Data stealing detection method, system and equipment based on log causal traceability

The invention discloses a data stealing detection method, system and device based on log causal traceability, mainly relates to the technical field of data stealing detection, and is used for solving the problems that an existing data stealing detection method is lack of causal semantics, low in det...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ZOU SIDA, ZHENG CHUANYI, LU YANKE, ZHAI YONGJI
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator ZOU SIDA
ZHENG CHUANYI
LU YANKE
ZHAI YONGJI
description The invention discloses a data stealing detection method, system and device based on log causal traceability, mainly relates to the technical field of data stealing detection, and is used for solving the problems that an existing data stealing detection method is lack of causal semantics, low in detection accuracy and the like. Comprising the steps of obtaining a preprocessed log through a terminal unified log platform; abstracting the preprocessing log into an initial dependency graph through a calculation engine; wherein the dependency graph comprises an operation relation; determining a priority score corresponding to each operation relationship based on the overall relationship ratio and the entity node ratio corresponding to the operation relationship; obtaining a final dependency graph; obtaining an implicit behavior sequence corresponding to the final dependency graph; and comparing the implicit behavior sequence with an implicit behavior call chain corresponding to a preset data stealing behavior to d
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN115086071A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN115086071A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN115086071A3</originalsourceid><addsrcrecordid>eNqNyjsOwjAQRVE3FAjYw9CDFAvxaVEAUVFBHU3iR7DkH3hSZPe4YAFUt7hnqh4nFqYsYGdDTwaCTmwM5CGvaFaUxzI9cTCE92CTRxBqOcNQUS721PGQ2ZF8uAO31lkZ52ryZJex-HWmlpfzvb6ukWKDnIoMkKa-ab2tDrtqr4-bf8wXymY5Fw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Data stealing detection method, system and equipment based on log causal traceability</title><source>esp@cenet</source><creator>ZOU SIDA ; ZHENG CHUANYI ; LU YANKE ; ZHAI YONGJI</creator><creatorcontrib>ZOU SIDA ; ZHENG CHUANYI ; LU YANKE ; ZHAI YONGJI</creatorcontrib><description>The invention discloses a data stealing detection method, system and device based on log causal traceability, mainly relates to the technical field of data stealing detection, and is used for solving the problems that an existing data stealing detection method is lack of causal semantics, low in detection accuracy and the like. Comprising the steps of obtaining a preprocessed log through a terminal unified log platform; abstracting the preprocessing log into an initial dependency graph through a calculation engine; wherein the dependency graph comprises an operation relation; determining a priority score corresponding to each operation relationship based on the overall relationship ratio and the entity node ratio corresponding to the operation relationship; obtaining a final dependency graph; obtaining an implicit behavior sequence corresponding to the final dependency graph; and comparing the implicit behavior sequence with an implicit behavior call chain corresponding to a preset data stealing behavior to d</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220920&amp;DB=EPODOC&amp;CC=CN&amp;NR=115086071A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220920&amp;DB=EPODOC&amp;CC=CN&amp;NR=115086071A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ZOU SIDA</creatorcontrib><creatorcontrib>ZHENG CHUANYI</creatorcontrib><creatorcontrib>LU YANKE</creatorcontrib><creatorcontrib>ZHAI YONGJI</creatorcontrib><title>Data stealing detection method, system and equipment based on log causal traceability</title><description>The invention discloses a data stealing detection method, system and device based on log causal traceability, mainly relates to the technical field of data stealing detection, and is used for solving the problems that an existing data stealing detection method is lack of causal semantics, low in detection accuracy and the like. Comprising the steps of obtaining a preprocessed log through a terminal unified log platform; abstracting the preprocessing log into an initial dependency graph through a calculation engine; wherein the dependency graph comprises an operation relation; determining a priority score corresponding to each operation relationship based on the overall relationship ratio and the entity node ratio corresponding to the operation relationship; obtaining a final dependency graph; obtaining an implicit behavior sequence corresponding to the final dependency graph; and comparing the implicit behavior sequence with an implicit behavior call chain corresponding to a preset data stealing behavior to d</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjsOwjAQRVE3FAjYw9CDFAvxaVEAUVFBHU3iR7DkH3hSZPe4YAFUt7hnqh4nFqYsYGdDTwaCTmwM5CGvaFaUxzI9cTCE92CTRxBqOcNQUS721PGQ2ZF8uAO31lkZ52ryZJex-HWmlpfzvb6ukWKDnIoMkKa-ab2tDrtqr4-bf8wXymY5Fw</recordid><startdate>20220920</startdate><enddate>20220920</enddate><creator>ZOU SIDA</creator><creator>ZHENG CHUANYI</creator><creator>LU YANKE</creator><creator>ZHAI YONGJI</creator><scope>EVB</scope></search><sort><creationdate>20220920</creationdate><title>Data stealing detection method, system and equipment based on log causal traceability</title><author>ZOU SIDA ; ZHENG CHUANYI ; LU YANKE ; ZHAI YONGJI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN115086071A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2022</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>ZOU SIDA</creatorcontrib><creatorcontrib>ZHENG CHUANYI</creatorcontrib><creatorcontrib>LU YANKE</creatorcontrib><creatorcontrib>ZHAI YONGJI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ZOU SIDA</au><au>ZHENG CHUANYI</au><au>LU YANKE</au><au>ZHAI YONGJI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Data stealing detection method, system and equipment based on log causal traceability</title><date>2022-09-20</date><risdate>2022</risdate><abstract>The invention discloses a data stealing detection method, system and device based on log causal traceability, mainly relates to the technical field of data stealing detection, and is used for solving the problems that an existing data stealing detection method is lack of causal semantics, low in detection accuracy and the like. Comprising the steps of obtaining a preprocessed log through a terminal unified log platform; abstracting the preprocessing log into an initial dependency graph through a calculation engine; wherein the dependency graph comprises an operation relation; determining a priority score corresponding to each operation relationship based on the overall relationship ratio and the entity node ratio corresponding to the operation relationship; obtaining a final dependency graph; obtaining an implicit behavior sequence corresponding to the final dependency graph; and comparing the implicit behavior sequence with an implicit behavior call chain corresponding to a preset data stealing behavior to d</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN115086071A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Data stealing detection method, system and equipment based on log causal traceability
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T16%3A40%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ZOU%20SIDA&rft.date=2022-09-20&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN115086071A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true