Data security audit model device and method based on knowledge graph and terminal equipment

A knowledge graph and data security technology, applied in the field of data security audit model devices based on knowledge graph, can solve the problems of low security audit efficiency, inaccurate audit results, and complex audit data.

Pending Publication Date: 2020-10-23
SHENZHEN POWER SUPPLY BUREAU +1
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a data security audit model device, method, and terminal device based on knowledge graphs, which are used to solve the existing technology of complex audit data in data security audits, resulting in low efficiency of security audits and inaccurate audit results question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security audit model device and method based on knowledge graph and terminal equipment
  • Data security audit model device and method based on knowledge graph and terminal equipment
  • Data security audit model device and method based on knowledge graph and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] figure 1 It is a frame diagram of the data security audit model device based on the knowledge map described in the embodiment of the present invention.

[0053] Such as figure 1 As shown, the embodiment of the present invention provides a data security audit model device based on a knowledge map, including an audit data ontology module 10, a knowledge map building module 20, a data collection module 30, a data analysis and mining module 40, and an execution module 50;

[0054] The audit data body module 10 is used to obtain the first audit data from the database, and divide the first audit data into entity data and entity relationship data;

[0055] Build a knowledge map module 20, which is used to extract entities and entity relationships from entity data and entity relationship data respectively, convert unstructured and semi-structured audit data into structured data, and perform entity disambiguation on structured data , After knowledge reasoning, the knowledge ma...

Embodiment 2

[0116] Figure 8 It is a flow chart of the steps of the knowledge graph-based data security audit model method described in the embodiment of the present invention.

[0117] Such as Figure 8 As shown, the embodiment of the present invention provides a knowledge map-based data security audit model method, including the following steps:

[0118] S1. Obtain the first audit data from the database, and divide the first audit data into entity data and entity relationship data;

[0119]S2. Perform entity extraction and entity relationship extraction on entity data and entity relationship data respectively, and transform unstructured and semi-structured audit data into structured data, and perform entity disambiguation and knowledge reasoning on structured data to obtain Knowledge graph of audit data;

[0120] S3. Collect the second audit data from the knowledge map, and preprocess the second audit data to obtain audit record data;

[0121] S4. Analyze the audit record data and r...

Embodiment 3

[0126] An embodiment of the present invention provides a computer-readable storage medium. The computer storage medium is used to store computer instructions. When the computer is run on a computer, the computer executes the above knowledge graph-based data security audit model method.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to a data security audit model device and method based on a knowledge graph and terminal equipment. A knowledge graph is constructed by performing entity relationship extraction and knowledge reasoning processing on first audit data obtained from a database; a data acquisition module is adopted to acquire second audit data needing security audit from a knowledge graph; a data analysis and mining module analyzes the audit record data in the data acquisition module to obtain an audit data rule; the polarity of the audit data rule is processed, so that a rule value can be obtained; whether the behavior in the audit record data is a violation behavior or not is judged according to a set rule threshold value; the security audit of all kinds of complex data under the background of big data can be realized; the data security audit model device based on the knowledge graph is high in security auditing efficiency, obtains the audit record data through theknowledge graph, and improves the accuracy of an audit result obtained through the analysis of the data analysis and mining module.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a knowledge map-based data security audit model device, method and terminal equipment. Background technique [0002] With the continuous development of network technology and scale, network security incidents occur frequently, network attack methods are becoming more and more complex, and the destructive power is becoming stronger and stronger, threatening the information and equipment system security of various organizations, institutions and individuals. Traditional network security protection measures cannot perform backtracking, analysis, reverse tracking, and evidence collection on past attack events. When it is necessary to retrospectively analyze past network events and find certain rules, so as to effectively prevent the next attack, Traditional cybersecurity measures are often not up to the task. [0003] At present, the retrospective analysis of past netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/36G06F16/35G06Q10/10
CPCG06F16/367G06Q10/103G06F16/35Y02D10/00
Inventor 陈昊丘惠军连耿雄孙强强陈霖匡晓云许爱东杨祎巍
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products