Secret-associated network information leakage risk monitoring method

A risk monitoring and secret-related technology, which is applied in the field of network information leakage risk monitoring, can solve the problems of leaking secrets and the lack of comprehensive supervision of hidden danger behaviors, and achieves the effect of high judgment accuracy, easy audit management, and wide monitoring coverage.

Inactive Publication Date: 2018-06-12
BEIJING INST OF CONTROL & ELECTRONICS TECH
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a method for monitoring the risk of information leakage on a secret-related network, which sol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0039] The specific steps of a method for monitoring the risk of confidential network information leakage are:

[0040] The first step is to build a confidential network information leakage risk monitoring system

[0041] The confidential network information leakage risk monitoring system includes: client operation record module, leakage risk analysis module, operation correlation module and server-side behavior analysis module.

[0042] The function of the operation record module is: a monitoring module loaded on the user client in a driving form, real-time monitoring and recording of the client's file operations, program operations, network operations, and file inflow and outflow events. The operation record is formed according to factors such as operation ID, operation time, process, thread, operation method, input file, input file attribute, output file or uploaded data package, output file attribute, and the operation record is passed to the leakage risk analysis module.

[0043]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret-associated network information leakage risk monitoring method. User operations are recorded in real time in each client, a complete behavior, that a file flows out ofthe client, of a user this time is recovered by taking the event that the file flows out of the client as a starting point, and then whether or not a single behavior has a leakage hazard is analyzed and judged in the client according to security level management provisions in a secret-associated network; and the behaviors of the various clients in the secret-associated network are uploaded to a behavior library of a server, all leakage hazard behaviors related to the behaviors of the clients are tracked and analyzed out, therefore, the secret-associated files are effectively prevented from flowing out of the secret-associated network, and leakage events are avoided. According to the method, the dilemma that current secret-associated network security protection means are powerless for the behaviors that malicious leakers leak secrets by using normal printing and burning ways is solved, and the defects of an existing monitoring method are overcome. The method is wider in monitoring coverage, higher in judgment accuracy rate and convenient for audit management of security protection personnel.

Description

technical field [0001] The invention relates to a network information leakage risk monitoring method, in particular to a secret-related network information leakage risk monitoring method. Background technique [0002] The national secrets-related network is managed in a hierarchical protection mode, and it is mainly used in the government, military, military industry and other fields. The national secret network carries a large amount of national secret information, and its security requirements are extremely high. Once a leak occurs, it will bring huge losses to the country. Under the hierarchical protection management system, the secret-related network is completely physically isolated from the Internet. The export of secret-related information to the secret-related network mainly relies on the process approval management mechanism and the centralized output management mechanism. The secret-related information is exported to the secret-related network in the form of files....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L41/14H04L63/20H04L63/30H04L67/06
Inventor 李晓龙李宁刘宵瑞赵藤腾郑红驹甘志强
Owner BEIJING INST OF CONTROL & ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products