HTTP protocol data leak prevention method and system based on deep content analysis

A HTTP protocol and data technology, applied in transmission systems, electrical components, etc., can solve problems such as difficult user configuration, opaque network, easy loss of network control, etc., to achieve good user experience and protect internal data of the enterprise

Active Publication Date: 2016-06-08
北京中测安华科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Among them, firewalls and gateways work below the network layer, and only a few advanced firewalls can simply filter data such as ID numbers and bank account numbers in application layer data. , transport layer and network layer protocol characteristics, and for specific applications and file types, simple matching and filtering of data such as ID numbers and bank account numbers in application layer data, but advanced firewalls do not have the depth of application layer protocols Parsing and matching functions, unable to block emails with illegal content, and only support limited applications, poor scalability, difficult for users to configure, and opaque to the network
The proxy mode sacrifices speed in exchange for higher security performance, but it will become the bottleneck of the network when the network throughput is large, and corresponding proxy needs to be set up, which affects user experience and is difficult to implement and promote
The bypass mode is connected to the network through the port mirroring of the switch, and the TCP protocol can be blocked from sending TCP_RESET messages, but due to the lag of the TCP_RESET message, it is easy to lose control of the network, resulting in the leakage of protected data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • HTTP protocol data leak prevention method and system based on deep content analysis
  • HTTP protocol data leak prevention method and system based on deep content analysis
  • HTTP protocol data leak prevention method and system based on deep content analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0042] figure 1 It is a flow chart of the HTTP protocol data leakage prevention method based on deep content analysis provided by the present invention, such as figure 1 As shown, the steps include:

[0043] Step S101: A data leakage prevention system for blocking confidential data is connected in series at the network border.

[0044] Step S102: Use the data leakage prevention system to capture the outgoing message and determine the protocol type of the outgoing message.

[0045] Specifically, use the data leakage prevention system to obtain the port characteristics (such as the port number) of the outgoing message, and determine whether the protocol t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an HTTP protocol data leak prevention method and system based on deep content analysis, and relates to the field of data protection. The method comprises the steps that a data leak prevention system for blocking secret-associated data is connected into a network boundary in series; the data leak prevention system is utilized for capturing an outgoing message and determining a protocol type of the outgoing message; when the protocol type of the outgoing message is determined to be an HTTP protocol, whether the outgoing message contains secret-associated data or not is judged; if it is determined that the outgoing message contains the secret-associated data, secret-associated data leak is blocked. According to the method and system, effective blockage of network boundary HTTP protocol sensitive data is achieved, deep analysis and real-time matching functions are provided for the outgoing message, the leak resistance phenomenon is avoided, enterprise data assets safety is effectively protected, transparency to users is achieved, user experience is not affected, and the method and system are easy for users to accept.

Description

technical field [0001] The invention relates to the field of data protection, in particular to an HTTP protocol data leakage prevention method and system based on deep content analysis. Background technique [0002] Today, with the rapid development of information technology, enterprises rely more and more on information systems, and the stability and security of information systems are directly related to the core competitiveness of enterprises. [0003] Enterprise users use WEB browsers to send and receive emails, post on social networks such as Weibo, Tianya, Tieba, etc., and use network disks to store files, etc., which will cause active or passive information leakage and bring huge economic losses to the enterprise. [0004] WEB browsers mainly use Hypertext Transfer Protocol (HyperTextTransferProtocol, HTTP) for data transmission. At present, the problem of preventing sensitive data leakage of HTTP protocol at the network border is mainly based on the four main streams...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/308H04L67/02
Inventor 代刚郭卓越李宁孙彦雷唐玉山司禹
Owner 北京中测安华科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products