Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operation data safety assessment method, device, equipment and readable storage medium

A technology for operating data and security assessment, applied in the field of data security, can solve the problems of low accuracy of security assessment of operational data, less log information, and impact

Pending Publication Date: 2019-12-03
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

4) Electronic data evaluation method based on data visualization technology in the big data environment: In the big data environment, the collected evaluation data brings great challenges to the evaluation data analysis in terms of quantity and complexity
[0004] The development direction of the above-mentioned mainstream data security assessment, the collection of assessment data is still based on the collection of ordinary logs as the data source for security assessment, the log records information is less, and the technical ability and experience of assessors still play a decisive role in the assessment process, which is very important for security. Risk mining needs to rely on the experience of evaluators, or the rules formulated based on experience, which are seriously affected by subjective factors, and the accuracy of operational data security assessment is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation data safety assessment method, device, equipment and readable storage medium
  • Operation data safety assessment method, device, equipment and readable storage medium
  • Operation data safety assessment method, device, equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] see figure 1 , figure 1 It is an implementation flowchart of the security assessment method for operating data in the embodiment of the present invention, and the method may include the following steps:

[0046] S101: When it is detected that the operation data is generated, perform feature calculation on the operation content data in the operation data to obtain a data identifier corresponding to the operation content data.

[0047] When the user operates the database, application system, and terminal (PC, server, etc.) of the computer system, corresponding operation data will be generated. When the generation of operation data is detected, the feature calculation is performed on the operation content data in the operation data to obtain the data identification corresponding to the operation content data, and the data identification can be recorded along with the log file. The operation data can include operation process data such as the operation user's IP, user nam...

Embodiment 2

[0056] see figure 2 , figure 2 It is another implementation flowchart of the security assessment method for operating data in the embodiment of the present invention, and the method may include the following steps:

[0057] S201: When it is detected that the operation data is generated, perform feature calculation on the operation content data in the operation data to obtain a data identifier corresponding to the operation content data.

[0058] S202: When the data change content in the operation data is structured database data, use the association model to associate the data identification and operation process data in the operation data with each security risk in the database security audit knowledge base of the data security audit knowledge base Matching operation is performed on the knowledge data to obtain the matching operation result.

[0059] Among them, the data security audit knowledge base is obtained through artificial intelligence learning and training.

[0...

Embodiment 3

[0065] see image 3 , image 3 It is another implementation flowchart of the security assessment method for operating data in the embodiment of the present invention, and the method may include the following steps:

[0066] S301: When it is detected that the operation data is generated, and the data change content in the operation data is unstructured file data, use the preset file analysis engine to analyze the operation data, and perform feature calculation on the analyzed operation content data, Obtain the data identifier corresponding to the operation content data.

[0067] A file parsing engine for parsing unstructured file data can be set in advance. When it is determined that the content of data changes caused by user operations in the operation data is unstructured file data (such as PDF document data), the preset The file parsing engine parses the operation data, performs feature calculation on the parsed operation content data, and obtains a data identifier corresp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an operation data safety evaluation method, which comprises the following steps of: when the generation of operation data is detected, performing feature calculation on operation content data in the operation data to obtain a data identifier corresponding to the operation content data; utilizing a preset association model to perform matching operation on the operation process data in the data identifier and the operation data and each part of safety risk knowledge data in the data safety audit knowledge base to obtain a matching operation result; wherein the data safetyaudit knowledge base is obtained through artificial intelligence learning training; and determining whether an operation corresponding to the operation data is a risk operation or not according to amatching operation result. By applying the technical scheme provided by the embodiment of the invention, comprehensive recognition recording of the operation data is realized, the influence of subjective factors is eliminated, and the accuracy of operation data safety evaluation is greatly improved. The invention further discloses an operation data safety assessment device and equipment and a storage medium, and the corresponding technical effects are achieved.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a security assessment method, device, equipment and computer-readable storage medium for operating data. Background technique [0002] Data security assessment is to make relevant records of the corresponding users' operations in the computer system, so as to prepare for timely warning, effective remedy and accountability investigation after the user violates the rules. All user activities on the computer system, such as on-board and off-board time, operations related to the security of sensitive data, resources, text, etc. in the computer information system, can be recorded in the log files collected by the audit system at any time, and recorded The log files are not only convenient for discovery, investigation, analysis and post-event accountability, but also can provide a basis for strengthening management measures. Therefore, data security assessment has gradual...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/34G06F21/57
CPCG06F11/3438G06F21/57
Inventor 毕凯峰许爱东明哲杨航陈霖邓子杰
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products