CN118041652A - Cross-domain data security audit method for key information infrastructure - Google Patents

Cross-domain data security audit method for key information infrastructure Download PDF

Info

Publication number
CN118041652A
CN118041652A CN202410234598.4A CN202410234598A CN118041652A CN 118041652 A CN118041652 A CN 118041652A CN 202410234598 A CN202410234598 A CN 202410234598A CN 118041652 A CN118041652 A CN 118041652A
Authority
CN
China
Prior art keywords
cross
domain data
receiver
data
audit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410234598.4A
Other languages
Chinese (zh)
Inventor
李祉岐
杨阳
吴松洋
沈立翔
孙望舒
尹琴
冯磊
霍钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Siji Network Security Beijing Co ltd
State Grid Zhejiang Electric Power Co Ltd
State Grid Fujian Electric Power Co Ltd
Third Research Institute of the Ministry of Public Security
Original Assignee
State Grid Siji Network Security Beijing Co ltd
State Grid Zhejiang Electric Power Co Ltd
State Grid Fujian Electric Power Co Ltd
Third Research Institute of the Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Siji Network Security Beijing Co ltd, State Grid Zhejiang Electric Power Co Ltd, State Grid Fujian Electric Power Co Ltd, Third Research Institute of the Ministry of Public Security filed Critical State Grid Siji Network Security Beijing Co ltd
Priority to CN202410234598.4A priority Critical patent/CN118041652A/en
Publication of CN118041652A publication Critical patent/CN118041652A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a key information infrastructure cross-domain data security audit method, which comprises the following steps: respectively recording IP addresses of an initiator and a receiver of the cross-domain data, and if a plurality of receivers are provided, respectively recording the IP addresses of the plurality of receivers; when an initiator initiates, encrypting and transmitting the cross-domain data, each receiver carries out secure decryption on the cross-domain data, and if a certain receiver does not carry out secure decryption, the receiver of the IP address is alarmed; after the secure decryption is completed, recording the operation record of each receiver on the cross-domain data; performing security audit on the operation records of each receiver, storing the data if the audit is qualified, and alarming the unqualified operation records if the audit is unqualified to prevent the data from being tampered maliciously; and storing all data of the whole cross-domain transmission process in an audit database, and carrying out classified numbering on each cross-domain data. The invention prevents the cross-domain data from being tampered maliciously and improves the safety of the cross-domain data transmission.

Description

Cross-domain data security audit method for key information infrastructure
Technical Field
The invention relates to the technical field of cross-domain data security audit, in particular to a cross-domain data security audit method of key information infrastructure.
Background
In recent years, a data security audit system is increasingly important, and is mainly used for monitoring and recording various operation behaviors of a data server, analyzing various operations of the data server in real time and intelligently through analysis of network data, and recording the operations in an audit database for inquiring, analyzing and filtering in the future, so that monitoring and audit of user operation of a target data audit system are realized, and particularly when public data resources of various industries are integrated and utilized, the data security audit system is urgently needed to provide guarantee for security application, sharing exchange and opening of data.
In the existing data circulation use process of the key information infrastructure, the condition screening is carried out by means of a large number of manual operations in the inquiring mode aiming at the security event in the working process, the condition screening is carried out in a large number of cross-domain databases, the auditing efficiency is low, the result is greatly interfered by human factors, the problems of untimely auditing, insufficient auditing strength and the like exist, the data security auditing requirements cannot be met, the security risk exists in the data circulation use process, the traditional big data calculation method is limited by the relevant constraint of the disk reading and writing performance and the network performance, the real-time data inquiring, the real-time data storing and the like are not high-efficiency, and therefore the cross-domain data security auditing method of the key information infrastructure is designed according to the problems, and the actual use requirement of the key information infrastructure is met.
Therefore, a key information infrastructure cross-domain data security audit method is provided for the problems.
Disclosure of Invention
The invention aims to provide a key information infrastructure cross-domain data security audit method, which comprises the following steps:
step 1: respectively recording IP addresses of an initiator and a receiver of the cross-domain data, and if a plurality of receivers are provided, respectively recording the IP addresses of the plurality of receivers;
Step 2: when an initiator initiates, encrypting and transmitting the cross-domain data, each receiver carries out secure decryption on the cross-domain data, and if a certain receiver does not carry out secure decryption, the receiver of the IP address is alarmed;
step 3: after the secure decryption is completed, recording the operation record of each receiver on the cross-domain data;
Step 4: performing security audit on the operation records of each receiver, storing the data if the audit is qualified, and alarming the unqualified operation records if the audit is unqualified to prevent the data from being tampered maliciously;
step 5: and the data of the whole cross-domain transmission process are all stored in an audit database, and each cross-domain data is classified and numbered, so that the data is convenient to search.
Preferably, the operation records include, but are not limited to, modification, deletion, addition, and format conversion of data.
Preferably, in step 4, security audit is performed on the operation record of each receiver, which specifically includes the steps of:
step 41: presetting an audit rule, and extracting an operation record of a receiver;
Step 42: and (3) performing modification on the operation records conforming to the auditing rules, and performing rejection and alarm on the operation records not conforming to the auditing rules.
Preferably, the step 5 of classifying and numbering each cross-domain data specifically includes:
step 51: each cross-domain data is recorded respectively, and the cross-domain data is classified;
Step 52: recording the starting place and the receiving place in each kind of cross-domain data, and sorting the cross-domain data according to the initial letter of the starting place;
step 53: and numbering the cross-domain data according to the sequencing result.
Compared with the prior art, the invention has the following beneficial effects: the invention can record IP addresses of a plurality of receivers respectively, can conveniently identify unsafe IP addresses of the receivers through safe decryption of cross-domain data by each receiver, prevent hacking, audit the operation records of each receiver respectively, pass the operation records conforming to the audit rule, reject the operation records not conforming to the audit rule, prevent the cross-domain data from being maliciously tampered, and improve the safety of cross-domain data transmission.
Drawings
Fig. 1 is a flow chart of the steps of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the method for cross-domain data security audit of key information infrastructure provided by the invention comprises the following steps:
step 1: respectively recording IP addresses of an initiator and a receiver of the cross-domain data, and if a plurality of receivers are provided, respectively recording the IP addresses of the plurality of receivers;
Step 2: when an initiator initiates, encrypting and transmitting the cross-domain data, each receiver carries out secure decryption on the cross-domain data, and if a certain receiver does not carry out secure decryption, the receiver of the IP address is alarmed;
Step 3: recording operation records of each receiver on cross-domain data after the secure decryption is completed, wherein the operation records comprise, but are not limited to, modification, deletion, addition and format conversion of the data;
Step 4: performing security audit on the operation records of each receiver, storing the data if the audit is qualified, and alarming the unqualified operation records if the audit is unqualified to prevent the data from being tampered maliciously;
The method comprises the following specific steps:
step 41: presetting an audit rule, and extracting an operation record of a receiver;
Step 42: and (3) performing modification on the operation records conforming to the auditing rules, and performing rejection and alarm on the operation records not conforming to the auditing rules.
Step 5: all data of the whole cross-domain transmission process are stored in an audit database, and each cross-domain data is classified and numbered, so that the data is convenient to find, and the method specifically comprises the following steps:
step 51: each cross-domain data is recorded respectively, and the cross-domain data is classified;
Step 52: recording the starting place and the receiving place in each kind of cross-domain data, and sorting the cross-domain data according to the initial letter of the starting place;
step 53: and numbering the cross-domain data according to the sequencing result.
Example 1:
Step 1: respectively recording IP addresses of an initiator and receivers of the cross-domain data, wherein the number of the receivers is 3, and respectively recording the IP addresses of the 3 receivers;
Step 2: the method comprises the steps that when an initiator initiates, encryption transmission is carried out on cross-domain data, after the first receiver carries out secure decryption on the cross-domain data, the cross-domain data is modified, and the modification accords with audit rules and passes through, and operation records and the first receiver IP address are saved;
Step 3: the second receiver receives the modified encrypted cross-domain data, if the data cannot be decrypted safely, the IP of the second receiver is recorded and alarmed, and the cross-domain data is transmitted to the third receiver;
Step 4: after the third receiver receives the cross-domain data and carries out secure decryption, carrying out secondary modification on the cross-domain data, and refusing the modification because the modification does not accord with the auditing rule, and storing an operation record and the IP address of the third receiver;
step 5: all data in the whole cross-domain transmission process are stored in an audit database, each cross-domain data is recorded respectively, the cross-domain data is classified, the starting place and the receiving place in each kind of cross-domain data are recorded, the cross-domain data are ordered according to the initial letters of the starting place, and the cross-domain data are numbered according to the ordering result.
Step 6: when a manager needs to search a certain cross-domain data, after selecting a corresponding category, inputting the initial of the starting place, and conveniently and quickly finding the cross-domain data according to the starting place and the target place.
By using the technical scheme of the invention or under the inspired by the technical scheme of the invention, a similar technical scheme is designed by a person skilled in the art, so that the technical effects are achieved, and the technical effects fall into the protection scope of the invention.

Claims (4)

1. A key information infrastructure cross-domain data security audit method is characterized in that: the method comprises the following steps:
step 1: respectively recording IP addresses of an initiator and a receiver of the cross-domain data, and if a plurality of receivers are provided, respectively recording the IP addresses of the plurality of receivers;
Step 2: when an initiator initiates, encrypting and transmitting the cross-domain data, each receiver carries out secure decryption on the cross-domain data, and if a certain receiver does not carry out secure decryption, the receiver of the IP address is alarmed;
step 3: after the secure decryption is completed, recording the operation record of each receiver on the cross-domain data;
Step 4: performing security audit on the operation records of each receiver, storing the data if the audit is qualified, and alarming the unqualified operation records if the audit is unqualified to prevent the data from being tampered maliciously;
step 5: and the data of the whole cross-domain transmission process are all stored in an audit database, and each cross-domain data is classified and numbered, so that the data is convenient to search.
2. A critical information infrastructure cross-domain data security audit method according to claim 1 characterized by: the operation records include, but are not limited to, modification, deletion, addition, and format conversion of data.
3. A critical information infrastructure cross-domain data security audit method according to claim 1 characterized by: in the step 4, security audit is carried out on the operation record of each receiver, and the specific steps are as follows:
step 41: presetting an audit rule, and extracting an operation record of a receiver;
Step 42: and (3) performing modification on the operation records conforming to the auditing rules, and performing rejection and alarm on the operation records not conforming to the auditing rules.
4. A critical information infrastructure cross-domain data security audit method according to claim 1 characterized by: the step 5 of classifying and numbering each cross-domain data specifically includes:
step 51: each cross-domain data is recorded respectively, and the cross-domain data is classified;
Step 52: recording the starting place and the receiving place in each kind of cross-domain data, and sorting the cross-domain data according to the initial letter of the starting place;
step 53: and numbering the cross-domain data according to the sequencing result.
CN202410234598.4A 2024-03-01 2024-03-01 Cross-domain data security audit method for key information infrastructure Pending CN118041652A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410234598.4A CN118041652A (en) 2024-03-01 2024-03-01 Cross-domain data security audit method for key information infrastructure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410234598.4A CN118041652A (en) 2024-03-01 2024-03-01 Cross-domain data security audit method for key information infrastructure

Publications (1)

Publication Number Publication Date
CN118041652A true CN118041652A (en) 2024-05-14

Family

ID=91003904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410234598.4A Pending CN118041652A (en) 2024-03-01 2024-03-01 Cross-domain data security audit method for key information infrastructure

Country Status (1)

Country Link
CN (1) CN118041652A (en)

Similar Documents

Publication Publication Date Title
CN115733681A (en) Data security management platform for preventing data loss
US20130227604A1 (en) Automated forensic document signatures
MXPA04006390A (en) Real time data warehousing.
US10574658B2 (en) Information security apparatus and methods for credential dump authenticity verification
CN113111951B (en) Data processing method and device
CN109409849A (en) A kind of audit trail method and system of MES system
CN115174205B (en) Network space safety real-time monitoring method, system and computer storage medium
CN111915331A (en) Enterprise credit investigation data management method and system based on block chain
JP3705439B1 (en) Personal information search program, personal information management system, and information processing apparatus with personal information management function
CN114579636A (en) Data security risk prediction method, device, computer equipment and medium
CN112528325B (en) Data information security processing method and system
CN111614638A (en) Face recognition data distribution system and method based on big data platform
CN118041652A (en) Cross-domain data security audit method for key information infrastructure
CN113297583B (en) Vulnerability risk analysis method, device, equipment and storage medium
CN115632821A (en) Transformer substation threat safety detection and protection method and device based on multiple technologies
CN114722383A (en) Weak password monitoring method, device, equipment and storage medium
CN115964256B (en) Alarm method and system in asset management scene
CN116010465B (en) Financial business management system and method
US11886229B1 (en) System and method for generating a global dictionary and performing similarity search queries in a network
CN117726435B (en) Image data management method and system
CN116527303B (en) Industrial control equipment information extraction method and device based on marked flow comparison
CN111913864B (en) Method and device for discovering abnormal operation behavior based on business operation combination
CN114139189A (en) Data security processing method and device based on mutual simulation equivalence
CN117910010A (en) Distributed secure storage method and system
CN117539940A (en) SPD data automatic generation system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication