[go: up one dir, main page]

CN109409127B - Method and device for generating network data security policy and storage medium - Google Patents

Method and device for generating network data security policy and storage medium Download PDF

Info

Publication number
CN109409127B
CN109409127B CN201811275572.5A CN201811275572A CN109409127B CN 109409127 B CN109409127 B CN 109409127B CN 201811275572 A CN201811275572 A CN 201811275572A CN 109409127 B CN109409127 B CN 109409127B
Authority
CN
China
Prior art keywords
document
documents
security policy
entropy
importance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811275572.5A
Other languages
Chinese (zh)
Other versions
CN109409127A (en
Inventor
宋鹏举
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Original Assignee
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Topsec Technology Co Ltd, Beijing Topsec Network Security Technology Co Ltd, Beijing Topsec Software Co Ltd filed Critical Beijing Topsec Technology Co Ltd
Priority to CN201811275572.5A priority Critical patent/CN109409127B/en
Publication of CN109409127A publication Critical patent/CN109409127A/en
Application granted granted Critical
Publication of CN109409127B publication Critical patent/CN109409127B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a method, a device and a storage medium for generating a network data security policy, wherein the method comprises the following steps: analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles; calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle; according to the obtained word segmentation probability, respectively calculating each document by adopting an information entropy algorithm to obtain an entropy value of each document; determining an importance metric of each document according to the entropy of each document; and generating a security policy according to the importance degree metric of each document. The importance of the documents in the database is measured by calculating the importance measurement value of each document, so that management personnel can clearly display data, a basis is provided for judging the importance of the documents, and the updating of the document security policy is promoted.

