Data stealing detection method, system and equipment based on log causal traceability
The invention discloses a data stealing detection method, system and device based on log causal traceability, mainly relates to the technical field of data stealing detection, and is used for solving the problems that an existing data stealing detection method is lack of causal semantics, low in det...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | ZOU SIDA ZHENG CHUANYI LU YANKE ZHAI YONGJI |
description | The invention discloses a data stealing detection method, system and device based on log causal traceability, mainly relates to the technical field of data stealing detection, and is used for solving the problems that an existing data stealing detection method is lack of causal semantics, low in detection accuracy and the like. Comprising the steps of obtaining a preprocessed log through a terminal unified log platform; abstracting the preprocessing log into an initial dependency graph through a calculation engine; wherein the dependency graph comprises an operation relation; determining a priority score corresponding to each operation relationship based on the overall relationship ratio and the entity node ratio corresponding to the operation relationship; obtaining a final dependency graph; obtaining an implicit behavior sequence corresponding to the final dependency graph; and comparing the implicit behavior sequence with an implicit behavior call chain corresponding to a preset data stealing behavior to d |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN115086071A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN115086071A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN115086071A3</originalsourceid><addsrcrecordid>eNqNyjsOwjAQRVE3FAjYw9CDFAvxaVEAUVFBHU3iR7DkH3hSZPe4YAFUt7hnqh4nFqYsYGdDTwaCTmwM5CGvaFaUxzI9cTCE92CTRxBqOcNQUS721PGQ2ZF8uAO31lkZ52ryZJex-HWmlpfzvb6ukWKDnIoMkKa-ab2tDrtqr4-bf8wXymY5Fw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Data stealing detection method, system and equipment based on log causal traceability</title><source>esp@cenet</source><creator>ZOU SIDA ; ZHENG CHUANYI ; LU YANKE ; ZHAI YONGJI</creator><creatorcontrib>ZOU SIDA ; ZHENG CHUANYI ; LU YANKE ; ZHAI YONGJI</creatorcontrib><description>The invention discloses a data stealing detection method, system and device based on log causal traceability, mainly relates to the technical field of data stealing detection, and is used for solving the problems that an existing data stealing detection method is lack of causal semantics, low in detection accuracy and the like. Comprising the steps of obtaining a preprocessed log through a terminal unified log platform; abstracting the preprocessing log into an initial dependency graph through a calculation engine; wherein the dependency graph comprises an operation relation; determining a priority score corresponding to each operation relationship based on the overall relationship ratio and the entity node ratio corresponding to the operation relationship; obtaining a final dependency graph; obtaining an implicit behavior sequence corresponding to the final dependency graph; and comparing the implicit behavior sequence with an implicit behavior call chain corresponding to a preset data stealing behavior to d</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220920&DB=EPODOC&CC=CN&NR=115086071A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220920&DB=EPODOC&CC=CN&NR=115086071A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ZOU SIDA</creatorcontrib><creatorcontrib>ZHENG CHUANYI</creatorcontrib><creatorcontrib>LU YANKE</creatorcontrib><creatorcontrib>ZHAI YONGJI</creatorcontrib><title>Data stealing detection method, system and equipment based on log causal traceability</title><description>The invention discloses a data stealing detection method, system and device based on log causal traceability, mainly relates to the technical field of data stealing detection, and is used for solving the problems that an existing data stealing detection method is lack of causal semantics, low in detection accuracy and the like. Comprising the steps of obtaining a preprocessed log through a terminal unified log platform; abstracting the preprocessing log into an initial dependency graph through a calculation engine; wherein the dependency graph comprises an operation relation; determining a priority score corresponding to each operation relationship based on the overall relationship ratio and the entity node ratio corresponding to the operation relationship; obtaining a final dependency graph; obtaining an implicit behavior sequence corresponding to the final dependency graph; and comparing the implicit behavior sequence with an implicit behavior call chain corresponding to a preset data stealing behavior to d</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjsOwjAQRVE3FAjYw9CDFAvxaVEAUVFBHU3iR7DkH3hSZPe4YAFUt7hnqh4nFqYsYGdDTwaCTmwM5CGvaFaUxzI9cTCE92CTRxBqOcNQUS721PGQ2ZF8uAO31lkZ52ryZJex-HWmlpfzvb6ukWKDnIoMkKa-ab2tDrtqr4-bf8wXymY5Fw</recordid><startdate>20220920</startdate><enddate>20220920</enddate><creator>ZOU SIDA</creator><creator>ZHENG CHUANYI</creator><creator>LU YANKE</creator><creator>ZHAI YONGJI</creator><scope>EVB</scope></search><sort><creationdate>20220920</creationdate><title>Data stealing detection method, system and equipment based on log causal traceability</title><author>ZOU SIDA ; ZHENG CHUANYI ; LU YANKE ; ZHAI YONGJI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN115086071A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2022</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>ZOU SIDA</creatorcontrib><creatorcontrib>ZHENG CHUANYI</creatorcontrib><creatorcontrib>LU YANKE</creatorcontrib><creatorcontrib>ZHAI YONGJI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ZOU SIDA</au><au>ZHENG CHUANYI</au><au>LU YANKE</au><au>ZHAI YONGJI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Data stealing detection method, system and equipment based on log causal traceability</title><date>2022-09-20</date><risdate>2022</risdate><abstract>The invention discloses a data stealing detection method, system and device based on log causal traceability, mainly relates to the technical field of data stealing detection, and is used for solving the problems that an existing data stealing detection method is lack of causal semantics, low in detection accuracy and the like. Comprising the steps of obtaining a preprocessed log through a terminal unified log platform; abstracting the preprocessing log into an initial dependency graph through a calculation engine; wherein the dependency graph comprises an operation relation; determining a priority score corresponding to each operation relationship based on the overall relationship ratio and the entity node ratio corresponding to the operation relationship; obtaining a final dependency graph; obtaining an implicit behavior sequence corresponding to the final dependency graph; and comparing the implicit behavior sequence with an implicit behavior call chain corresponding to a preset data stealing behavior to d</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN115086071A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Data stealing detection method, system and equipment based on log causal traceability |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T16%3A40%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ZOU%20SIDA&rft.date=2022-09-20&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN115086071A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |