Unlock instant, AI-driven research and patent intelligence for your innovation.

Full-life-cycle-oriented data security anomaly detection method and system

A full life cycle, data security technology, applied in the field of abnormal data behavior, to achieve the effect of taking into account the complexity of implementation, taking into account the detection accuracy, and meeting the needs of refined management

Pending Publication Date: 2022-02-25
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In order to solve the problem of accurate detection of data abnormal behavior in the big data environment, and the problem of unified monitoring of the whole life cycle of data production / collection, transmission, storage, use, sharing and destruction, the present invention proposes a data security oriented to the whole life cycle The anomaly detection method and system, oriented to different task scenarios, adopts abnormal behavior detection combined with multi-dimensional dynamic data behavior baseline analysis and feature database, providing a full life cycle coverage, fine management, accurate detection, and easy Realized plan

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Full-life-cycle-oriented data security anomaly detection method and system
  • Full-life-cycle-oriented data security anomaly detection method and system
  • Full-life-cycle-oriented data security anomaly detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Aiming at the problem of accurate detection of abnormal data behavior in the big data environment, and the problem of unified monitoring of the whole life cycle of data production / collection, transmission, storage, use, sharing, and destruction, this embodiment provides a full life cycle data security anomaly detection methods such as figure 1 shown, including:

[0052] Unified data model construction: Driven by tasks, collect task-related full life cycle data, extract relevant data that users focus on, and establish a unified data model;

[0053] Data behavior analysis: conduct real-time data behavior analysis and historical data behavior analysis, extract data behavior characteristics to establish a feature library, establish a multi-dimensional dynamic data behavior baseline and form a baseline library, and keep updating;

[0054] Abnormal data behavior detection: discover abnormal data behavior based on the feature database and baseline database, first detect known...

Embodiment 2

[0078] This embodiment is on the basis of embodiment 1:

[0079] This embodiment provides a data security anomaly detection system oriented to the whole life cycle, including:

[0080] The unified data model building module is used to collect task-related full life cycle data driven by tasks, extract relevant data that users focus on, and establish a unified data model;

[0081] The data behavior analysis module is used for real-time data behavior analysis and historical data behavior analysis, extracting data behavior characteristics to establish a feature library, establishing a multi-dimensional dynamic data behavior baseline and forming a baseline library, which is constantly updated;

[0082] The data abnormal behavior detection module is used to discover abnormal data behaviors based on the feature database and the baseline database. When the dynamic data behavior is baseline, it is judged as abnormal.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a full-life-cycle-oriented data security anomaly detection method and system. The method comprises the steps: unified data model construction: taking a task as a drive, collecting full-life-cycle data related to the task, extracting related data focused by a user, and building a unified data model; data behavior analysis: carrying out real-time data behavior analysis and historical data behavior analysis, extracting data behavior features to establish a feature library, establishing a multi-dimensional dynamic data behavior baseline, forming a baseline library, and continuously updating; and data abnormal behavior detection: discovering data abnormal behaviors based on the feature library and the baseline library, firstly detecting known anomalies based on the feature library, then analyzing actual data behaviors based on the multi-dimensional dynamic data behavior baseline of the baseline library, and when the actual data behaviors deviate from the multi-dimensional dynamic data behavior baseline, determining that the data behaviors are abnormal. According to the invention, a scheme with full life cycle coverage, fine management, accurate detection and easy realization can be provided for data abnormal behavior detection.

Description

technical field [0001] The present invention relates to the technical field of abnormal data behavior, in particular to a data security anomaly detection method and system oriented to the whole life cycle. Background technique [0002] With the continuous development of cloud computing and big data technology, the amount of data in various industries is increasing, the degree of data concentration is getting higher and higher, data cross-domain use is becoming more and more frequent, data business scenarios are becoming more and more complex, innovative data use There are more and more scenarios, and data assets face various internal and external threats, such as virus intrusion, illegal attacks, data theft, unauthorized access, and illegal operations. Therefore, it is urgent to strengthen data behavior monitoring to ensure data security. Data abnormal behavior detection is an important content of data behavior monitoring, especially in the big data environment, accurate det...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F11/34
CPCG06F21/577G06F11/3438
Inventor 牛作元张锋军李庆华许杰石凯
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP