Check patentability & draft patents in minutes with Patsnap Eureka AI!

Data security risk identification method and device based on complex network analysis

A complex network, risk identification technology, applied in the direction of digital data protection, can solve problems such as insufficient accuracy and insufficient prediction results

Active Publication Date: 2021-06-18
闪捷信息科技有限公司
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, most of the current risk assessments for enterprise data are based on single-sided data for model architecture, and then data risk prediction through the model. The prediction results obtained by this prediction method are generally not comprehensive enough, and the accuracy is not high enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security risk identification method and device based on complex network analysis
  • Data security risk identification method and device based on complex network analysis
  • Data security risk identification method and device based on complex network analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0044] figure 1 A schematic flowchart of a data security risk identification method based on complex network analysis provided by an embodiment of the present invention, as shown in figure 1 As shown, the embodiment of the present invention provides a data security risk identification method based on complex network analysis, including:

[0045]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data security risk identification method and device based on complex network analysis, and the method comprises the steps of collecting related data of a to-be-detected service, and constructing a complex network according to vertex data and boundary data; grouping vertexes in a complex network, obtaining a preset measurement index, and calculating a first risk score of the vertex in each group through the measurement index; obtaining a special structure in the complex network through a preset isomer detection algorithm, and comparing the special structure with the complex network to obtain a second risk score of each vertex; obtaining a black list, a white list and a preset risk propagation algorithm, and calculating a third risk score of each vertex in the complex network; and performing comprehensive calculation according to the first, second and third risk scores of each vertex to obtain a comprehensive risk score of each vertex in the complex network. By adopting the method, the three comprehensive scores can be used as the final risk score of the data, so that the final risk score is comprehensive and higher in accuracy.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data security risk identification method and device based on complex network analysis. Background technique [0002] With the development of information technology in the times, data assets have become one of the most important assets of various enterprises. However, in recent years, many enterprises have suffered heavy losses due to data leakage, so data security is becoming more and more important. To protect data security, it is necessary to conduct risk assessments on entities such as accounts, clients, and servers related to data assets. [0003] However, most of the current risk assessments for enterprise data are based on single-side data for model construction, and then data risk prediction through the model. The prediction results obtained by this prediction method are generally not comprehensive enough, and the accuracy is not high enough. Contents of the inve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/60
Inventor 张黎程树华穆新宇刘维炜叶柳鹤
Owner 闪捷信息科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More