Description

Method and device for generating network data security policy and storage medium
Technical Field
The present invention relates to the field of data leakage prevention technologies, and in particular, to a method and an apparatus for generating a network data security policy, and a storage medium.
Background
Data security is more and more concerned by enterprises, the enterprises have a lot of important data to be protected, the value of the data can be reflected only in use, and how to fully use the data on the premise of effectively protecting the data becomes urgent needs of the enterprises. The data leakage prevention system is a data safety product, and data can be fully used under the condition that a data user does not sense the data leakage prevention system. Data anti-leakage system generally needs to be matched with corresponding security policy, and how to make effective security policy is an important problem in the current field.
The existing security policy scheme for preventing data leakage uses predefined security policies, such as setting keywords of important data, regular expressions of sensitive information, even data fingerprints, machine learning methods based on classification, and the like, and these rules need to be pre-built into a system when the data leakage prevention system is deployed and implemented.
However, since the security policy needs to be pre-established, in most cases, the enterprise cannot clearly know all important and sensitive data, and therefore, most pre-established policies are incomplete; even if a relatively sufficient prefabricated security policy is adopted, new data can be generated every day along with the business development of an enterprise, and the security policy cannot completely cover the newly generated data, so that the security policy is not updated timely.
Disclosure of Invention
The embodiment of the invention provides a method and a device for generating a network data security policy and a storage medium, which are used for solving the problem that the security policy in the prior art cannot be updated in time.
In a first aspect, an embodiment of the present invention provides a method for generating a network data security policy, where the method includes:
analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle;
according to the obtained word segmentation probability, respectively calculating each document by adopting an information entropy algorithm to obtain an entropy value of each document;
determining an importance metric of each document according to the entropy of each document;
and generating a security policy according to the importance degree metric of each document.
Optionally, before analyzing the document contents of all the documents, the method further includes: and extracting the content of all the documents in the database to obtain the document content of all the documents.
Optionally, the analyzing the document contents of all the documents to obtain a plurality of word segments specifically includes:
and performing lexical analysis and syntactic analysis on the document contents of all the documents to obtain a plurality of participles.
Optionally, the determining the importance metric of each document according to the entropy of each document specifically includes:
carrying out normalization processing on entropy values of all documents;
and taking the entropy value after the normalization processing as an importance degree metric value of each document.
Optionally, the generating a security policy according to the importance metric of each document specifically includes: comparing the importance metric value with a preset value, and if the importance metric value is larger than the preset value, determining that the document is a sensitive document; and constructing a fingerprint security policy for the sensitive document, or extracting important keywords from the sensitive document to serve as the security policy.
In a second aspect, an embodiment of the present invention provides an apparatus for generating a network data security policy, including:
the analysis module is used for analyzing the document contents of all the documents to obtain a plurality of participles and removing stop words in the participles to obtain total participles;
the first calculation module is used for calculating the probability of each participle in the total participle by utilizing a maximum likelihood estimation algorithm to obtain the probability of each participle;
the second calculation module is used for calculating each document by adopting an information entropy algorithm according to the obtained word segmentation probability to obtain an entropy value of each document;
the determining module is used for determining the importance metric of each document according to the entropy value of each document;
and the generating module is used for generating the security policy according to the importance degree metric of each document.
Optionally, the system further comprises an extraction module, wherein the extraction module is configured to extract content of all documents in the database to obtain document content of all documents before the analysis module analyzes the document content of all documents.
Optionally, the analysis module is specifically configured to perform lexical analysis and syntactic analysis on the document contents of all the documents to obtain a plurality of segmented words.
Optionally, the determining module is specifically configured to:
carrying out normalization processing on entropy values of all documents;
and taking the entropy value after the normalization processing as an importance degree metric value of each document.
Optionally, the generating module is specifically configured to: comparing the importance metric value with a preset value, and if the importance metric value is larger than the preset value, determining that the document is a sensitive document; constructing a fingerprint security policy for the sensitive document; or extracting important keywords from the sensitive documents as security policies.
In a third aspect, an embodiment of the present invention provides a storage medium, where a computer program is stored on the storage medium, and when being executed by a processor, the computer program implements the following method steps:
analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle;
according to the obtained word segmentation probability, respectively calculating each document by adopting an information entropy algorithm to obtain an entropy value of each document;
determining an importance metric of each document according to the entropy of each document;
and generating a security policy according to the importance degree metric of each document.
The importance of the documents in the database is measured by calculating the importance measurement value of each document, so that management personnel can clearly display data, powerful basis is provided for judging the importance of the documents, and the updating of the document security policy is promoted.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flowchart of a method for generating a security policy for network data according to a first embodiment;
FIG. 2 is a flowchart of a method for generating a security policy for network data according to a second embodiment;
fig. 3 is a block diagram of a network data security policy generation apparatus according to a third embodiment.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
A first embodiment of the present invention provides a method for generating a network data security policy, as shown in fig. 1, including the following specific steps:
step S11, analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
in this step, when analyzing the document content, the document may be analyzed specifically by lexical analysis and syntactic analysis, for example, lexical analysis by using HMM (hidden markov model) and syntactic analysis by using dependency tree analysis. The removal of stop words specifically means that the words such as "and" having "are removed.
Step S12, calculating the probability of each participle in the total participle by utilizing a maximum likelihood estimation algorithm to obtain the probability of each participle;
step S13, according to the obtained word segmentation probability, calculating each document by using an information entropy algorithm to obtain an entropy value of each document;
step S14, determining the importance degree metric of each document according to the entropy of each document;
and step S15, generating a security policy according to the importance degree metric of each document.
In this embodiment, before step S11, content extraction is further performed on all documents in the database, so as to obtain document contents of all documents.
The method and the device measure the importance of the documents in the database by calculating the importance metric of each document, clearly display data for management personnel, provide a powerful judgment basis for judging the importance of the documents, and promote the updating of the document security policy.
A second embodiment of the present invention provides a method for generating a network data security policy, as shown in fig. 2, including the following specific steps:
step S21, analyzing the document content of all documents to obtain several participles, and removing stop words in the participles to obtain total participles
Step S22, calculating the probability of each participle in the total participle by utilizing a maximum likelihood estimation algorithm to obtain the probability of each participle; for example, there are 100 documents, and after the 100 documents are subjected to content extraction and lexical analysis, 2000 participles are obtained, where the number of occurrences of the word "information" is 200, and the probability of the word "information" is 200/2000-10%.
Step S23, according to the obtained word segmentation probability, calculating each document by using an information entropy algorithm to obtain an entropy value of each document; in this step, for example, 20 segmented words are obtained from a certain document through content extraction and analysis, and the information entropy of the document is calculated by using the probability of the 20 segmented words (for example, the probability of "information" obtained by calculation in step S22 is 10%).
Step S24, carrying out normalization processing on the entropy values of all documents; the normalization in this step specifically refers to the percentage of the entropy value of each document to the entropy values of all documents.
Step S25, taking the entropy value after normalization as the importance degree measurement value of each document;
step S26, comparing the importance degree metric value with a preset value, and if the importance degree metric value is larger than the preset value, determining that the document is a sensitive document; constructing a fingerprint security policy for the sensitive document; or extracting important keywords from the sensitive documents to serve as security policies.
The embodiment of the invention establishes a unified document importance measurement method by constructing an importance (also called sensitivity) measurement model of the document to obtain the importance measurement value of each document, thereby measuring the importance of the document passing through the network data leakage-proof system, displaying clear data for managers and promoting the updating of security policies.
According to the embodiment of the invention, the corresponding security policy is generated for the document according to the importance of the document, so that the problem that a perfect security policy can be constructed only under the condition of fully knowing the distribution of data when security personnel construct the security policy is solved. Meanwhile, the embodiment of the invention solves the problem that the work of security personnel is heavier as some data can not be used basically and some data can be used frequently and the security personnel can not know which data should be protected in a key way.
In addition, the embodiment of the invention also solves the problem that the data can be misjudged (non-important data is judged as important data) in the practical application process due to the prefabricated security strategy, thereby increasing the difficulty of data leakage prevention work; if the security policy is adjusted, the problem of missed judgment can be caused.
A third embodiment of the present invention provides a device for generating a network data security policy, as shown in fig. 3, including:
the analysis module 1 is used for analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
in a specific implementation process, the analysis module 1 is specifically configured to perform lexical analysis and syntactic analysis on document contents of all documents to obtain a plurality of segmented words.
And the first calculating module 2 is used for calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle.
And the second calculating module 3 is used for calculating each document by adopting an information entropy algorithm according to the obtained word segmentation probability to obtain an entropy value of each document.
The determining module 4 is used for determining the importance metric of each document according to the entropy of each document;
in a specific implementation process, the determining module 4 is specifically configured to: carrying out normalization processing on entropy values of all documents; and taking the entropy value after the normalization processing as an importance degree metric value of each document.
And the generating module 5 is used for generating the security policy according to the importance degree metric of each document.
In an implementation process, the generating module is specifically configured to: comparing the importance metric value with a preset value, and if the importance metric value is larger than the preset value, determining that the document is a sensitive document; constructing a fingerprint security policy for the sensitive document; or extracting important key words from the sensitive documents as security policies
In the embodiment of the present invention, the system specifically further includes an extraction module, where the extraction module is configured to extract contents of all documents in the database before the analysis module analyzes the document contents of all documents, so as to obtain the document contents of all documents.
According to the embodiment of the invention, the importance degree metric value of each document is determined by using the determining module to measure the importance degree of the document in the database, so that a judgment basis is provided for judging the importance degree of the document, and the document security policy is updated in time.
A fourth embodiment of the invention provides a storage medium having a computer program stored thereon, which computer program, when being executed by a processor, carries out the method steps of:
analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle;
thirdly, calculating each document by adopting an information entropy algorithm according to the obtained word segmentation probability to obtain an entropy value of each document;
fourthly, determining the importance metric of each document according to the entropy of each document;
and step five, generating a security policy according to the importance degree metric of each document.
The method and the device measure the importance of the documents in the database by calculating the importance metric value of each document, clearly display data for management personnel, provide a powerful judgment basis for judging the importance of the documents, and promote the updating of the document security policy
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (8)

1. A method for generating a network data security policy, the method comprising:
analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle;
according to the obtained word segmentation probability, respectively calculating each document by adopting an information entropy algorithm to obtain an entropy value of each document;
determining an importance metric of each document according to the entropy of each document;
comparing the importance metric value with a preset value, and if the importance metric value is larger than the preset value, determining that the document is a sensitive document; and constructing a fingerprint security policy for the sensitive document, or extracting important keywords from the sensitive document to serve as the security policy.
2. The method for generating a network data security policy of claim 1, wherein before analyzing the document contents of all documents, the method further comprises: and extracting the content of all the documents in the database to obtain the document content of all the documents.
3. The method for generating a network data security policy according to claim 1, wherein the analyzing the document contents of all documents to obtain a plurality of segments specifically comprises:
and performing lexical analysis and syntactic analysis on the document contents of all the documents to obtain a plurality of participles.
4. The method for generating a network data security policy according to claim 1, wherein the determining the importance metric of each document according to the entropy of each document specifically includes:
carrying out normalization processing on entropy values of all documents;
and taking the entropy value after the normalization processing as an importance degree metric value of each document.
5. An apparatus for generating a network data security policy, comprising:
the analysis module is used for analyzing the document contents of all the documents to obtain a plurality of participles and removing stop words in the participles to obtain total participles;
the first calculation module is used for calculating the probability of each participle in the total participle by utilizing a maximum likelihood estimation algorithm to obtain the probability of each participle;
the second calculation module is used for calculating each document by adopting an information entropy algorithm according to the obtained word segmentation probability to obtain an entropy value of each document;
the determining module is used for determining the importance metric of each document according to the entropy value of each document;
the generating module is used for comparing the importance metric value with a preset value, and if the importance metric value is larger than the preset value, determining that the document is a sensitive document; constructing a fingerprint security policy for the sensitive document; or extracting important keywords from the sensitive documents as security policies.
6. The apparatus for generating a network data security policy according to claim 5, further comprising an extraction module, where the extraction module is configured to extract contents of all documents in the database to obtain document contents of all documents before the analysis module analyzes the document contents of all documents.
7. The apparatus for generating a network data security policy according to claim 5, wherein the determining module is specifically configured to:
carrying out normalization processing on entropy values of all documents;
and taking the entropy value after the normalization processing as an importance degree metric value of each document.
8. A storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the method according to any one of claims 1-4.
CN201811275572.5A 2018-10-30 2018-10-30 Method and device for generating network data security policy and storage medium Active CN109409127B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811275572.5A CN109409127B (en) 2018-10-30 2018-10-30 Method and device for generating network data security policy and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811275572.5A CN109409127B (en) 2018-10-30 2018-10-30 Method and device for generating network data security policy and storage medium

Publications (2)

Publication Number Publication Date
CN109409127A CN109409127A (en) 2019-03-01
CN109409127B true CN109409127B (en) 2022-04-26

Family

ID=65469794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811275572.5A Active CN109409127B (en) 2018-10-30 2018-10-30 Method and device for generating network data security policy and storage medium

Country Status (1)

Country Link
CN (1) CN109409127B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583414B (en) * 2020-12-11 2024-12-03 北京百度网讯科技有限公司 Scene processing method, device, equipment, storage medium and product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102012985A (en) * 2010-11-19 2011-04-13 国网电力科学研究院 Sensitive data dynamic identification method based on data mining
CN105224695A (en) * 2015-11-12 2016-01-06 中南大学 A kind of text feature quantization method based on information entropy and device and file classification method and device
CN105844118A (en) * 2016-04-15 2016-08-10 宝利九章(北京)数据技术有限公司 Methods and system for preventing data leakage
CN105956482A (en) * 2016-04-15 2016-09-21 宝利九章(北京)数据技术有限公司 Method and system for data leakage protection
CN107292193A (en) * 2017-05-25 2017-10-24 北京北信源软件股份有限公司 A kind of method and system for realizing leakage prevention
CN107958068A (en) * 2017-12-05 2018-04-24 华中科技大学 A kind of language model smoothing method based on entity knowledge base

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9336381B1 (en) * 2013-04-08 2016-05-10 Amazon Technologies, Inc. Entropy-based detection of sensitive information in code
CN106897459A (en) * 2016-12-14 2017-06-27 中国电子科技集团公司第三十研究所 A kind of text sensitive information recognition methods based on semi-supervised learning
CN107679138B (en) * 2017-09-22 2021-08-27 陕西师范大学 Spectral feature selection method based on local scale parameters, entropy and cosine similarity

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102012985A (en) * 2010-11-19 2011-04-13 国网电力科学研究院 Sensitive data dynamic identification method based on data mining
CN105224695A (en) * 2015-11-12 2016-01-06 中南大学 A kind of text feature quantization method based on information entropy and device and file classification method and device
CN105844118A (en) * 2016-04-15 2016-08-10 宝利九章(北京)数据技术有限公司 Methods and system for preventing data leakage
CN105956482A (en) * 2016-04-15 2016-09-21 宝利九章(北京)数据技术有限公司 Method and system for data leakage protection
CN107292193A (en) * 2017-05-25 2017-10-24 北京北信源软件股份有限公司 A kind of method and system for realizing leakage prevention
CN107958068A (en) * 2017-12-05 2018-04-24 华中科技大学 A kind of language model smoothing method based on entity knowledge base

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"一种利用近邻和信息熵的主动文本标注方法";朱岩等;《计算机研究与发展》;20120615;第49卷(第6期);第1306-1312页,正文节1.2、表1 *

Also Published As

Publication number Publication date
CN109409127A (en) 2019-03-01

Similar Documents

Publication Publication Date Title
US9398034B2 (en) Matrix factorization for automated malware detection
US20120136812A1 (en) Method and system for machine-learning based optimization and customization of document similarities calculation
CN111767716B (en) Method, device and computer equipment for determining multi-level industry information of an enterprise
JPWO2017065070A1 (en) Suspicious behavior detection system, information processing apparatus, method and program
CN109495479B (en) User abnormal behavior identification method and device
CN111079186B (en) Data analysis method, device, equipment and storage medium
CN110309251B (en) Text data processing method, device and computer-readable storage medium
CN112765003B (en) Risk prediction method based on APP behavior log
CN112131249A (en) Attack intention identification method and device
CN108509561B (en) Post recruitment data screening method and system based on machine learning and storage medium
CN113343699B (en) Log security risk monitoring method and device, electronic equipment and medium
CN111988327B (en) Threat behavior detection and model establishment method and device, electronic equipment and storage medium
CN110598397A (en) Deep learning-based Unix system user malicious operation detection method
CN113688240A (en) Threat element extraction method, device, equipment and storage medium
US20240126918A1 (en) Techniques for data classification and for protecting cloud environments from cybersecurity threats using data classification
CN109409127B (en) Method and device for generating network data security policy and storage medium
CN115730064B (en) Keyword processing method and device, electronic equipment and storage medium
CN119444232B (en) Digital economic risk management evaluation method and system based on cloud computing
CN114003577A (en) User auditing method, system, electronic device and storage medium
CN120030552A (en) Model safety detection method, electronic device, storage medium and program product
CN117408652A (en) An archive data analysis and management method and system
CN110059480A (en) Attack monitoring method, device, computer equipment and storage medium
JP5694989B2 (en) Document classification apparatus and program
CN113127640A (en) Malicious spam comment attack identification method based on natural language processing
CN115221857B (en) Data similarity detection method and device containing numerical value types

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant