CN113761573A - Intelligent sensitive data dynamic desensitization management system and use method thereof - Google Patents
Intelligent sensitive data dynamic desensitization management system and use method thereof Download PDFInfo
- Publication number
- CN113761573A CN113761573A CN202111002338.7A CN202111002338A CN113761573A CN 113761573 A CN113761573 A CN 113761573A CN 202111002338 A CN202111002338 A CN 202111002338A CN 113761573 A CN113761573 A CN 113761573A
- Authority
- CN
- China
- Prior art keywords
- terminal
- desensitization
- data
- dynamic desensitization
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000586 desensitisation Methods 0.000 title claims abstract description 97
- 238000000034 method Methods 0.000 title claims abstract description 12
- 238000012545 processing Methods 0.000 claims description 12
- 238000004458 analytical method Methods 0.000 claims description 9
- 230000000052 comparative effect Effects 0.000 claims description 8
- 238000005516 engineering process Methods 0.000 claims description 6
- 230000000903 blocking effect Effects 0.000 claims description 4
- 230000007175 bidirectional communication Effects 0.000 claims description 3
- 239000000284 extract Substances 0.000 claims description 3
- 230000000873 masking effect Effects 0.000 claims description 2
- 238000004519 manufacturing process Methods 0.000 abstract description 8
- 238000010586 diagram Methods 0.000 description 3
- 238000012946 outsourcing Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006854 communication Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/30—Semantic analysis
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- Artificial Intelligence (AREA)
- Data Mining & Analysis (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses an intelligent sensitive data dynamic desensitization management system and a use method thereof, wherein the intelligent sensitive data dynamic desensitization management system comprises a client terminal, a switch terminal, a dynamic desensitization terminal, a database and an application terminal, the client terminal is connected with the switch terminal, the switch terminal is respectively connected with the dynamic desensitization terminal, the database and the application terminal, the dynamic desensitization terminal comprises a dynamic desensitization module, the dynamic desensitization module comprises an SQL rewriting unit, and the SQL rewriting unit comprises a synonymous random replacement subunit, a data shielding subunit and a synonymous deterministic replacement subunit. The invention realizes the completely transparent and real-time sensitive data mask capability and ensures that the client can appropriately access the sensitive data of the production environment.
Description
Technical Field
The invention relates to the technical field of dynamic data desensitization, in particular to an intelligent dynamic sensitive data desensitization management system and a using method thereof.
Background
Data desensitization refers to the deformation of data of some sensitive information through desensitization rules, so as to realize the reliable protection of sensitive private data. This allows for safe use of the desensitized real data set in development, testing and other non-production environments as well as outsourcing environments. With the increasing levels of intellectualization, networking and information of various industries, in order to meet the more diverse use requirements of various units on data, more core sensitive data are circulated in various large systems, retrieved by application users, called and mined by analysis departments, and the like, however, the large data technology and application are developed at a high speed, and the accompanying is a new data security risk: data security events such as false data flooding, sensitive information leakage, illegal tampering, fraud, improper utilization and the like are frequent, and data leakage and personal privacy infringement can be caused by slight improper links of data acquisition, storage, utilization and opening. Meanwhile, the new crown epidemic situation accelerates the digitalized process of the economic society, the electric power data is increased in an explosive mode, and the contradiction between data sharing and safety is further aggravated.
For the situation, many countries and organizations set relevant laws and regulations to solve the problem of data shielding desensitization of production data used in an unsafe environment, data desensitization modes are generally divided into dynamic desensitization and static desensitization, an existing dynamic desensitization system cannot realize completely transparent and real-time sensitive data mask capability, cannot ensure that customers can appropriately access sensitive data of the production environment, and obviously meets the use requirements of people.
Disclosure of Invention
In order to solve the defects in the prior art, the invention aims to provide an intelligent sensitive data dynamic desensitization management system and a use method thereof, which realize completely transparent and real-time sensitive data mask capability and ensure that a client can appropriately access sensitive data of a production environment.
In order to achieve the purpose, the invention adopts the following technical scheme:
an intelligent sensitive data dynamic desensitization management system is characterized by comprising a client terminal, an exchanger terminal, a dynamic desensitization terminal, a database and an application terminal, wherein the client terminal is connected with the exchanger terminal, the exchanger terminal is respectively connected with the dynamic desensitization terminal, the database and the application terminal, the dynamic desensitization terminal comprises a sensitive object identification module and a dynamic desensitization module, and the sensitive object identification module performs comparative comprehensive analysis on field data in a specified database table according to data characteristics configured in a discovery rule by combining field types and sample data to obtain the matching degree with the discovery rule; the dynamic desensitization module comprises an SQL rewriting unit, the SQL rewriting unit is implemented through an SQL rewriting algorithm, and the SQL rewriting algorithm searches fields needing desensitization processing according to SQL statement semantics to replace desensitization functions.
Further, the SQL rewriting unit comprises a synonymy random replacement subunit, a data shielding subunit and a synonymy deterministic replacement subunit. And processing special cases such as select, where sub-statement, prepare and the like.
The client terminal is a mobile network device, and the mobile network device is at least one of a mobile phone, a notebook computer and a tablet computer.
The switch terminal is switch equipment, and the model of switch equipment is S5700-24TP-SI, the switch is used for the both-way communication between the data.
The database is at least one of a relational database, a non-relational database and a key-value database.
The database comprises a main server and a slave server, wherein the main server and the slave server are both provided with two network cards, the two servers are provided with the same proxy IP and are isolated at ordinary times by adopting a blocking technology, when the main server goes down due to a problem, the standby server can immediately detect the problem, and new connection is managed within a few seconds.
The system is characterized by comprising a client terminal, a switch terminal, a dynamic desensitization terminal, a database and an application terminal, wherein the client terminal and the application terminal are connected with the dynamic desensitization terminal, the dynamic desensitization terminal is connected with the switch terminal, and the switch terminal is connected with the database; the dynamic desensitization terminal comprises a sensitive object identification module and a dynamic desensitization module, wherein the sensitive object identification module performs comparative comprehensive analysis on field data in a specified database table according to data characteristics configured in a discovery rule by combining field types and sample data to obtain a matching degree with the discovery rule; the dynamic desensitization module comprises an SQL rewriting unit, the SQL rewriting unit is implemented through an SQL rewriting algorithm, and the SQL rewriting algorithm searches fields needing desensitization processing according to SQL statement semantics to replace desensitization functions.
A use method of an intelligent sensitive data dynamic desensitization management system comprises the following steps:
s1: a sensitive object identification module in the dynamic desensitization terminal carries out comparative comprehensive analysis on field data in a specified database table according to data characteristics configured in a discovery rule in a database of the client terminal by combining field types and sample data to obtain the matching degree with the discovery rule;
s2: the dynamic desensitization terminal extracts the sensitive data and sends the sensitive data to the SQL rewriting unit;
s3: the SQL rewriting unit searches fields needing desensitization processing according to SQL statement semantics through an SQL rewriting algorithm, carries out desensitization function replacement, and processes special conditions of select, where sub-statements and prefix;
s4: and after rewriting is finished, submitting the modified statement to a database for execution, and returning a result to the user, wherein the data obtained by the user is desensitized.
The invention has the beneficial effects that:
the intelligent sensitive data dynamic desensitization management system realizes completely transparent and real-time sensitive data mask capability through an SQL rewriting technology; the data returned by the production database is dynamically shielded, encrypted, hidden and audited according to the role, responsibility and other IT definition rules of the user without any change to the data in the production database, so that business users, outsourcing users, operation and maintenance personnel, part-time employees, partners, data analysis, research and development and test teams and consultants can appropriately access sensitive data of the production environment.
Drawings
Fig. 1 is a schematic structural diagram of an intelligent sensitive data dynamic desensitization management system according to embodiment 1 of the present invention.
Fig. 2 is a schematic structural diagram of an intelligent sensitive data dynamic desensitization management system according to embodiment 2 of the present invention.
Fig. 3 is a schematic diagram of a workflow structure of the intelligent sensitive data dynamic desensitization management system provided by the present invention.
Detailed Description
The technical solution of the present patent will be described in further detail with reference to the following embodiments.
Reference will now be made in detail to embodiments of the present patent, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present patent and are not to be construed as limiting the present patent.
In the description of this patent, it is noted that unless otherwise specifically stated or limited, the terms "mounted," "connected," and "disposed" are to be construed broadly and can include, for example, fixedly connected, disposed, detachably connected, disposed, or integrally connected and disposed. The specific meaning of the above terms in this patent may be understood by those of ordinary skill in the art as appropriate.
Example 1
Referring to fig. 1, an intelligent sensitive data dynamic desensitization management system comprises a client terminal, a switch terminal, a dynamic desensitization terminal, a database and an application terminal, wherein the client terminal is connected with the switch terminal, the switch terminal is respectively connected with the dynamic desensitization terminal, the database and the application terminal, the dynamic desensitization terminal comprises a sensitive object identification module and a dynamic desensitization module, and the sensitive object identification module performs comparative comprehensive analysis on field data in an appointed database table according to data characteristics configured in a discovery rule by combining field types and sample data to obtain a matching degree with the discovery rule; the dynamic desensitization module comprises an SQL rewriting unit which comprises a synonymy random replacement subunit, a data shielding subunit and a synonymy deterministic replacement subunit. The SQL rewriting unit is implemented through an SQL rewriting algorithm, and the SQL rewriting algorithm searches fields needing desensitization processing according to SQL statement semantics to replace desensitization functions.
It should be noted that, in this embodiment, the client terminal is a mobile network device, and the mobile network device is at least one of a mobile phone, a notebook computer and a tablet computer.
The terminal of the switch is switch equipment, the model of the switch equipment is S5700-24TP-SI, and the switch is used for bidirectional communication between data.
The database is at least one of a relational database, a non-relational database, and a key-value database. The database comprises a main server and a slave server, wherein the main server and the slave server are both provided with two network cards, the two servers are provided with the same proxy IP and are isolated at ordinary times by adopting a blocking technology, when the main server goes down due to a problem, the standby server can immediately detect the problem, and new connection is managed within a few seconds.
The SQL rewriting unit is implemented through an SQL rewriting algorithm, the SQL rewriting algorithm can search fields needing desensitization processing according to SQL statement semantics, desensitization function replacement is carried out, special conditions such as select, where sub-statements and prepare are processed, after rewriting is finished, the modified statements are submitted to a database to be executed, a result is returned to a user, and at the moment, the user obtains data after desensitization.
Example 2
Referring to fig. 2, still another intelligent sensitive data dynamic desensitization management system includes a client terminal, a switch terminal, a dynamic desensitization terminal, a database and an application terminal, where the client terminal and the application terminal are both connected to the dynamic desensitization terminal, the dynamic desensitization terminal is connected to the switch terminal, the switch terminal is connected to the database, the dynamic desensitization terminal includes a dynamic desensitization module, the dynamic desensitization module includes an SQL rewrite unit, and the SQL rewrite unit includes a synonymous random replacement subunit, a data masking subunit, and a synonymous deterministic replacement subunit.
It should be noted that, in this embodiment, the client terminal is a mobile network device, and the mobile network device is at least one of a mobile phone, a notebook computer and a tablet computer.
The terminal of the switch is switch equipment, the model of the switch equipment is S5700-24TP-SI, and the switch is used for bidirectional communication between data.
The database is at least one of a relational database, a non-relational database, and a key-value database.
The database comprises a main server and a slave server, wherein the main server and the slave server are both provided with two network cards, the two servers are provided with the same proxy IP and are isolated at ordinary times by adopting a blocking technology, when the main server goes down due to a problem, the standby server can immediately detect the problem, and new connection is managed within a few seconds.
The dynamic desensitization terminal also comprises a sensitive object identification module, and the sensitive object identification module can compare and comprehensively analyze field data in a specified database table according to data characteristics configured in the discovery rule by combining the field type and sample data to obtain the matching degree with the discovery rule.
The SQL rewriting unit is implemented through an SQL rewriting algorithm, the SQL rewriting algorithm can search fields needing desensitization processing according to SQL statement semantics, desensitization function replacement is carried out, special conditions such as select, where sub-statements and prepare are processed, after rewriting is finished, the modified statements are submitted to a database to be executed, a result is returned to a user, and at the moment, the user obtains data after desensitization.
Referring to fig. 3, the use method of the intelligent sensitive data dynamic desensitization management system comprises the following steps:
s1: a sensitive object identification module in the dynamic desensitization terminal carries out comparative comprehensive analysis on field data in a specified database table according to data characteristics configured in a discovery rule in a database of the client terminal by combining field types and sample data to obtain the matching degree with the discovery rule;
s2: the dynamic desensitization terminal extracts the sensitive data and sends the sensitive data to the SQL rewriting unit;
s3: the SQL rewriting unit searches fields needing desensitization processing according to SQL statement semantics through an SQL rewriting algorithm, carries out desensitization function replacement, and processes special conditions such as select, where sub-statement, prepare and the like;
s4: and after rewriting is finished, submitting the modified statement to a database for execution, and returning a result to the user, wherein the data obtained by the user is desensitized.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (8)
1. An intelligent sensitive data dynamic desensitization management system is characterized by comprising a client terminal, an exchanger terminal, a dynamic desensitization terminal, a database and an application terminal, wherein the client terminal is connected with the exchanger terminal, the exchanger terminal is respectively connected with the dynamic desensitization terminal, the database and the application terminal, the dynamic desensitization terminal comprises a sensitive object identification module and a dynamic desensitization module, and the sensitive object identification module performs comparative comprehensive analysis on field data in a specified database table according to data characteristics configured in a discovery rule by combining field types and sample data to obtain the matching degree with the discovery rule; the dynamic desensitization module comprises an SQL rewriting unit, the SQL rewriting unit is implemented through an SQL rewriting algorithm, and the SQL rewriting algorithm searches fields needing desensitization processing according to SQL statement semantics to replace desensitization functions.
2. The dynamic desensitization management system of intelligent sensitive data according to claim 1, wherein said client terminal is a mobile network device and the mobile network device is at least one of a cell phone, a laptop computer, and a tablet computer.
3. The dynamic desensitization management system of intelligent sensitive data according to claim 1, wherein said switch terminals are switch devices and the type of the switch device is S5700-24TP-SI, said switches being used for bidirectional communication between data.
4. The dynamic desensitization management system of intelligent sensitive data according to claim 1, wherein said database is at least one of a relational database, a non-relational database, and a key-value database.
5. The dynamic desensitization management system of intelligent sensitive data according to claim 1, characterized in that said database comprises a master server and a slave server, both of them have two network cards, both of them have the same proxy IP and are isolated at ordinary times by using blocking technology, when the master server goes down due to a problem, the slave server detects it immediately and takes over a new connection within a few seconds.
6. The dynamic desensitization management system of intelligent sensitive data according to claim 1, wherein said SQL rewrite unit includes a synonymous random replacement subunit, a data masking subunit, and a synonymous deterministic replacement subunit; and processing special cases of select, where sub-statement and prepare.
7. The intelligent sensitive data dynamic desensitization management system is characterized by comprising a client terminal, an exchanger terminal, a dynamic desensitization terminal, a database and an application terminal, wherein the client terminal and the application terminal are connected with the dynamic desensitization terminal; the dynamic desensitization terminal comprises a sensitive object identification module and a dynamic desensitization module, wherein the sensitive object identification module performs comparative comprehensive analysis on field data in a specified database table according to data characteristics configured in a discovery rule by combining field types and sample data to obtain a matching degree with the discovery rule; the dynamic desensitization module comprises an SQL rewriting unit, the SQL rewriting unit is implemented through an SQL rewriting algorithm, and the SQL rewriting algorithm searches fields needing desensitization processing according to SQL statement semantics to replace desensitization functions.
8. A method of using the intelligent sensitive data dynamic desensitization management system of claim 1 or 7, comprising the steps of:
s1: a sensitive object identification module in the dynamic desensitization terminal carries out comparative comprehensive analysis on field data in a specified database table according to data characteristics configured in a discovery rule in a database of the client terminal by combining field types and sample data to obtain the matching degree with the discovery rule;
s2: the dynamic desensitization terminal extracts the sensitive data and sends the sensitive data to the SQL rewriting unit;
s3: the SQL rewriting unit searches fields needing desensitization processing according to SQL statement semantics through an SQL rewriting algorithm, carries out desensitization function replacement, and processes special conditions of select, where sub-statements and prefix;
s4: and after rewriting is finished, submitting the modified statement to a database for execution, and returning a result to the user, wherein the data obtained by the user is desensitized.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111002338.7A CN113761573A (en) | 2021-08-30 | 2021-08-30 | Intelligent sensitive data dynamic desensitization management system and use method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111002338.7A CN113761573A (en) | 2021-08-30 | 2021-08-30 | Intelligent sensitive data dynamic desensitization management system and use method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113761573A true CN113761573A (en) | 2021-12-07 |
Family
ID=78791716
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111002338.7A Pending CN113761573A (en) | 2021-08-30 | 2021-08-30 | Intelligent sensitive data dynamic desensitization management system and use method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113761573A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106228084A (en) * | 2016-07-19 | 2016-12-14 | 北京同余科技有限公司 | Data guard method that the sensitive field of based role dynamically adjusts and system |
WO2017088683A1 (en) * | 2015-11-24 | 2017-06-01 | 阿里巴巴集团控股有限公司 | Data desensitization method and system |
WO2019114766A1 (en) * | 2017-12-14 | 2019-06-20 | 中兴通讯股份有限公司 | Data desensitising method, server, terminal, and computer-readable storage medium |
CN110196861A (en) * | 2018-02-24 | 2019-09-03 | 中兴通讯股份有限公司 | A kind of data desensitization method and device |
CN110399733A (en) * | 2019-03-18 | 2019-11-01 | 国网安徽省电力有限公司黄山供电公司 | A kind of desensitization platform for structural data |
CN112749376A (en) * | 2021-03-05 | 2021-05-04 | 闪捷信息科技有限公司 | Dynamic desensitization method for relational database |
-
2021
- 2021-08-30 CN CN202111002338.7A patent/CN113761573A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017088683A1 (en) * | 2015-11-24 | 2017-06-01 | 阿里巴巴集团控股有限公司 | Data desensitization method and system |
CN106228084A (en) * | 2016-07-19 | 2016-12-14 | 北京同余科技有限公司 | Data guard method that the sensitive field of based role dynamically adjusts and system |
WO2019114766A1 (en) * | 2017-12-14 | 2019-06-20 | 中兴通讯股份有限公司 | Data desensitising method, server, terminal, and computer-readable storage medium |
CN110196861A (en) * | 2018-02-24 | 2019-09-03 | 中兴通讯股份有限公司 | A kind of data desensitization method and device |
CN110399733A (en) * | 2019-03-18 | 2019-11-01 | 国网安徽省电力有限公司黄山供电公司 | A kind of desensitization platform for structural data |
CN112749376A (en) * | 2021-03-05 | 2021-05-04 | 闪捷信息科技有限公司 | Dynamic desensitization method for relational database |
Non-Patent Citations (2)
Title |
---|
袁强: "网络数据脱敏系统的设计与实现", 通信与信息技术, no. 252, 25 July 2021 (2021-07-25), pages 58 - 61 * |
陈天莹;陈剑锋;: "大数据环境下的智能数据脱敏系统", 通信技术, no. 07, 10 July 2016 (2016-07-10) * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee et al. | An effective security measures for nuclear power plant using big data analysis approach | |
CN109902297B (en) | Threat information generation method and device | |
CN107172022B (en) | APT threat detection method and system based on intrusion path | |
CN106778253A (en) | Threat context aware information security Initiative Defense model based on big data | |
US9336388B2 (en) | Method and system for thwarting insider attacks through informational network analysis | |
CN111209269A (en) | Big data management system of wisdom city | |
CN115733681A (en) | Data security management platform for preventing data loss | |
CN111104521B (en) | Anti-fraud detection method and detection system based on graph analysis | |
CN110851860A (en) | Power consumption data desensitization algorithm model construction method based on anonymization privacy technology | |
CN114661694B (en) | Database operation and maintenance safety control system | |
CN109308330A (en) | The method of enterprise's leakage information extraction, analysis and classification Internet-based | |
CN110795751A (en) | Method for carrying out safety protection on sensitive data through natural language analysis | |
EP4356564A1 (en) | Likelihood assessment for security incident alerts | |
CN115270187A (en) | Data processing method and device, electronic equipment and storage medium | |
Chu et al. | Analysis of network security and privacy security based on AI in IOT environment | |
CN113761573A (en) | Intelligent sensitive data dynamic desensitization management system and use method thereof | |
CN116861473A (en) | Data dynamic-static combination desensitization realization method | |
Chai et al. | Research of intelligent intrusion detection system based on web data mining technology | |
CN113852641A (en) | Network attack tracing system, method and equipment based on graph database | |
CN110933064B (en) | Method and system for determining user behavior track | |
CN114265759A (en) | Tracing method and system after data information leakage and electronic equipment | |
Kang et al. | Multi-dimensional security risk assessment model based on three elements in the IoT system | |
Cai et al. | Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set | |
CN111600890A (en) | Network security perception system based on big data | |
Srinivasan et al. | Cybersecurity and Artificial Intelligence: A Systematic Literature Review |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |