Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud platform data leakage path identification method based on graph computing technology

A leakage path and identification method technology, applied in the field of computer information systems, can solve the problems of leakage data (lack, inapplicability of logical evaluation range of influence, lack of methods and technical means, etc.

Active Publication Date: 2022-07-05
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

How to identify hidden leaked data from a set of normal operation behavior sequences (the operation currently lacks a set of effective methods
[0003] At the same time, because the operation behavior of the cloud platform relies on many related resources, one behavior often directly triggers another behavior. For example, creating a virtual machine is often accompanied by creating a network card operation. Because the correlation between these behaviors has the characteristics of the cloud platform, The scope of influence of the traditional logical evaluation cannot be applied, and there is a lack of corresponding methods and technical means for how to effectively associate the operation behavior of the cloud platform triggered by the association with the original operation behavior for evaluation and analysis
[0004] Aiming at the above problems, a general method of using graph computing technology to identify cloud platform operation behaviors that lead to cloud platform data leakage is designed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud platform data leakage path identification method based on graph computing technology
  • Cloud platform data leakage path identification method based on graph computing technology
  • Cloud platform data leakage path identification method based on graph computing technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below with reference to the accompanying drawings.

[0025] In order to restore data leakage scenarios caused by operational behaviors on the cloud platform, it is first necessary to identify the relevant behavior paths that lead to data leakage scenarios. The implemented method for identifying data leakage path of cloud platform based on graph computing technology is mainly as follows: figure 1 First, set the data leakage trigger collection, then obtain the event impact path collection, and finally perform the data leakage behavior path search.

[0026] (1) Set the data leakage trigger set

[0027] The identification of data leakage behavior is firstly based on the scenario where the data has been leaked, and the possible triggering behavior is selected according to the data leakage scenario. The method of the present invention is to gradually restore the data leakage scene according to the way that the leakage result a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computer information systems, and discloses a cloud platform data leakage path identification method based on graph computing technology. It includes several steps of data leakage trigger set setting, event impact path collection acquisition, and data leakage behavior path search. The above technical solution first sets a trigger behavior set that may trigger leakage, and then builds a subgraph based on the relationship degree, filters out the resources and the farthest behavior, obtains the set of elements that affect the path, and finally uses the starting point, the necessary point, and the end point to find it. The behavior path of data leakage can be found out; through this process, the data leakage behavior sequence hidden in the normal behavior sequence can be found, and the behavior of the data leakage scenario can be restored to the maximum extent.

Description

technical field [0001] The invention relates to the technical field of computer information systems, in particular to a cloud platform data leakage path identification method based on graph computing technology. Background technique [0002] With the vigorous development of cloud computing technology, the use of cloud platforms for IT operation and maintenance has become the mainstream in the industry. However, the identification method of operation behaviors on cloud platforms mainly relies on single-item matching of collected text data through regular expressions. To realize the recognition and extraction of a single behavior, there is still a lack of an effective and general method for the recognition of the second-degree hidden behavior generated by multiple behavior sets. However, most of the behaviors that lead to data leakage on the cloud platform are actually hidden in normal operation behaviors, such as taking a snapshot of an already created virtual machine, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F16/34G06F16/11
CPCG06F21/6218G06F16/34G06F16/128
Inventor 刘恕涛文占婷王红伟薛彬彬岳桂华陈锦王禹成林
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP