Data access exception monitoring method and device

A data access and anomaly monitoring technology, which is applied in the field of information security, can solve the problems of poor model effect and universality, and the accuracy of anomaly monitoring needs to be further improved, so as to achieve the effect of improving accuracy and protecting core data and property security

Active Publication Date: 2020-06-26
TENCENT CLOUD COMPUTING BEIJING CO LTD
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In related technologies, based on the analysis of the daily general operation logs of the enterprise, the model training is carried out on the daily behavior of employees. However, the model trained by this method is often effective in the management of flat employees; For companies with fine divisions, the model effect and versatility are poor, resulting in the need for further improvement in the accuracy of anomaly monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access exception monitoring method and device
  • Data access exception monitoring method and device
  • Data access exception monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the accompanying drawings, and the described embodiments should not be considered as limiting the present invention, and those of ordinary skill in the art do not make any All other embodiments obtained under the premise of creative labor belong to the protection scope of the present invention.

[0079] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and Can be combined with each other without conflict.

[0080] In the following description, the term "first\second" is only used to distinguish similar objects, and does not represent a specific order for objects. It is understandable that "first\second" can be used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an exception monitoring method and device for data access and a storage medium. The method comprises the steps of receiving a data access request for a target employee, whereinthe data access request is used for requesting to access target resource data corresponding to a target service in an enterprise management system; based on the data access request, access informationincluding an access permission bit is determined, and the access permission bit is used for identifying an access permission corresponding to the target resource data; predicting a job role of the target employee through a role classification model based on the access information; obtaining a job role of the target employee in the enterprise management system; matching the predicted job role withthe job role of the target employee in the enterprise management system to obtain a matching result; and when the matching result represents that the predicted job role is different from the job roleof the target employee in the enterprise management system, returning prompt information of refusing the data access request. According to the invention, the accuracy of exception monitoring of dataaccess can be improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data access abnormality monitoring method and device. Background technique [0002] With the rapid development of Internet technology, network applications such as enterprise management systems are playing an increasingly important role in work. Since network application services involve the core data of enterprises, their safe and stable operation is very important; at the same time, for Network application attacks continue to emerge, such as hacker intrusion, virus and Trojan horse, etc. In order to protect the core data and property security of enterprises, anomaly monitoring has become an important and urgent issue in the field of network security. [0003] In related technologies, based on the analysis of the daily general operation logs of the enterprise, the model training is carried out on the daily behavior of employees. However, the model trained by this ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1425H04L63/0838H04L63/102H04L63/18G06F18/23G06F18/24
Inventor 徐元峰吴春颖
Owner TENCENT CLOUD COMPUTING BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products