Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing data leakage prevention

A data leakage prevention and data technology, applied in the field of information security, can solve the problems of rigid SVM effect, poor, singularity of keywords, etc.

Inactive Publication Date: 2017-10-24
BEIJING VRV SOFTWARE CO LTD
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a method and system for realizing data leakage protection, which can effectively overcome the singleness of the basic detection method keyword (word) comparison in the traditional DLP technology, and the rigidity of the advanced detection method EDM and IDM file comparison The problem of sexuality and the poor performance of SVM in multi-category classification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing data leakage prevention
  • Method and system for realizing data leakage prevention
  • Method and system for realizing data leakage prevention

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0048] Such as figure 1 As shown, the embodiment of the present invention provides a method for implementing data leakage protection, and the method may include the following steps:

[0049] Step 101: Preprocessing the preprocessed text data to form vector data.

[0050] Step 102: Use the vector data as the input data of the K-MEDOIDS clustering algor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for realizing data leakage prevention. The method comprises the steps that preprocessed text data is preprocessed to form vector data; the vector data is used as input data of a K-MEDOIDS clustering algorithm, and unsupervised learning is performed according to preset rules to form a clustering model; an external release file is detected through the clustering model; whether the external release file is a secret leakage file is judged; if yes, the external release file is not allowed to be released externally; and otherwise the external release file is allowed to be released externally. The K-MEDOIDS clustering algorithm is adopted to perform unsupervised learning training on the preprocessed text data, the external release file is detected through the clustering model, and therefore the problems that in traditional DLP technologies, keyword search is hidebound in a basic detection technology, and a file cannot be detected through an EDM and an IDM after file content is modified in an advanced detection technology are solved; and meanwhile, the number of categories of the K-MEDOIDS algorithm does not influence the clustering result, the algorithm is more flexible than an SVM algorithm, and the detection result of the file cannot be influenced even under the condition that a keyword is replaced.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method and system for realizing data leakage protection. Background technique [0002] With the rapid development of information technology, computers and networks have become necessary tools and approaches for daily office work, communication and collaboration. However, while the information system improves work efficiency, it also raises security requirements for information storage, access control, and access control of computer terminals and servers in the information system. According to the data of the National Computer Information Security Evaluation Center, 97% of the units that caused economic losses due to the leakage of important internal confidential data through the network were caused by the intentional or unintentional leakage of internal employees. DLP (Data Leakage Prevention, Data Leakage Prevention) technology is becoming one of the most...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/27G06F17/30
CPCG06F16/35G06F21/6209G06F40/284
Inventor 高学伟陶亚虎熊天舒
Owner BEIJING VRV SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products