Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Query result set sensitivity-based data leakage detection method

A technology for query results and detection methods, applied in the field of data security, can solve the problems of lack of consideration of the relationship between data objects and the inability to assess the degree of data sensitivity, and achieve the effect of efficient data leakage detection methods, reduced intervention, and reasonable calculation

Active Publication Date: 2018-01-26
SOUTHEAST UNIV
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most of the existing technologies use the M-Score method for data leakage detection, but this method requires database experts to define a detailed sensitivity function in advance, and lacks consideration of the relationship between data objects, and cannot accurately and efficiently determine the sensitivity of the data. to evaluate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Query result set sensitivity-based data leakage detection method
  • Query result set sensitivity-based data leakage detection method
  • Query result set sensitivity-based data leakage detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] figure 1 It is a schematic flow chart of the data leakage detection method of the present invention.

[0039] This embodiment provides a data leakage detection method based on the sensitivity of the query result set, including the following steps:

[0040] Step 1. Construct a sensitivity assessment model, which includes not only the sensitivity and inheritance relationship of tables and attributes in the database, but also the relationship between attributes;

[0041] Step 2. Obtain the returned result set of the interactive query request between the user and the database; calculate the sensitivity of the query result set according to the sensitivity evaluation model;

[0042] Step 3: accumulating the sensitivities of multiple query result sets of the user within a certain time window, and sending an alarm to the administrator if the threshold value of the user (user role) is exceeded.

[0043] Step 1. Establish a sensitivity assessment model based on the domain knowl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a query result set sensitivity-based data leakage detection method. The method comprises the following steps of: I, constructing a corresponding sensitivity assessment model according to sensitivities of data in a database, wherein the sensitivity assessment model not only comprises sensitivities of each table and attribute and an inheritance relationship thereof in the database, but also comprises an association relationship between the attributes; II, obtaining a result set returned by a user query database and calculating the a sensitivity of the query result set according to the sensitivity assessment model; and III, accumulating a plurality of query result set sensitivities of a user in a certain time window, and if the sum exceeds a threshold value of the user(user character), raising an alarm for managers. The method is capable of effectively detecting the occurrence of data leakage events and improving the data safety.

Description

technical field [0001] The invention relates to a data leakage detection technology based on the sensitivity of a query result set, and belongs to the technical field of data security. Background technique [0002] Data is an important asset of organizations, enterprises and individuals. However, data leakage incidents occur from time to time and cause great losses to data owners. In recent years, data leakage has become the source of the black industry chain of information trafficking. Although access control can ensure that only authorized users can access the corresponding data, which can effectively prevent data leakage, due to the impact of system performance and management costs, business systems usually adopt relatively loose access control mechanisms. The direct manifestation of the loose access mechanism is that users usually obtain more permissions than they actually need, and can access sensitive data beyond normal business requirements, which obviously bury hidd...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/30
Inventor 吴文甲罗军舟魏娜杨明凌振
Owner SOUTHEAST UNIV
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More