Computer defense system and method based on data depth association
A defense system and computer technology, applied in computer parts, computer security devices, computing, etc., can solve the problems of internal staff leaking secrets, affecting file transmission and use, etc., to improve security, improve training speed and convergence, and improve The effect of accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] Hereinafter, exemplary embodiments according to the present application will be described in detail with reference to the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments of the present application. It should be understood that the present application is not limited by the exemplary embodiments described here.
[0045] Scenario overview
[0046] As mentioned above, at present, most enterprises mainly conduct information security protection work from the two aspects of external network and internal network. The external network mainly uses security equipment such as firewalls and anti-attacks for security information protection to prevent hackers or external visitors from entering the enterprise intranet to steal core data within the enterprise. However, scandals such as important data leaks in most companies today are mainly caused by internal employees actively l...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


