Data leakage detecting method, system, device and storage medium

A data leakage and detection method technology, applied in the field of data security, can solve the problems of data leakage detection system such as missed judgment, difficult deployment, poor stability, etc., achieve convenient deployment and maintenance, prevent data encryption attacks, and improve speed and efficiency Effect

Active Publication Date: 2019-03-26
SANGFOR TECH INC
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology describes an improved way to prevent unauthorized intrusions into computer networks from leaking sensitive or confidential material over their own system's communication pathways during times when they shouldn’t work properly (called hacking). By identifying any potential security holes within this vulnerable area before sending them downstream, it becomes easier to protect against these weaknesses while still working correctly. Additionally, if someone tries to compromise another part of the organization behind the original one, he will have better chance at finding out who else was supposedly responsible rather than just stealing important materials. Overall, this new approach helps improve overall safety measures and enhance organizational performance.

Problems solved by technology

This technical problem addressed in this patented text relates to improving the efficiency at identifying potential threats from attacks against remote display devices by analyzing their activity patterns while preventing unauthorized accesses for legitimate users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data leakage detecting method, system, device and storage medium
  • Data leakage detecting method, system, device and storage medium
  • Data leakage detecting method, system, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0051] The solution of the embodiment of the present invention is mainly: identify the data server existing in the current network through the detection device, detect the access traffic of the preset key traffic transmission node in the data server, and obtain the session corresponding to each access traffic; track and Recording the traffic behavior of each session, generating a historical traffic log; using the abnormal behavior characteristics in the historical traffic log that match the preset abnormal feature set as the target feature; obtaining the category of the target feature, and determining according to the category of the target feature Corresponding data leakage judgment strategy; according to the data leakage judgment strategy, it is judged whether there is a data leakage threat in the target feature, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data leakage detecting method, a system, a device and a storage medium. The data leakage detecting method comprises the following steps of: identifying a data server presenting in the current network by a detecting device; detecting the access traffic of a preset critical traffic transmitting node in the data server to obtain session corresponding to each access traffic;tracking and recording the traffic behavior of each session to generate a historical traffic log; taking the abnormal behavior features matched with a preset abnormal feature set in the historical traffic log as target features; obtaining the category of the target features; determining a corresponding data leakage judging strategy according to the category of the target features; judging whethera data leakage threat presents in the target features according to the data leakage judging strategy; and performing target processing on the abnormal behavior features. According to the data leakagedetecting method, the judgment accuracy of data leakage is improved, data encryption attack behaviors are effectively prevented, existing services need not be changed, and deployment and maintenance are more convenient.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products