the data request type, the data structure type and the data storage position for analyzing the backup data;
and the matching unit is used for matching the interactive data type, the interactive scene information and the behavior information corresponding to the exhibitor identifier according to a preset behavior mapping list, wherein the preset behavior mapping list stores mapping relations among different interactive data types, interactive scene information, exhibitor identifiers and different behavior information.
Further, the apparatus further comprises:
the first acquisition module is used for acquiring a training sample set of the behavior information, wherein the training sample set comprises at least 60 groups of behavior information sample data;
the calculation module is used for calculating a threshold parameter according to the interactive scene information and a preset threshold function, and performing sample replacement on the behavior information sample data for at least 10 times based on the threshold parameter to obtain behavior information sample data introduced with the threshold parameter;
and the training module is used for training a behavior prediction model based on the behavior information sample data with the introduced threshold parameter so as to perform prediction processing according to the trained behavior prediction model.
Further, the apparatus further comprises: a second obtaining module, a third determining module,
the second acquisition module is used for acquiring a regular expression for performing security verification on behavior information in different states;
the third determining module is configured to determine at least three combination relationships between regular expressions for security verification according to the number of parameters in the regular expressions, and configure the different state behavior information and the data protection policy matched with the regular expressions based on the at least three combination relationships;
and the second determining module is used for searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy if the behavior information is in the abnormal state.
Further, the building module comprises:
the determining unit is used for performing matching processing on the behavior information according to the regular expression to determine protection grades, and the protection grades comprise a first protection grade, a second protection grade and a third protection grade;
and the establishing unit is used for screening the number of the third party terminals which carry out data interaction with the exhibitor terminal according to the protection grade, and establishing a monitoring network model between the exhibitor terminal and the third party terminals according to the number.
Further, the verification module includes:
the extraction unit is used for extracting the interactive data of the exhibitor terminal and the third party terminal in the monitoring network model and rendering and displaying the interactive data based on an exhibition display platform;
and the verification unit is used for loading a matched network protection strategy based on the interactive data and carrying out safety verification on the interactive data, wherein the network protection strategy is a firewall strategy matched with black and white rules of different behaviors.
Further, the apparatus further comprises:
a first sending module, configured to send a write prohibition instruction to the server side terminal if a verification result of performing security verification on the interactive data is abnormal write, where the write prohibition instruction carries an identity of the exhibitor terminal, so as to instruct the server side terminal to prohibit the exhibitor terminal from receiving data;
and the second sending module is used for sending alarm information to the exhibitor terminal if the verification result of the safety verification of the interactive data is abnormal reading, wherein the alarm information carries abnormal reading prompt information so as to indicate that the exhibitor terminal forbids to output data to the third party terminal.
The invention provides a protective device for exhibition data safety, compared with the prior art, the embodiment of the invention receives backup data forwarded by a server side terminal when the server side terminal and an exhibitor side terminal perform data interaction, and determines behavior information of the exhibitor side terminal according to an interaction data type, interaction scene information and an exhibitor side identifier corresponding to the backup data; performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing threshold parameters into a training sample set and then performing model training; determining a data protection strategy of the server side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance; determining a protection level according to a verification result of the data protection strategy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal; the interactive data of the exhibitor terminal and the third party terminal are extracted based on the monitoring network model, and the interactive data are subjected to security verification based on a network protection strategy so as to determine the protection operation on the interactive data, thereby greatly improving the security verification efficiency of the data generated in the display, increasing the processing effectiveness of the security verification requirements generated by each user in the display in real time, and timely providing data security support for different service requirements in the display, thereby improving the protection efficiency of the display data security.
According to an embodiment of the present invention, a storage medium is provided, where at least one executable instruction is stored, and the computer executable instruction may execute the method for protecting the exhibition data in any of the above method embodiments.
Fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the terminal.
As shown in fig. 3, the terminal may include: a processor (processor) 302, a communication Interface 304, a memory 306, and a communication bus 308.
Wherein: the processor 302, communication interface 304, and memory 306 communicate with each other via a communication bus 308.
A communication interface 304 for communicating with network elements of other devices, such as clients or other servers.
The processor 302 is configured to execute the program 310, and may specifically execute the relevant steps in the above embodiment of the protection method for securing exhibition data.
In particular, program 310 may include program code comprising computer operating instructions.
The processor 302 may be a central processing unit CPU, or an Application Specific Integrated Circuit ASIC (Application Specific Integrated Circuit), or one or more Integrated circuits configured to implement embodiments of the present invention. The terminal comprises one or more processors, which can be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
A memory 306 for storing a program 310. Memory 306 may comprise high-speed RAM memory and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 310 may specifically be configured to cause the processor 302 to perform the following operations:
when a server side terminal and a exhibitor side terminal carry out data interaction, receiving backup data forwarded by the server side terminal, and determining behavior information of the exhibitor side terminal according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data;
performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing a threshold parameter into a training sample set, screening and then performing model training;
determining a data protection strategy of the server side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance;
determining a protection grade according to a verification result of the data protection strategy for performing security verification on the behavior information, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for performing display monitoring in a preset interaction range on the third party terminal and the exhibitor terminal;
and extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model, and carrying out security verification on the interactive data based on a network protection strategy so as to determine the protection operation on the interactive data.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made without departing from the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (10)

1. A method for protecting exhibition data security is characterized by comprising the following steps:
when a server side terminal and a exhibitor side terminal carry out data interaction, receiving backup data forwarded by the server side terminal, and determining behavior information of the exhibitor side terminal according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data;
performing prediction processing on the behavior information according to a trained behavior prediction model, wherein the behavior prediction model is obtained by introducing threshold parameters into a training sample set and then performing model training;
determining a data protection strategy of the server side terminal according to the processing result of the prediction processing, wherein the data protection strategy is a regular expression for performing security verification on the behavior information by at least three groups configured in advance;
determining a protection level according to a verification result of safety verification of the behavior information by the data protection strategy, and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for displaying and monitoring the third party terminal and the exhibitor terminal within a preset interaction range, the preset interaction range is a preset exhibitor geographical position specific range, and the monitoring network model is a model for displaying and monitoring interaction data between the exhibitor terminal and the third party terminal by positioning the exhibitor terminal and the third party terminal through an indoor positioning technology and monitoring all the exhibitor terminals and the third party terminals within the exhibitor geographical position specific range through dividing;
and extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model, and carrying out security verification on the interactive data based on a network protection strategy so as to determine the protection operation on the interactive data.
2. The method according to claim 1, wherein the determining the behavior information of the exhibitor terminal according to the interactive data type, the interactive scenario information, and the exhibitor identifier corresponding to the backup data comprises:
determining an interactive data type, interactive scene information and a participant identifier based on the data request type, the data structure type and the data storage position of the backup data;
and matching the interactive data type, the interactive scene information and the behavior information corresponding to the exhibitor identifier according to a preset behavior mapping list, wherein the preset behavior mapping list stores mapping relations among different interactive data types, interactive scene information, exhibitor identifiers and different behavior information.
3. The method of claim 2, wherein prior to the predictive processing of the behavior information according to the trained behavior prediction model, the method further comprises:
acquiring a training sample set of the behavior information, wherein the training sample set comprises at least 60 groups of behavior information sample data;
calculating a threshold parameter according to the interactive scene information and a preset threshold function, and performing sample replacement on the behavior information sample data for at least 10 times based on the threshold parameter to obtain behavior information sample data with the threshold parameter introduced;
training a behavior prediction model based on the behavior information sample data of the introduced threshold parameter so as to perform prediction processing according to the trained behavior prediction model.
4. The method according to claim 1, wherein before determining the data protection policy of the server terminal according to the processing result of the prediction processing, the method further comprises:
acquiring a regular expression for carrying out security verification on behavior information in different states;
determining at least three combination relations among regular expressions for security verification according to the number of parameters in the regular expressions, and configuring the different state behavior information and the data protection strategies matched with the regular expressions based on the at least three combination relations;
the determining the data protection strategy of the service side terminal according to the processing result of the prediction processing comprises the following steps:
and if the behavior information is in an abnormal state, searching a regular expression matched with the abnormal state and the behavior information from the data protection strategy.
5. The method according to claim 1, wherein the determining a protection level according to a verification result of the data protection policy for performing security verification on the behavior information, and the constructing a monitoring network model between the exhibitor terminal and a third party terminal comprises:
performing matching processing on the behavior information according to the regular expression to determine protection grades, wherein the protection grades comprise a first protection grade, a second protection grade and a third protection grade;
and screening the number of third party terminals which perform data interaction with the exhibitor terminal according to the protection grade, and establishing a monitoring network model between the exhibitor terminal and the third party terminals according to the number.
6. The method of claim 5, wherein the extracting interaction data of the exhibitor terminal and the third party terminal based on the monitoring network model and performing security verification on the interaction data based on a network protection policy comprises:
extracting interactive data of the exhibitor terminal and the third party terminal in the monitoring network model, and rendering and displaying the interactive data based on an exhibition display platform;
and loading a matched network protection strategy based on the interactive data, and carrying out security verification on the interactive data, wherein the network protection strategy is a firewall strategy matched with black and white rules of different behaviors.
7. The method of claim 1, further comprising:
if the verification result of the safety verification of the interactive data is abnormal writing, sending a write forbidding instruction to the server side terminal, wherein the write forbidding instruction carries the identity of the exhibitor side terminal so as to indicate the server side terminal to forbid the exhibitor side terminal from receiving the data;
and if the verification result of the security verification of the interactive data is abnormal reading, sending alarm information to the exhibitor terminal, wherein the alarm information carries abnormal reading prompt information to indicate that the exhibitor terminal forbids to output data to the third party terminal.
8. A protective device for exhibition data security, comprising:
the first determining module is used for receiving backup data forwarded by the server side terminal when the server side terminal and the exhibitor side terminal perform data interaction, and determining behavior information of the exhibitor side terminal according to an interactive data type, interactive scene information and an exhibitor side identifier corresponding to the backup data;
the processing module is used for carrying out prediction processing on the behavior information according to a trained behavior prediction model, and the behavior prediction model is obtained by introducing threshold parameters into a training sample set for screening and then carrying out model training;
a second determining module, configured to determine a data protection policy of the service party terminal according to a processing result of the prediction processing, where the data protection policy is a regular expression used for performing security verification on the behavior information by using at least three groups configured in advance;
the construction module is used for determining a protection level according to a verification result of the safety verification of the behavior information by the data protection strategy and constructing a monitoring network model between the exhibitor terminal and a third party terminal, wherein the monitoring network model is used for displaying and monitoring the third party terminal and the exhibitor terminal within a preset interaction range, the preset interaction range is a preset exhibitor geographical position specific range, and the monitoring network model is a model for displaying and monitoring interaction data between the exhibitor terminal and the third party terminal by positioning the exhibitor terminal and the third party terminal through an indoor positioning technology and monitoring all the exhibitor terminals and the third party terminals within the exhibitor geographical position specific range through division;
and the verification module is used for extracting the interactive data of the exhibitor terminal and the third party terminal based on the monitoring network model and carrying out safety verification on the interactive data based on a network protection strategy so as to determine the protection operation on the interactive data.
9. A storage medium having stored therein at least one executable instruction for causing a processor to perform operations corresponding to the method for securing exhibition data according to any one of claims 1-7.
10. A terminal, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the protection method for the exhibition data security according to any one of claims 1-7.
CN202110503627.9A 2021-05-10 2021-05-10 Exhibition data security protection method and device Active CN113190200B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110503627.9A CN113190200B (en) 2021-05-10 2021-05-10 Exhibition data security protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110503627.9A CN113190200B (en) 2021-05-10 2021-05-10 Exhibition data security protection method and device

Publications (2)

Publication Number Publication Date
CN113190200A CN113190200A (en) 2021-07-30
CN113190200B true CN113190200B (en) 2023-04-07

Family

ID=76988516

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110503627.9A Active CN113190200B (en) 2021-05-10 2021-05-10 Exhibition data security protection method and device

Country Status (1)

Country Link
CN (1) CN113190200B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115865535B (en) * 2023-02-28 2023-05-23 网思科技股份有限公司 Cloud security management method, system and storage medium

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8010469B2 (en) * 2000-09-25 2011-08-30 Crossbeam Systems, Inc. Systems and methods for processing data flows
US7150044B2 (en) * 2003-03-10 2006-12-12 Mci, Llc Secure self-organizing and self-provisioning anomalous event detection systems
US8166554B2 (en) * 2004-02-26 2012-04-24 Vmware, Inc. Secure enterprise network
CN102904921A (en) * 2011-07-30 2013-01-30 无锡博越信息技术有限公司 Assembly management monitoring system based on internet of things and information interaction method
CN103795580B (en) * 2012-10-29 2016-10-26 腾讯科技(深圳)有限公司 A kind of data monitoring method, system and relevant device
EP3342124A1 (en) * 2015-08-28 2018-07-04 Statustoday Ltd Malicious activity detection on a computer network and network metadata normalisation
CN105243336B (en) * 2015-09-30 2018-02-13 北京奇安信科技有限公司 Data prevention method and device
US11775403B2 (en) * 2015-11-20 2023-10-03 Sorbotics, LLC Method and system for developing an anomaly detector for detecting an anomaly parameter on network terminals in a distributed network
CN106066882A (en) * 2016-06-03 2016-11-02 深圳市赛瑞产业研究有限公司 A kind of virtualization exhibition system and using method thereof
CN107169796A (en) * 2017-05-12 2017-09-15 深圳市浩天投资有限公司 A kind of analysis method of user behavior data, system and computer-readable recording medium
CN108449342B (en) * 2018-03-20 2020-11-27 北京云站科技有限公司 Malicious request detection method and device
CN110691064B (en) * 2018-09-27 2022-01-04 国家电网有限公司 Safety access protection and detection system for field operation terminal
CN111181980B (en) * 2019-12-31 2022-05-10 奇安信科技集团股份有限公司 Network security-oriented regular expression matching method and device
CN111523762B (en) * 2020-03-23 2024-01-19 深圳奇迹智慧网络有限公司 Exhibition data processing method, apparatus, computer device and storage medium
CN112261033A (en) * 2020-10-19 2021-01-22 北京京航计算通讯研究所 Network security protection method based on enterprise intranet
CN112269324A (en) * 2020-10-19 2021-01-26 深圳市亿点物联科技有限公司 Digital exhibition cloud platform data analysis control system

Also Published As

Publication number Publication date
CN113190200A (en) 2021-07-30

Similar Documents

Publication Publication Date Title
CN110602248B (en) Abnormal behavior information identification method, system, device, equipment and medium
CN112132676B (en) Method and device for determining contribution degree of joint training target model and terminal equipment
MX2012003721A (en) Systems and methods for social graph data analytics to determine connectivity within a community.
Bayuk et al. An architectural systems engineering methodology for addressing cyber security
US20200007551A1 (en) Global security system and method to create a verified and authenticated online community of members with access to a database of structured and linked information
CN109147918A (en) Reserve matching process, device, electronic equipment and computer-readable medium
CN114186275A (en) Privacy protection method and device, computer equipment and storage medium
CN113190200B (en) Exhibition data security protection method and device
CN115174148A (en) Cloud computing and information security oriented cloud service management method and artificial intelligence platform
CN113486316A (en) User identity authentication method and device, electronic equipment and readable storage medium
CN113065748A (en) Business risk assessment method, device, equipment and storage medium
CN116089920A (en) Sensitive field early warning method, system, computer equipment and medium
CN114925033A (en) Information uplink method, device, system and storage medium
CN115033891A (en) Vulnerability assessment method and device, storage medium and electronic equipment
EP3751500B1 (en) System and method for technology recommendations
CN114006701A (en) Method, device and equipment for sharing name list and storage medium
Parthasarathy et al. A framework for managing ethics in data science projects
CN112862648A (en) Block chain-based multi-department joint cooperation method, device, equipment and medium
CN117040927B (en) Password service monitoring system and method
CN113343288B (en) Block chain intelligent contract security management system based on TEE
Ankile et al. I See You! Robust Measurement of Adversarial Behavior
CN113810192B (en) Information processing method, system and device, electronic equipment and storage medium
CN113821825A (en) Characteristic distance determination method and device and server
Durgadevi et al. 8 Low-Cost Tools vs Cybercrime High-Impact AI
CN116629423A (en) User behavior prediction method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant