[go: up one dir, main page]

CN120105475B - Business data security management system and method based on big data - Google Patents

Business data security management system and method based on big data

Info

Publication number
CN120105475B
CN120105475B CN202510189165.6A CN202510189165A CN120105475B CN 120105475 B CN120105475 B CN 120105475B CN 202510189165 A CN202510189165 A CN 202510189165A CN 120105475 B CN120105475 B CN 120105475B
Authority
CN
China
Prior art keywords
data
factor
business activity
business
activity data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202510189165.6A
Other languages
Chinese (zh)
Other versions
CN120105475A (en
Inventor
金东晖
申豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaojia Business Consulting Co ltd
Original Assignee
Beijing Xiaojia Business Consulting Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaojia Business Consulting Co ltd filed Critical Beijing Xiaojia Business Consulting Co ltd
Priority to CN202510189165.6A priority Critical patent/CN120105475B/en
Publication of CN120105475A publication Critical patent/CN120105475A/en
Application granted granted Critical
Publication of CN120105475B publication Critical patent/CN120105475B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本申请提供一种基于大数据的商务数据安全管理系统及方法。其中,接收来自企业内部系统的商务活动数据流;动态分析所述商务活动数据流中的异常行为模式,并依据预设的安全策略实时评估所述商务活动数据流的风险等级;根据所述风险等级自动调整数据加密强度,并对高风险数据实施细粒度访问控制;基于所述数据加密强度对商务活动数据流进行加密;在检测到预定义的威胁场景时,自动触发预警机制并生成报告,同时依据所述安全策略执行相应的防护措施。本申请提供的技术方案该系统不仅增强了商务数据的安全性,还提高了数据管理的效率和智能化水平,为企业提供了全方位的数据安全保障。

The present application provides a business data security management system and method based on big data. Among them, it receives business activity data streams from the internal system of the enterprise; dynamically analyzes abnormal behavior patterns in the business activity data streams, and evaluates the risk level of the business activity data streams in real time according to preset security policies; automatically adjusts the data encryption strength according to the risk level, and implements fine-grained access control for high-risk data; encrypts the business activity data stream based on the data encryption strength; and automatically triggers an early warning mechanism and generates a report when a predefined threat scenario is detected, while executing corresponding protective measures according to the security policy. The technical solution provided by the present application not only enhances the security of business data, but also improves the efficiency and intelligence level of data management, providing enterprises with all-round data security protection.

Description

Business data security management system and method based on big data
Technical Field
The embodiment of the application relates to the technical field of business data security management of big data, in particular to a business data security management system and method based on big data.
Background
With the penetration of digital transformation, the amount of business activity data generated by the internal systems of enterprises is increasing. These data contain not only a large number of business operations records, but also sensitive information related to finance, customers, suppliers, etc. In order to secure these data, a system is needed that can receive and analyze the business data stream in real time and dynamically adjust the data protection policy according to the risk assessment results.
Currently, data protection measures for most enterprises mainly include static data encryption, fixed Access Control Lists (ACLs), and rule-based Intrusion Detection Systems (IDSs). These systems, while capable of providing some degree of data protection, appear to be frustrating in the face of dynamically changing data environments and complex security threats.
The existing data protection scheme has the defects that static data encryption cannot dynamically adjust encryption intensity according to actual risk levels of data, so that data protection forces for different risk levels are consistent, resource waste or insufficient protection is caused, a fixed access control list is difficult to adapt to continuously changing enterprise internal requirements, particularly when new threats are faced, access rights cannot be flexibly adjusted, a rule-based intrusion detection system depends on a predefined rule base, unknown threat detection capability is limited, and real-time updating cannot be carried out to cope with new attack modes.
Disclosure of Invention
The embodiment of the application provides a business data security management system and method based on big data, which are used for solving the problem that unknown threat detection capability is limited in the prior art.
In a first aspect, an embodiment of the present application provides a business data security management system and method based on big data, including:
receiving a stream of business activity data from an enterprise internal system;
Dynamically analyzing abnormal behavior patterns in the business activity data stream, and evaluating the risk level of the business activity data stream in real time according to a preset security policy;
automatically adjusting the data encryption intensity according to the risk level, and implementing fine-granularity access control on the high-risk data;
Encrypting the business activity data stream based on the data encryption intensity, and dispersedly storing the encrypted business activity data stream in a plurality of data centers with different physical positions through a distributed storage technology;
When a predefined threat scene is detected, an early warning mechanism is automatically triggered and a report is generated, and corresponding protective measures are executed according to the security policy.
Optionally, the dynamically analyzing the abnormal behavior pattern in the business activity data stream and evaluating the risk level of the business activity data stream in real time according to a preset security policy includes:
Dynamically monitoring each activity index in the business activity data stream by using a machine learning model to identify potential abnormal behavior patterns, wherein the machine learning model can adjust a detection threshold according to historical data and current environmental changes;
Based on the abnormal behavior mode, a behavior analysis algorithm is applied, and a behavior score of the abnormal behavior mode is generated by combining a preset behavior feature library;
Processing the behavior scores by using a preset risk assessment framework to obtain risk assessment results, wherein the risk assessment framework ensures the comprehensiveness and accuracy of risk assessment of the business activity data stream;
and evaluating the risk level of the business activity data stream according to the behavior score and the risk evaluation result.
Optionally, the automatically adjusting the encryption strength of the data according to the risk level and performing fine-grained access control on the high-risk data includes:
Distinguishing different types of the business data streams by data classification techniques;
dynamically adjusting the encryption intensity of different types of business data streams according to the risk level by utilizing an adaptive encryption algorithm, wherein the encryption intensity comprises the length of an encryption key, and the adaptive encryption algorithm is used for automatically selecting the proper encryption key length according to the change of the risk level;
And determining the business activity data stream with the risk level larger than the preset risk level as high-risk data, and implementing fine-granularity access control on the high-risk data, wherein the fine-granularity access control at least comprises setting access authority rules.
Optionally, encrypting the business data stream based on the data encryption strength, and dispersedly storing the encrypted business data stream in a plurality of data centers with different physical locations through a distributed storage technology, including:
encrypting the business data stream based on the data encryption strength to generate an encrypted business data stream;
Dividing the encrypted business activity data stream into a plurality of data segments by using a data dividing algorithm;
And determining storage positions of the data segments in the data center through a hash allocation strategy, and respectively storing the data segments to the corresponding storage positions through a distributed storage technology. 5. The method of claim 1, wherein upon detection of a predefined threat scenario, automatically triggering an early warning mechanism and generating a report while performing corresponding safeguards in accordance with the security policy, comprises:
Monitoring all activity indexes in the business activity data stream in real time, and identifying potential threat behaviors in the business activity data stream through an anomaly detection algorithm;
Setting a predefined threat scene rule set, and judging that a predefined threat scene is detected when the potential threat behavior accords with any condition in the threat scene rule set;
Triggering an early warning mechanism when the predefined threat scene is detected, sending an instant alarm notification to a preset contact person or a management system, and recording the occurrence time and specific conditions of the threat scene;
Generating a detailed threat report document, the report document including a concrete form, occurrence time, influence range and possible cause analysis of the threat scene;
according to the preset security policy, corresponding protective measures are automatically selected and executed, wherein the protective measures at least comprise isolating affected data resources, suspending related account authorities and starting a data recovery flow;
And implementing the protective measures through an automatic script or a preconfigured workflow engine, and monitoring the execution state of the protective measures to ensure the effective execution of the protective measures.
Optionally, the adjusting the encryption strength of the business data streams of different types according to the risk level further includes:
defining an encryption intensity factor, and adjusting the encryption intensity of different types of business data streams according to the encryption intensity factor and the risk level;
Wherein the encryption intensity factor E (t) is determined according to the risk level R (t) of the business data stream, the importance factor I (t) of the business data stream, the sensitivity factor S (t) of the business data stream, the historical access frequency F (t) of the business data stream, and the data volume V (t) and time t of the business data stream:
E(t)=f(R(t),I(t),S(t),F(t),V(t),t)
wherein, the encryption strength factor E (t) can be calculated by the following formula:
Wherein x i (t) represents R (t), I (t), S (t), log (F (t) +1), W i (t) is a time-varying weight coefficient and satisfies
The weight coefficient w i (t) is obtained through machine learning model prediction:
wi(t)=LSTM(historicaldataofwi)
Further comprises:
Correcting the encryption intensity factor E (t) based on a preset time attenuation factor A (t), a dynamic adjustment factor DAF (t), a fluctuation factor V f (t) and a historical trend factor H f (t);
The modified encryption strength factor E (t) is calculated by the following formula:
Wherein, the Is the basic calculation part of the original encryption intensity factor, which calculates the basic encryption intensity factor by a weighted summation mode, wherein w i (t) is the weight corresponding to the factor I at the time t, x i (t) is the actual value of the factor I at the time t, x i (t) represents R (t), I (t), S (t) and log (F (t) +1),I.e. risk level, importance factor, sensitivity factor, logarithmic transformation of historical access frequency, square root transformation of data volume, A (t) represents a time decay factor that decreases exponentially with increasing gap from the initial time point t 0, expressed as Wherein alpha is a constant representing a time decay rate, DAF (t) represents a dynamic adjustment factor reflecting the trend of variation of the encryption intensity by calculating the average encryption intensity at the last w time points, expressed asV f (t) represents a fluctuation factor which reflects the fluctuation degree of the encryption strength with time, and is expressed asWherein the method comprises the steps ofIs the average value of the encryption intensity in w time points, H f (t) represents a historical trend factor, which measures the trend change of the encryption intensity along with the time, and the expression isE is a constant, and gamma and theta represent adjustment coefficients for adjusting the degree of influence of the dynamic adjustment factor DAF (t) and the historical trend factor H f (t) on the encryption strength.
Optionally, the splitting the encrypted business data stream into a plurality of data segments by using a data splitting algorithm includes:
Defining a data segmentation factor, and based on the data segmentation factor, segmenting the encrypted business activity data stream into a plurality of data segments by using a data segmentation algorithm;
Wherein the data segmentation factor D (T) is based on the total size T (T) of the business data stream, the importance factor I (T) of the business data stream, the sensitivity factor S (T) of the business data stream, the historical access frequency F (T) of the business data stream, the data volume V (T) of the business data stream and the time T are determined by:
D(t)=g(T(t),I(t),S(t),F(t),V(t),t)
the data segmentation factor D (t) is calculated by the following formula:
Where n (t) represents the number of data segments into which the business data stream is partitioned over time t, x i (t) represents I (t), S (t), log (F (t) +1), W i (t) is a time-varying weight coefficient and satisfies
Further comprises:
Correcting the data division factor D (t) based on a preset redundancy factor R f (t), a data distribution balance factor DBF (t), a load fluctuation factor L f (t) and a load trend factor LH f (t);
the corrected data division factor D (t) is calculated by the following formula:
wherein T (T) represents the total size of the business data stream at time T, n (T) represents the number of data segments into which the business data stream is partitioned at time T; Represents the result of a weighted summation of different attributes (e.g., importance, sensitivity, logarithmic transformation of historical access frequency, square root transformation of data volume), where w i (t) is a time-varying weight coefficient, x i (t) is the corresponding attribute at time t, and R f (t) is a redundancy factor representing the number of additional data segments added at time t to improve data reliability. The calculation mode is that Wherein, the reed (t) is a constant which changes with time and is used for adjusting the redundancy proportion, the DBF (t) is a data distribution balance factor and is used for measuring whether the data distribution between the data centers is balanced or not, and the calculation mode is thatWhere K is the number of data centers, C k (t) is the load of the kth data center at time t,Is the average load of all data centers at time t, L f (t) represents the load fluctuation factor, represents the degree of load fluctuation among the data centers, and is calculated byWherein LH f (t) is a load trend factor for measuring the trend of the load of the data center over time, calculated by C (t) represents a certain reference load value at time t, and is usually a small positive value to avoid zero denominator, and delta and eta are adjustment coefficients for adjusting the influence of DBF (t) and LH f (t), respectively.
In a second aspect, an embodiment of the present application provides a business data security management system based on big data, including:
a receiving module for receiving a stream of business activity data from an internal system of an enterprise;
the analysis module is used for dynamically analyzing the abnormal behavior mode in the business activity data stream and evaluating the risk level of the business activity data stream in real time according to a preset security policy;
the control module is used for automatically adjusting the data encryption intensity according to the risk level and implementing fine-granularity access control on the high-risk data;
the storage module dispersedly stores the encrypted business activity data stream in a plurality of data centers with different physical positions through a distributed storage technology;
and the early warning module automatically triggers an early warning mechanism and generates a report when a predefined threat scene is detected, and executes corresponding protective measures according to the security policy.
In a third aspect, an embodiment of the present application provides a computing device, including a processing component and a storage component, where the storage component stores one or more computer instructions, and the one or more computer instructions are used to be invoked and executed by the processing component to implement a business data security management method based on big data according to the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer storage medium storing a computer program, where the computer program when executed by a computer implements a business data security management method based on big data as described in the first aspect.
In the embodiment of the application, a business activity data stream from an enterprise internal system is received, an abnormal behavior mode in the business activity data stream is dynamically analyzed, the risk level of the business activity data stream is evaluated in real time according to a preset security policy, the data encryption intensity is automatically adjusted according to the risk level, fine-granularity access control is implemented on high-risk data, the business activity data stream is encrypted based on the data encryption intensity, an early warning mechanism is automatically triggered and a report is generated when a predefined threat scene is detected, and corresponding protective measures are executed according to the security policy. The technical scheme provided by the application not only enhances the safety of business data, but also improves the efficiency and the intelligent level of data management, and provides omnibearing data security guarantee for enterprises.
These and other aspects of the application will be more readily apparent from the following description of the embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a business data security management method based on big data according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a business data security management system based on big data according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a computing device according to an embodiment of the present application.
Detailed Description
In order to enable those skilled in the art to better understand the present application, the following description will make clear and complete descriptions of the technical solutions according to the embodiments of the present application with reference to the accompanying drawings.
In some of the flows described in the specification and claims of the present application and in the foregoing figures, a plurality of operations occurring in a particular order are included, but it should be understood that the operations may be performed out of order or performed in parallel, with the order of operations such as 101, 102, etc., being merely used to distinguish between the various operations, the order of the operations themselves not representing any order of execution. In addition, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first" and "second" herein are used to distinguish different messages, devices, modules, etc., and do not represent a sequence, and are not limited to the "first" and the "second" being different types.
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to fall within the scope of the application.
Fig. 1 is a flowchart of a business data security management method based on big data according to an embodiment of the present application, as shown in fig. 1, the method includes:
With the penetration of digital transformation, the amount of business activity data generated by the internal systems of enterprises is increasing. These data contain not only a large number of business operations records, but also sensitive information related to finance, customers, suppliers, etc. In order to secure these data, a system is needed that can receive and analyze the business data stream in real time and dynamically adjust the data protection policy according to the risk assessment results.
Currently, data protection measures for most enterprises mainly include static data encryption, fixed Access Control Lists (ACLs), and rule-based Intrusion Detection Systems (IDSs). These systems, while capable of providing some degree of data protection, appear to be frustrating in the face of dynamically changing data environments and complex security threats.
The existing data protection scheme has the defects that static data encryption cannot dynamically adjust encryption intensity according to actual risk levels of data, so that data protection forces for different risk levels are consistent, resource waste or insufficient protection is caused, a fixed access control list is difficult to adapt to continuously changing enterprise internal requirements, particularly when new threats are faced, access rights cannot be flexibly adjusted, a rule-based intrusion detection system depends on a predefined rule base, unknown threat detection capability is limited, and real-time updating cannot be carried out to cope with new attack modes.
The embodiment of the application provides a business data security management system and method based on big data, which are used for solving the problem that unknown threat detection capability is limited in the prior art.
In a first aspect, an embodiment of the present application provides a business data security management system and method based on big data, including:
101. receiving a stream of business activity data from an enterprise internal system;
This step refers to collecting and receiving data related to business activities from various internal information systems of the enterprise (e.g., ERP systems, CRM systems, financial systems, etc.). Such data may include transaction records, order information, customer profiles, financial statements, and the like, various data closely related to the operation of the enterprise.
The purpose of receiving these data streams is to perform subsequent analysis, processing, and protection thereof, ensuring the security and integrity of the data, while also providing valuable business insight to the enterprise.
Assume that a company is running an ERP system that records all business activities of the company, including but not limited to, purchase orders, sales orders, inventory changes, financial transactions, and the like. To ensure the security and compliance of these data, companies decide to deploy a large data-based business data security management system, in which the ERP system transmits the business data stream to the data security management system through an API interface or other data transmission protocol (such as FTP, SFTP, etc.), the data format possibly involved includes but is not limited to CSV file, XML file, JSON object or other structured data format, the data security management system includes a special data acquisition module responsible for monitoring the data transmission request of the ERP system or other internal system, the data acquisition module immediately starts to receive and buffer the incoming data stream upon receiving the data transmission request, the received data stream may undergo preliminary cleaning and format conversion to ensure that the data can meet the requirements of the subsequent processing module, the data preprocessing may include removing duplicate records, supplementing missing fields, format unification, etc., the preprocessed data may be temporarily stored in a buffer or temporary database waiting for further analysis and processing, and the data security management system may set a timing task to periodically import the data of the buffer into a long-term storage solution.
102. Dynamically analyzing abnormal behavior patterns in the business activity data stream, and evaluating the risk level of the business activity data stream in real time according to a preset security policy;
This step aims at identifying the abnormal behavior patterns that may exist in the business data streams by monitoring the data streams in real time, and evaluating the risk levels of the data streams according to preset security policies. Through dynamic analysis, the system can discover potential security threats in time and take corresponding protective measures according to the risk level.
Assume that a retail company records all customers' purchasing behavior in its ERP system. In order to ensure data security, the company deploys a business data security management system based on big data to monitor the business data streams, wherein the system receives the business data streams from an ERP system in real time, the data comprise purchase records, login behaviors, refund requests and the like of clients, a monitoring module analyzes the data in real time to identify any behaviors which do not accord with normal modes, the system dynamically monitors all activity indexes in the data streams by using a pre-trained machine learning model (such as an anomaly detection algorithm, a deep learning model and the like), for example, if the purchase amount of a certain client suddenly increases in a certain time period or a certain IP address frequently tries to log in and fails, the system marks the behaviors as potential abnormal modes, the system generates a behavior score by combining a preset behavior feature library and historical data according to the identified abnormal behavior mode, the behavior score is input into a preset risk assessment framework, the framework comprehensively considers various factors (such as the behavior score, the historical behavior mode, the current environment change and the like) to evaluate the overall risk level of the data streams, the system adjusts the risk level in real time according to the pre-trained machine learning model, and feeds the information back to the subsequent information, for example, and the system adopts an immediate access to the high-risk limit of the data or the encrypted data is subjected to the immediate access to the high-sensitivity performance limit.
The application considers that in the existing business data security management system, although basic data flow monitoring and abnormal behavior identification can be realized, the dynamic adaptability and the accuracy have certain limitations. The method is particularly characterized in that the traditional monitoring system often depends on a fixed threshold value to judge abnormal behaviors, the static threshold value is easy to generate false alarm or missing alarm when facing to a dynamic change business environment, risks are estimated by only relying on a single dimension (such as purchase amount), comprehensive influences of various factors (such as purchase frequency, login behaviors and the like) are ignored, so that risk estimation is not comprehensive enough, and the system cannot adjust own detection strategies according to historical data and changes of the current environment, so that adaptability under long-term operation is poor. In order to solve the technical problems, the embodiment of the application provides an alternative scheme, and more intelligent and comprehensive risk assessment is realized by introducing a machine learning model and a multi-level behavior analysis algorithm.
The alternative scheme is as follows:
Optionally, the "dynamically analyzing abnormal behavior patterns in the business data stream and evaluating the risk level of the business data stream in real time according to a preset security policy" in step 102 includes:
the method comprises the steps of dynamically monitoring all activity indexes in a business activity data stream by using a machine learning model to identify potential abnormal behavior modes, wherein the machine learning model can adjust a detection threshold according to historical data and current environmental changes, generating behavior scores of the abnormal behavior modes by combining a preset behavior feature library based on the abnormal behavior modes, processing the behavior scores by using a preset risk assessment framework to obtain risk assessment results, and assessing the risk level of the business activity data stream according to the behavior scores and the risk assessment results, wherein the risk assessment framework ensures the comprehensiveness and the accuracy of risk assessment of the business activity data stream.
Assume that a retail establishment deploys the improved business data security management system described above. The system monitors that the purchasing behavior of a client is abnormal in one day, monitors that the client makes multiple large purchases in one hour, the purchasing behaviors are increased by three times compared with the average purchasing amount in the past month of the client, the machine learning model adjusts a detection threshold according to historical data and the current environment, marks the behavior as a potential abnormal mode, the system applies a behavior analysis algorithm and combines a preset behavior feature library to generate a behavior score of 85/100 (fully divided into 100), the risk assessment framework comprehensively considers factors such as the behavior score (85), the historical behavior mode (the purchasing behavior of the client in the past month), the current environment change (the purchasing behavior in the short time) and the like, finally obtains a risk assessment result as a high risk, and evaluates the purchasing behavior of the client into a high risk grade according to the risk assessment result, immediately strengthens the encryption strength of related data, and performs fine grain access control on sensitive data related to the client.
Through the alternative scheme, the system not only can identify potential security threats more accurately, but also can adjust the detection strategy in time according to the dynamically-changed business environment, thereby effectively improving the accuracy and comprehensiveness of risk assessment. In addition, the system can automatically take corresponding encryption and access control measures according to the risk level, so that the safety of business data is further ensured.
103. Automatically adjusting the data encryption intensity according to the risk level, and implementing fine-granularity access control on the high-risk data;
The core of this step is to dynamically adjust the strength of data encryption according to the previously assessed risk level and to implement more stringent access control measures for high risk data. In this way, the system can assign different protection levels according to the importance and sensitivity of the data, ensuring better protection of high risk data.
Suppose a financial institution needs to protect the transaction records and other sensitive information of its customers. The institution deploys a large data-based business data security management system which can dynamically adjust the data encryption intensity according to the risk level and implement fine-grained access control on high-risk data, wherein the system firstly classifies received business data streams to distinguish different types of data (such as transaction records, personal identity information, financial statements and the like), then determines which data belong to the high-risk data according to the risk level evaluated in the previous step, and for the data marked as high-risk, the system encrypts the data by using a higher-level encryption algorithm (such as AES-256 instead of AES-128) and a longer key length. The adaptive encryption algorithm automatically selects the proper encryption key length according to the change of the risk level to ensure the balance between the security and the performance of the data, and for high-risk data, the system implements fine-grained access control, which means that even users which pass the authentication can access the data through further authority authentication, for example, certain sensitive data can only be allowed to be checked by advanced management personnel of a specific department or can be accessed through multiple authentications (such as double factor authentication).
In the existing business data security management system, although basic encryption and access control can be provided according to different data types, some problems still exist in practical application:
The application considers that the traditional system generally uses fixed encryption intensity, and uses the same encryption algorithm and key length no matter the risk level of the data, so that the encryption intensity is insufficient or the performance cost is overlarge, the traditional system can only carry out access control on the whole data, but cannot carry out finer access authority management on specific data items, which can lead to the access of sensitive data by unauthorized users, and when the risk level of the data changes, the manual adjustment of the encryption intensity and access control rule is time-consuming and easy to make mistakes. In order to solve the technical problems, the embodiment of the application provides an alternative scheme, and more flexible and accurate data protection is realized by introducing a data classification technology, an adaptive encryption algorithm and fine granularity access control.
The alternative scheme is as follows:
Optionally, the "automatically adjusting data encryption strength according to the risk level and implementing fine-grained access control on high risk data" in step 103 includes:
The method comprises the steps of classifying business data streams according to a risk level, distinguishing different types of the business data streams through a data classification technology, dynamically adjusting encryption intensity of the business data streams of different types according to the risk level by utilizing an adaptive encryption algorithm, wherein the encryption intensity comprises the length of an encryption key, the adaptive encryption algorithm is used for automatically selecting a proper encryption key length according to the change of the risk level, determining the business data streams with the risk level larger than a preset value as high risk data, and implementing fine-grained access control on the high risk data, wherein the fine-grained access control at least comprises a set access authority rule.
Suppose a financial institution needs to protect the transaction records and other sensitive information of its customers. The mechanism deploys a business data security management system based on big data, and the specific implementation steps are as follows:
the system classifies the received business data stream to distinguish different types of data such as transaction records, personal identity information, financial statement and the like, wherein the transaction records may comprise purchase history of clients, the personal identity information may comprise names, identity card numbers and the like, the financial statement may comprise financial status and the like, the system determines encryption intensity of different data types according to the risk level estimated before, the system uses AES-256 encryption algorithm for high risk data (such as transaction records and personal identity information) and automatically selects longer key length (such as 256 bits) according to the risk level, the system uses AES-128 encryption algorithm for low risk data (such as financial statement) and selects shorter key length (such as 128 bits), the system implements fine-grained access control on the high risk data, the system also sets access authority rules for the transaction records, and only financial department personnel after strict authentication can check and need to record and audit for each access.
Through the alternative scheme, the system not only can dynamically adjust the encryption strength according to the risk level of the data, but also can implement stricter fine-grained access control on the high-risk data. Therefore, the data security is improved, and the performance and efficiency of the system are ensured, so that the problems of static encryption strength and coarse-granularity access control in the prior art are effectively solved.
In the existing business data security management system, although the encryption strength can be adjusted according to the risk level of different data, some problems still exist in practical application:
Conventional encryption strength adjustment methods are generally static and cannot adjust the encryption strength in real time according to dynamic changes of data streams, existing methods may adjust the encryption strength based on only a single factor (such as risk level), neglect other important factors (such as importance, sensitivity, historical access frequency, etc.), and existing systems lack a mechanism capable of adaptively adjusting the encryption strength according to historical data and current environmental changes. In order to solve the technical problems, the embodiment of the invention provides an alternative scheme, and more intelligent and comprehensive data encryption intensity adjustment is realized by introducing an encryption intensity factor and a correction mechanism thereof.
The alternative scheme is as follows:
optionally, the adjusting the encryption strength of the business data streams of different types according to the risk level further includes:
defining encryption intensity factors, and adjusting the encryption intensity of different types of business data streams according to the risk level R (t) of the business data streams based on the encryption intensity factors, wherein the encryption intensity factors E (t) are determined according to the importance factor I (t) of the business data streams, the sensitivity factor S (t) of the business data streams, the historical access frequency F (t) of the business data streams and the data volume V (t) and the time t of the business data streams:
E(t)=f(R(t),I(t),S(t),F(t),V(t),t)
wherein, the encryption strength factor E (t) can be calculated by the following formula:
Wherein x i (t) represents R (t), I (t), S (t), log (F (t) +1), W i (t) is a time-varying weight coefficient and satisfies
The weight coefficient w i (t) is obtained through machine learning model prediction:
wi(t)=LSTM(historicaldataofwi)
Further comprises:
Correcting the encryption intensity factor E (t) based on a preset time attenuation factor A (t), a dynamic adjustment factor DAF (t), a fluctuation factor V f (t) and a historical trend factor H f (t);
The modified encryption strength factor E (t) is calculated by the following formula:
Wherein, the Is the basic calculation part of the original encryption intensity factor, which calculates the basic encryption intensity factor by a weighted summation mode, wherein w i (t) is the weight corresponding to the factor I at the time t, x i (t) is the actual value of the factor I at the time t, x i (t) represents R (t), I (t), S (t) and log (F (t) +1),I.e. risk level, importance factor, sensitivity factor, logarithmic transformation of historical access frequency, square root transformation of data volume, A (t) represents a time decay factor that decreases exponentially with increasing gap from the initial time point t 0, expressed as Wherein alpha is a constant representing a time decay rate, DAF (t) represents a dynamic adjustment factor reflecting the trend of variation of the encryption intensity by calculating the average encryption intensity at the last w time points, expressed asV f (t) represents a fluctuation factor which reflects the fluctuation degree of the encryption strength with time, and is expressed asWherein the method comprises the steps ofIs the average value of the encryption intensity in w time points, H f (t) represents a historical trend factor, which measures the trend change of the encryption intensity along with the time, and the expression isE is a constant, and gamma and theta represent adjustment coefficients for adjusting the degree of influence of the dynamic adjustment factor DAF (t) and the historical trend factor H f (t) on the encryption strength.
Suppose a financial institution needs to protect the transaction records and other sensitive information of its customers. The mechanism deploys a business data security management system based on big data, and the specific implementation steps are as follows:
Assuming that the risk level R (t) =0.8, the importance factor I (t) =0.7, the sensitivity factor S (t) =0.9, the history access frequency F (t) =5, the data volume V (t) =1000 of a certain business data stream at time t, the calculation x i (t) results in:
assuming that the weight coefficient w i (t) is [0.2,0.1,0.3,0.15,0.25], then it is calculated that:
Assuming that the time attenuation factor a (t) =e -0.1(10-0)=e-1 ≡0.37, and assuming that DAF (t) =10, v f(t)=5,Hf (t) =15, γ=0.5, θ=0.5, the modified encryption intensity factor E (t) is:
Based on the modified encryption strength factor E (t) ≡5.72, the system can select the corresponding encryption algorithm and key length. For example, if E (t) >5, the AES256 encryption algorithm is used, otherwise the AES-128 encryption algorithm is used, and assuming E (t) >5, the AES-256 encryption algorithm is used and the specific key length is determined from E (t).
By adopting the alternative scheme, the system not only can adjust the encryption strength in real time according to the dynamic change of the data stream, but also can comprehensively consider a plurality of factors (such as risk level, importance, sensitivity, historical access frequency and the like), thereby protecting the data security more intelligently and comprehensively. In addition, by introducing a time attenuation factor, a dynamic adjustment factor, a fluctuation factor and a historical trend factor, the system can better adapt to the change of the data stream and ensure the rationality of encryption intensity.
104. Encrypting the business activity data stream based on the data encryption intensity, and dispersedly storing the encrypted business activity data stream in a plurality of data centers with different physical positions through a distributed storage technology;
The method mainly comprises the steps of encrypting commercial activity data streams according to the data encryption intensity determined in the previous step, ensuring that the data are not illegally accessed or tampered in the transmission and storage processes, and adopting a distributed storage technology to store the encrypted data in a plurality of different data centers in a scattered manner, so that the availability and the safety of the data are improved, and the risk of single-point faults is reduced.
It is assumed that a nationwide company needs to ensure the security and high availability of its business data. The company deploys a business data security management system based on big data and adopts a distributed storage technology to protect the data. The method comprises the following specific implementation steps of determining encryption intensity required by different data streams according to the risk level estimated before, encrypting the business data streams by using a proper encryption algorithm (such as AES) and a key length, dividing the encrypted business data streams into a plurality of data segments, determining storage positions of each data segment through a hash allocation strategy and storing the data segments in different data centers in a scattered manner, improving the storage efficiency of data, ensuring that even if one data center fails, recovering the data from other data centers, managing and storing the encrypted data segments by using a distributed storage technology, and ensuring redundancy and high availability of the data on a physical level by storing the data in the plurality of data centers in a scattered manner.
The application considers that the prior business data security management system can realize the basic functions of data encryption and distributed storage, but has some problems in practical application, the prior system generally uses a fixed encryption algorithm and key length, can not dynamically adjust the encryption strength according to the risk level of data, so that the data protection is not flexible enough, the data is generally stored in one or a few data centers in a centralized way, once the centers fail, the data is possibly lost or unavailable, the prior threat detection and response mechanism is usually passive, no real-time monitoring and automatic protection measures are realized, the threat response speed is slow and the effect is poor, and in order to solve the technical problems, the embodiment of the application provides an alternative scheme which realizes more intelligent and comprehensive data protection by introducing a data segmentation algorithm, a hash allocation strategy and real-time monitoring and automatic protection measures.
The alternative scheme is as follows:
optionally, the "encrypt the business data stream based on the data encryption strength and store the encrypted business data stream in a plurality of data centers with different physical locations in a distributed storage technology" in step 104 includes:
Encrypting the business activity data stream based on the data encryption intensity to generate an encrypted business activity data stream, segmenting the encrypted business activity data stream into a plurality of data segments by using a data segmentation algorithm, determining storage positions of the data segments in a data center by using a hash allocation strategy, and respectively storing the data segments to corresponding storage positions by using a distributed storage technology. 5. The method of claim 1, wherein upon detection of a predefined threat scenario, automatically triggering an early warning mechanism and generating a report while performing corresponding safeguards in accordance with the security policy, comprises:
the method comprises the steps of monitoring all activity indexes in a business activity data stream in real time, identifying potential threat behaviors in the business activity data stream through an anomaly detection algorithm, setting a predefined threat scene rule set, judging that a predefined threat scene is detected when the potential threat behaviors meet any condition in the threat scene rule set, triggering an early warning mechanism when the predefined threat scene is detected, sending an instant alarm notification to a preset contact person or a management system, recording the occurrence time and specific conditions of the threat scene, generating a detailed threat report document, wherein the report document comprises the specific expression form, the occurrence time, the influence range and possible cause analysis of the threat scene, automatically selecting and executing corresponding protection measures according to the preset security policy, wherein the protection measures at least comprise isolating affected data resources, suspending related account authorities and starting a data recovery flow, and executing the protection measures and monitoring the execution state through an automatic script or a preset workflow engine to ensure the effective execution of the protection measures.
It is assumed that a nationwide company needs to ensure the security and high availability of its business data. The company deploys a business data security management system based on big data, and the specific implementation steps are as follows:
The system determines the data encryption intensity according to the risk level, and supposes that the risk level of a certain business activity data stream is higher, the system selects an AES-256 encryption algorithm and encrypts by using the 256-bit key length; the method comprises the steps of dividing an encrypted business activity data stream into a plurality of data segments, determining a storage position of each data segment through a hash allocation strategy, supposing that three data centers (A, B, C) are arranged in total, calculating through a hash function, distributing the data segments 1 to the data center A, distributing the data segments 2 to the data center B and the data segments 3 to the data center C, managing and storing the data segments through a Hadoop HDFS distributed storage technology to ensure high availability and redundancy of data, monitoring all activity indexes in the business activity data stream in real time by a system, identifying potential threat behaviors through an anomaly detection algorithm, supposing that a certain account is tried to be logged in more than 5 times in one hour, marking the account as the potential threat by the system, setting a predefined set of rule of scene rules for the threat, judging that the predefined threat scenes are detected when the potential threat behaviors meet any conditions, triggering a warning mechanism to send warning reports to a preset contact person or a management system when the predefined threat scenes are detected, automatically recording the specific threat scenes, automatically playing a detailed report, and automatically recording the specific threat scene, and automatically playing a detailed report, and analyzing the specific threat scene, and the specific security and the specific threat scene can be influenced by the specific security, and the specific security and the security system can be analyzed and the specific security conditions are generated, and the specific security conditions are selected and the specific security conditions are influenced In the case, the system pauses the login authority of the account and starts the data recovery flow. Through an automated script or a preconfigured workflow engine, the system implements the safeguard measures and monitors the execution state of the safeguard measures to ensure that the safeguard measures are effectively executed.
Through the above-mentioned alternative scheme, the system not only can dynamically adjust the encryption intensity according to the risk level of the data and improve the flexibility of data protection, but also can realize the high availability and redundancy of the data through the data segmentation and hash allocation strategy, so as to ensure that the data can still be recovered from other data centers even if a certain data center fails. In addition, the system can also monitor all activity indexes in the business activity data stream in real time, identify potential threat behaviors through an anomaly detection algorithm, automatically trigger an early warning mechanism and execute corresponding protective measures, and improve the threat response speed and effect while ensuring the data safety.
The application considers that the existing business data security management system can realize the basic functions of data encryption and distributed storage, but has some problems in practical application that the existing system generally uses a fixed segmentation strategy to divide data segments and can not flexibly segment according to the dynamic characteristics (such as total size, importance, sensitivity and the like) of data streams, the distribution of the data segments among different data centers is often unbalanced, so that the load of some data centers is overhigh and the load of other data centers is overlow, and the existing system lacks the consideration of data redundancy and can not quickly recover data when a single data center fails.
In order to solve the technical problems, the embodiment of the invention provides an alternative scheme, and by introducing the data segmentation factors and the correction mechanism thereof, the more intelligent and dynamic data segmentation and storage strategies are realized.
The alternative scheme is as follows:
optionally, the splitting the encrypted business data stream into a plurality of data segments by using a data splitting algorithm includes:
Defining a data segmentation factor, and based on the data segmentation factor, segmenting the encrypted business activity data stream into a plurality of data segments by using a data segmentation algorithm;
Wherein the data segmentation factor D (T) is based on the total size T (T) of the business data stream, the importance factor I (T) of the business data stream, the sensitivity factor S (T) of the business data stream, the historical access frequency F (T) of the business data stream, the data volume V (T) of the business data stream and the time T are determined by:
D(t)=g(T(t),I(t),S(t),F(t),V(t),t)
the data segmentation factor D (t) is calculated by the following formula:
Where n (t) represents the number of data segments into which the business data stream is partitioned over time t, x i (t) represents I (t), S (t), log (F (t) +1), W i (t) is a time-varying weight coefficient and satisfies
Further comprises:
Correcting the data division factor D (t) based on a preset redundancy factor R f (t), a data distribution balance factor DBF (t), a load fluctuation factor L f (t) and a load trend factor LH f (t);
the corrected data division factor D (t) is calculated by the following formula:
wherein T (T) represents the total size of the business data stream at time T, n (T) represents the number of data segments into which the business data stream is partitioned at time T; Represents the result of a weighted summation of different attributes (e.g., importance, sensitivity, logarithmic transformation of historical access frequency, square root transformation of data volume), where w i (t) is a time-varying weight coefficient, x i (t) is the corresponding attribute at time t, and R f (t) is a redundancy factor representing the number of additional data segments added at time t to improve data reliability. The calculation mode is that Wherein, the reed (t) is a constant which changes with time and is used for adjusting the redundancy proportion, the DBF (t) is a data distribution balance factor and is used for measuring whether the data distribution between the data centers is balanced or not, and the calculation mode is thatWhere K is the number of data centers, C k (t) is the load of the kth data center at time t,Is the average load of all data centers at time t, L f (t) represents the load fluctuation factor, represents the degree of load fluctuation among the data centers, and is calculated byWherein LH f (t) is a load trend factor for measuring the trend of the load of the data center over time, calculated by C (t) represents a certain reference load value at time t, and is usually a small positive value to avoid zero denominator, and delta and eta are adjustment coefficients for adjusting the influence of DBF (t) and LH f (t), respectively.
It is assumed that a nationwide company needs to ensure the security and high availability of its business data. The company deploys a business data security management system based on big data, and the specific implementation steps are as follows:
let T (T) =1000 MB, importance factor I (T) =0.8, sensitivity factor S (T) =0.9, history access frequency F (T) =5, data volume V (T) =1000, and data segment number n (T) =10 for a certain business data stream at time T. Assuming that the weight coefficient w i (t) is [0.2,0.1,0.3,0.15,0.25], then it is calculated that:
the data segmentation factor D (t) is:
The corrected data division factor D (t) is assumed that the redundancy factor R f (t) =5, the data distribution balance factor DBF (t) =0.8, the load fluctuation factor L f (t) =0.5, the load trend factor LH f (t) =0.3, the adjustment coefficient δ=0.5, and η=0.5, and the corrected data division factor D (t) is:
According to the corrected data division factor D (t) ≡ 165.14, the system divides the data stream into a plurality of data segments and determines the storage position through a hash allocation strategy, and the data segments are stored in different data centers in a scattered manner, so that even if one data center fails, the data can still be recovered from other data centers.
Through the above-mentioned alternative scheme, the system not only can dynamically adjust the data segmentation strategy according to the dynamic characteristics (such as total size, importance, sensitivity and the like) of the data stream, but also can ensure the balanced distribution and high availability of the data among a plurality of data centers through the redundancy factor, the data distribution balance factor, the load fluctuation factor and the load trend factor. In addition, by introducing the factors, the system can better adapt to the change of the data flow, ensure the rationality of data segmentation and the high efficiency of storage, thereby effectively solving the problems of static segmentation, unbalanced storage and the like in the prior art.
105. When a predefined threat scene is detected, an early warning mechanism is automatically triggered and a report is generated, and corresponding protective measures are executed according to the security policy.
The key of this step is that when a predefined threat scenario is detected, the system can automatically take a series of measures, including triggering an early warning mechanism, generating a detailed threat report, and executing corresponding safeguards according to a preset security policy. This process is intended to ensure that the relevant personnel are informed in time when the threat occurs and that effective action is taken to mitigate or eliminate the risk of the threat.
Assume that an online paymate needs to protect transaction data and account information for its users. The platform is provided with a business data safety management system based on big data, the system can automatically trigger an early warning mechanism and execute protective measures when a predefined threat scene is detected, the system monitors all activity indexes in a business activity data stream in real time and identifies potential threat actions through an anomaly detection algorithm, for example, if the system detects that a certain account has a large number of abnormal login attempts or a transaction amount is abnormally huge in a short time, the system sets a predefined threat scene rule set, wherein the predefined threat scene rule set comprises a plurality of known threat modes such as continuous login failure attempts, abnormal large-amount transactions, abnormal time period operation and the like. When the detected potential threat behavior accords with any condition in a threat scene rule set, the system determines that a predefined threat scene is detected, when the predefined threat scene is detected, the system automatically triggers an early warning mechanism, sends an instant alarm notification to a preset contact person or a management system and records the occurrence time and specific conditions of the threat scene, for example, the system can send an email or a short message alarm to a security team and generate a warning message on a control console, the system automatically generates a detailed threat report document, the report comprises the specific expression form, the occurrence time, the influence range and possible reason analysis of the threat scene, the report also comprises suggested processing measures and a next walking plan so that the security team can respond quickly, the system automatically selects and executes corresponding protective measures according to a preset security policy, the protective measures can comprise isolating affected data resources, suspending related rights, starting a data recovery process and the like, and the system ensures that the protective measures are effectively executed and continuously monitors the execution state of the protective measures through an automatic script or a preset workflow engine.
Fig. 2 is a schematic structural diagram of a business data security management system based on big data according to an embodiment of the present application, and as shown in fig. 2, the device includes:
a receiving module 21 for receiving a stream of business activity data from an internal system of an enterprise;
The analysis module 22 is configured to dynamically analyze abnormal behavior patterns in the business activity data stream, and evaluate risk levels of the business activity data stream in real time according to a preset security policy;
a control module 23, configured to automatically adjust data encryption intensity according to the risk level, and implement fine-grained access control on high-risk data;
the storage module 24 dispersedly stores the encrypted business activity data stream in a plurality of data centers with different physical positions through a distributed storage technology;
the early warning module 25 automatically triggers an early warning mechanism and generates a report when a predefined threat scene is detected, and executes corresponding protective measures according to the security policy.
The business data security management system based on big data shown in fig. 2 may implement a business data security management method based on big data shown in the embodiment shown in fig. 1, and its implementation principle and technical effects are not repeated. The specific manner in which the various modules and units perform operations in the big data based business data security management system in the above embodiments has been described in detail in the embodiments related to the method, and will not be described in detail herein.
In one possible design, a big data based business data security management apparatus of the embodiment of FIG. 2 may be implemented as a computing device, as shown in FIG. 3, which may include a storage component 31 and a processing component 32;
The storage component 31 stores one or more computer instructions for execution by the processing component 32.
The processing component 32 is configured to receive a business data stream from an internal system of an enterprise, dynamically analyze an abnormal behavior pattern in the business data stream, and evaluate a risk level of the business data stream in real time according to a preset security policy, automatically adjust a data encryption strength according to the risk level, and implement fine-grained access control on high-risk data, encrypt the business data stream based on the data encryption strength, automatically trigger an early warning mechanism and generate a report when a predefined threat scenario is detected, and simultaneously execute corresponding safeguards according to the security policy.
Wherein the processing component 32 may include one or more processors to execute computer instructions to perform all or part of the steps of the methods described above. Of course, the processing component may also be implemented as one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic elements for executing the methods described above.
The storage component 31 is configured to store various types of data to support operations at the terminal. The memory component may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
Of course, the computing device may necessarily include other components as well, such as input/output interfaces, display components, communication components, and the like.
The input/output interface provides an interface between the processing component and a peripheral interface module, which may be an output device, an input device, etc.
The communication component is configured to facilitate wired or wireless communication between the computing device and other devices, and the like.
The computing device may be a physical device or an elastic computing host provided by the cloud computing platform, and at this time, the computing device may be a cloud server, and the processing component, the storage component, and the like may be a base server resource rented or purchased from the cloud computing platform.
The embodiment of the application also provides a computer storage medium which stores a computer program, and the computer program can realize the business data security management method based on big data in the embodiment shown in the figure 1 when being executed by a computer.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on this understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the respective embodiments or some parts of the embodiments.
It should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present application, and not for limiting the same, and although the present application has been described in detail with reference to the above-mentioned embodiments, it should be understood by those skilled in the art that the technical solution described in the above-mentioned embodiments may be modified or some technical features may be equivalently replaced, and these modifications or substitutions do not make the essence of the corresponding technical solution deviate from the spirit and scope of the technical solution of the embodiments of the present application.

Claims (9)

1.一种基于大数据的商务数据安全管理方法,其特征在于,包括:1. A business data security management method based on big data, characterized by comprising: 接收来自企业内部系统的商务活动数据流;Receive business activity data streams from internal enterprise systems; 动态分析所述商务活动数据流中的异常行为模式,并依据预设的安全策略实时评估所述商务活动数据流的风险等级;Dynamically analyze abnormal behavior patterns in the business activity data flow and evaluate the risk level of the business activity data flow in real time based on preset security policies; 根据所述风险等级自动调整数据加密强度,并对高风险数据实施细粒度访问控制;Automatically adjust data encryption strength based on the risk level and implement fine-grained access control for high-risk data; 基于所述数据加密强度对商务活动数据流进行加密,并通过分布式存储技术将加密后的商务活动数据流分散保存于多个物理位置不同的数据中心;Encrypting the business activity data stream based on the data encryption strength, and distributing and storing the encrypted business activity data stream in multiple data centers at different physical locations through distributed storage technology; 在检测到预定义的威胁场景时,自动触发预警机制并生成报告,同时依据所述安全策略执行相应的防护措施;When a predefined threat scenario is detected, the early warning mechanism is automatically triggered and a report is generated, and corresponding protective measures are implemented according to the security policy; 所述根据所述风险等级自动调整数据加密强度,并对高风险数据实施细粒度访问控制,包括:Automatically adjusting data encryption strength according to the risk level and implementing fine-grained access control for high-risk data include: 通过数据分类技术区分所述商务活动数据流的不同类型;Distinguishing different types of business activity data flows through data classification technology; 利用自适应加密算法动态,根据所述风险等级调整不同类型的所述商务活动数据流的加密强度,所述加密强度包括加密密钥的长度,所述自适应加密算法用以根据所述风险等级的变化自动选择合适的加密密钥长度;Dynamically adjusting the encryption strength of different types of business activity data streams based on the risk level using an adaptive encryption algorithm, wherein the encryption strength includes the length of the encryption key, and the adaptive encryption algorithm is configured to automatically select an appropriate encryption key length based on changes in the risk level; 将大于预设风险等级的商务活动数据流确定为高风险数据,并对高风险数据实施细粒度访问控制,所述细粒度访问控制至少包括设定访问权限规则;Determine business activity data flows with risk levels greater than a preset level as high-risk data, and implement fine-grained access control on the high-risk data, wherein the fine-grained access control includes at least setting access permission rules; 所述根据所述风险等级调整不同类型的所述商务活动数据流的加密强度,包括:The step of adjusting the encryption strength of different types of business activity data streams according to the risk level includes: 定义加密强度因子,基于所述加密强度因子,结合所述风险等级调整不同类型的所述商务活动数据流的加密强度;defining an encryption strength factor, and adjusting the encryption strength of different types of business activity data flows based on the encryption strength factor and in combination with the risk level; 其中,所述加密强度因子根据所述商务活动数据流的风险等级,所述商务活动数据流的重要性因子,所述商务活动数据流的敏感性因子,所述商务活动数据流的历史访问频率,所述商务活动数据流的数据量以及时间所确定:Wherein, the encryption strength factor According to the risk level of the business activity data flow , the importance factor of the business activity data flow , the sensitivity factor of the business activity data flow , the historical access frequency of the business activity data stream , the data volume of the business activity data flow and time Determined: 其中,加密强度因子可由下式计算得出:Among them, the encryption strength factor It can be calculated by the following formula: 其中,代表是随时间变化的权重系数,且满足,in, represent is a weight coefficient that changes with time and satisfies , ; 权重系数通过机器学习模型预测得到:Weight coefficient Predictions from machine learning models: . 2.根据权利要求1所述的方法,其特征在于,所述动态分析所述商务活动数据流中的异常行为模式,并依据预设的安全策略实时评估所述商务活动数据流的风险等级,包括:2. The method according to claim 1, wherein the step of dynamically analyzing abnormal behavior patterns in the business activity data stream and evaluating the risk level of the business activity data stream in real time according to a preset security policy comprises: 利用机器学习模型动态监测所述商务活动数据流中的各项活动指标,以识别潜在的异常行为模式,所述机器学习模型能够根据历史数据和当前环境变化调整检测阈值;Dynamically monitoring various activity indicators in the business activity data stream using a machine learning model to identify potential abnormal behavior patterns, wherein the machine learning model is capable of adjusting detection thresholds based on historical data and current environmental changes; 基于所述异常行为模式,应用行为分析算法,结合预设的行为特征库,生成所述异常行为模式的行为评分;Based on the abnormal behavior pattern, applying a behavior analysis algorithm and combining it with a preset behavior feature library to generate a behavior score for the abnormal behavior pattern; 使用预设的风险评估框架对所述行为评分进行处理,得到风险评估结果,所述风险评估框架确保所述商务活动数据流的风险评估的全面性和准确性;Processing the behavior score using a preset risk assessment framework to obtain a risk assessment result, wherein the risk assessment framework ensures the comprehensiveness and accuracy of the risk assessment of the business activity data flow; 根据所述行为评分和所述风险评估结果,评估所述商务活动数据流的风险等级。The risk level of the business activity data flow is evaluated according to the behavior score and the risk assessment result. 3.根据权利要求2所述的方法,其特征在于,所述基于所述数据加密强度对商务活动数据流进行加密,并通过分布式存储技术将加密后的商务活动数据流分散保存于多个物理位置不同的数据中心,包括:3. The method according to claim 2, wherein the step of encrypting the business activity data stream based on the data encryption strength and distributing the encrypted business activity data stream to multiple data centers at different physical locations using distributed storage technology comprises: 基于所述数据加密强度对商务活动数据流进行加密,以生成加密后的商务活动数据流;Encrypting the business activity data stream based on the data encryption strength to generate an encrypted business activity data stream; 利用数据分割算法将所述加密后的商务活动数据流切分为多个数据段;Using a data segmentation algorithm to split the encrypted business activity data stream into multiple data segments; 通过哈希分配策略确定所述多个数据段位于数据中心的存储位置,并通过分布式存储技术将所述多个数据段分别存储至对应的存储位置。The storage locations of the multiple data segments in the data center are determined by a hash distribution strategy, and the multiple data segments are respectively stored in corresponding storage locations by a distributed storage technology. 4.根据权利要求1所述的方法,其特征在于,所述在检测到预定义的威胁场景时,自动触发预警机制并生成报告,同时依据所述安全策略执行相应的防护措施,包括:4. The method according to claim 1, wherein when a predefined threat scenario is detected, the early warning mechanism is automatically triggered and a report is generated, and corresponding protective measures are executed according to the security policy, including: 实时监控所述商务活动数据流中的各项活动指标,并通过异常检测算法识别所述商务活动数据流中的潜在威胁行为;Monitor various activity indicators in the business activity data stream in real time, and identify potential threatening behaviors in the business activity data stream through anomaly detection algorithms; 设置预定义的威胁场景规则集,当所述潜在威胁行为符合所述威胁场景规则集中的任一条件时,则判定为检测到预定义的威胁场景;Setting a predefined threat scenario rule set, and when the potential threat behavior meets any condition in the threat scenario rule set, determining that the predefined threat scenario is detected; 在检测到所述预定义的威胁场景时,触发预警机制,向预设的联系人或管理系统发送即时警报通知,并记录所述威胁场景的发生时间和具体情况;When the predefined threat scenario is detected, the early warning mechanism is triggered, an immediate alarm notification is sent to the preset contact person or management system, and the occurrence time and specific circumstances of the threat scenario are recorded; 生成详细的威胁报告文档,所述报告文档包括所述威胁场景的具体表现形式、发生时间、影响范围以及可能的原因分析;Generate a detailed threat report document, which includes the specific manifestation of the threat scenario, occurrence time, impact scope, and possible cause analysis; 依据所述预设的安全策略,自动选择和执行相应的防护措施,所述防护措施至少包括隔离受影响的数据资源、暂停相关账户权限以及启动数据恢复流程;Automatically select and execute corresponding protective measures based on the preset security policy, which at least include isolating affected data resources, suspending relevant account permissions, and initiating a data recovery process; 通过自动化脚本或预配置的工作流引擎,实施所述防护措施,并监控其执行状态,确保所述防护措施有效执行。The protective measures are implemented through automated scripts or pre-configured workflow engines, and their execution status is monitored to ensure that the protective measures are effectively implemented. 5.根据权利要求1所述的方法,其特征在于,还包括:5. The method according to claim 1, further comprising: 基于预设的时间衰减因子、动态调整因子、波动因子以及历史趋势因子修正所述加密强度因子Based on preset time decay factor , dynamic adjustment factor , volatility factor and historical trend factors Modify the encryption strength factor ; 修正后的加密强度因子通过以下公式计算得到:Modified encryption strength factor Calculated by the following formula: 其中,是原始加密强度因子的基础计算部分,它通过加权求和的方式计算出基础加密强度因子;其中是在时间上与因子对应的权重,而则是因子在时间上的实际数值;代表,即风险等级、重要性因子、敏感性因子、历史访问频率的对数变换、数据量的平方根变换;代表时间衰减因子,它随着时间和初始时间点的差距增加而指数级减少,表达式为,其中是一个常数,表示时间衰减率;代表动态调整因子,它通过计算最近个时间点的平均加密强度来反映加密强度的变化趋势,表达式为代表波动因子,它反映了加密强度随着时间变化的波动程度,表达式为,其中个时间点内加密强度的平均值;代表历史趋势因子,它衡量了加密强度随着时间的趋势变化,表达式为是一个常数;代表调节系数,用于调整动态调整因子和历史趋势因子对加密强度的影响程度。in, It is the basic calculation part of the original encryption strength factor, which calculates the basic encryption strength factor by weighted summation; It's in time Upper and lower factors The corresponding weights, The factor In time The actual value on ; represent , namely, risk level, importance factor, sensitivity factor, logarithmic transformation of historical access frequency, and square root transformation of data volume; Represents the time decay factor, which changes with time and the initial time point The gap increases and decreases exponentially, and the expression is ,in is a constant representing the time decay rate; Represents the dynamic adjustment factor, which is calculated by the most recent The average encryption strength at each time point reflects the changing trend of encryption strength, which is expressed as ; represents the volatility factor, which reflects the degree of fluctuation of encryption strength over time, and is expressed as ,in yes The average value of encryption strength at a time point; Represents the historical trend factor, which measures the trend of encryption strength over time and is expressed as ; is a constant; and Represents the adjustment coefficient, used to adjust the dynamic adjustment factor and historical trend factors The degree of impact on encryption strength. 6.根据权利要求3所述的方法,其特征在于,所述利用数据分割算法将所述加密后的商务活动数据流切分为多个数据段,包括:6. The method according to claim 3, wherein the step of dividing the encrypted business activity data stream into multiple data segments using a data segmentation algorithm comprises: 定义数据分割因子,基于所述数据分割因子,利用数据分割算法将所述加密后的商务活动数据流切分为多个数据段;defining a data segmentation factor, and dividing the encrypted business activity data stream into a plurality of data segments using a data segmentation algorithm based on the data segmentation factor; 其中,所述数据分割因子根据所述商务活动数据流的总大小,所述商务活动数据流的重要性因子,所述商务活动数据流的敏感性因子,所述商务活动数据流的历史访问频率,所述商务活动数据流的数据量以及时间所确定:Among them, the data segmentation factor According to the total size of the business activity data flow , the importance factor of the business activity data flow , the sensitivity factor of the business activity data flow , the historical access frequency of the business activity data stream , the data volume of the business activity data flow and time Determined: 其中,数据分割因子由下式计算得出:Among them, the data split factor Calculated by the following formula: 其中,代表所述商务活动数据流在时间上被分割成的数据段数量,代表是随时间变化的权重系数,且满足in, Represents the business activity data flow at time The number of data segments into which the above is divided, represent is a weight coefficient that changes with time and satisfies ; 还包括:Also includes: 基于预设的冗余因子、数据分布平衡因子、负载波动因子以及负载趋势因子修正所述数据分割因子Based on preset redundancy factor , data distribution balance factor , load fluctuation factor and load trend factor Modify the data split factor ; 修正后的数据分割因子通过以下公式计算得到:Corrected data split factor Calculated by the following formula: 其中,表示在时间时商务活动数据流的总大小;表示在时间时商务活动数据流被分割成的数据段数量;表示通过对不同属性进行加权求和的结果,其中是随时间变化的权重系数,是对应属性在时间的;是冗余因子,表示在时间为了提高数据可靠性而添加的额外数据段数量;计算方式为,其中是一个随时间变化的常数,用于调节冗余的比例;是数据分布平衡因子,衡量数据中心之间的数据分布是否均衡;计算方式为,其中是数据中心的数量,是第个数据中心在时间的负载,是所有数据中心在时间的平均负载;表示负载波动因子,表示数据中心之间负载波动的程度,计算方式为,其中是负载趋势因子,用于衡量数据中心负载随时间变化的趋势,计算方式为表示在时间的某个基准负载值;分别是用于调整影响力的调节系数。in, Indicates time The total size of the business activity data stream at that time; Indicates time The number of data segments into which the business activity data stream is divided; Represents the result of weighted summation of different attributes, where is the weight coefficient that changes with time, The corresponding attribute at time of; is the redundancy factor, indicating that The number of extra data segments added to improve data reliability; calculated as ,in It is a constant that changes with time and is used to adjust the proportion of redundancy; Is the data distribution balance factor, which measures whether the data distribution between data centers is balanced; the calculation method is ,in is the number of data centers, It is Data centers at time The load, All data centers at time Average load; Represents the load fluctuation factor, which indicates the degree of load fluctuation between data centers and is calculated as ,in is the load trend factor, which is used to measure the trend of data center load changes over time and is calculated as ; Indicates time A certain reference load value; and They are used to adjust and The adjustment coefficient of influence. 7.一种基于大数据的商务数据安全管理系统,用于执行权利要求1~6任一项所述的一种基于大数据的商务数据安全管理方法,其特征在于,包括:7. A business data security management system based on big data, configured to execute the business data security management method based on big data according to any one of claims 1 to 6, characterized in that it comprises: 接收模块,用于接收来自企业内部系统的商务活动数据流;A receiving module is used to receive business activity data streams from the enterprise's internal system; 分析模块,用于动态分析所述商务活动数据流中的异常行为模式,并依据预设的安全策略实时评估所述商务活动数据流的风险等级;An analysis module, configured to dynamically analyze abnormal behavior patterns in the business activity data stream and assess the risk level of the business activity data stream in real time according to a preset security policy; 控制模块,用于根据所述风险等级自动调整数据加密强度,并对高风险数据实施细粒度访问控制;A control module, configured to automatically adjust data encryption strength according to the risk level and implement fine-grained access control for high-risk data; 保存模块,通过分布式存储技术将加密后的商务活动数据流分散保存于多个物理位置不同的数据中心;The storage module uses distributed storage technology to store encrypted business activity data streams in multiple data centers with different physical locations; 预警模块,在检测到预定义的威胁场景时,自动触发预警机制并生成报告,同时依据所述安全策略执行相应的防护措施。The early warning module automatically triggers the early warning mechanism and generates a report when a predefined threat scenario is detected, and executes corresponding protective measures according to the security policy. 8.一种计算设备,其特征在于,包括处理组件以及存储组件;所述存储组件存储一个或多个计算机指令;所述一个或多个计算机指令用以被所述处理组件调用执行,实现如权利要求1~6任一项所述的一种基于大数据的商务数据安全管理方法。8. A computing device, characterized in that it includes a processing component and a storage component; the storage component stores one or more computer instructions; the one or more computer instructions are used to be called and executed by the processing component to implement a business data security management method based on big data as described in any one of claims 1 to 6. 9.一种计算机存储介质,其特征在于,存储有计算机程序,所述计算机程序被计算机执行时,实现如权利要求1~6任一项所述的一种基于大数据的商务数据安全管理方法。9. A computer storage medium, characterized in that it stores a computer program, which, when executed by a computer, implements the business data security management method based on big data as described in any one of claims 1 to 6.
CN202510189165.6A 2025-02-20 2025-02-20 Business data security management system and method based on big data Active CN120105475B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510189165.6A CN120105475B (en) 2025-02-20 2025-02-20 Business data security management system and method based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510189165.6A CN120105475B (en) 2025-02-20 2025-02-20 Business data security management system and method based on big data

Publications (2)

Publication Number Publication Date
CN120105475A CN120105475A (en) 2025-06-06
CN120105475B true CN120105475B (en) 2025-09-12

Family

ID=95882385

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510189165.6A Active CN120105475B (en) 2025-02-20 2025-02-20 Business data security management system and method based on big data

Country Status (1)

Country Link
CN (1) CN120105475B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118972174A (en) * 2024-10-15 2024-11-15 河北大学 Information security risk management method and system for data transmission monitoring
CN119475369A (en) * 2024-09-29 2025-02-18 山东亚泽信息技术有限公司 A data security management method and system based on cloud computing

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10972770B2 (en) * 2018-01-10 2021-04-06 Citrix Systems, Inc. Method for encrypting data streams with negotiable and adaptable encryption levels
CN118200055B (en) * 2024-05-16 2024-07-19 河北珏胜通讯技术有限公司 Data traffic security defense method based on Internet of things
CN119202599B (en) * 2024-09-11 2025-04-04 保利长大工程有限公司 Mountain area high pier cast-in-situ safety detection method based on multi-source data fusion
CN119442320A (en) * 2024-10-31 2025-02-14 深圳大学 A data governance method and system based on data resource security identification level
CN119382995B (en) * 2024-11-06 2025-07-15 深圳市马博士网络科技有限公司 Multi-application environment encryption communication method and system for protecting user privacy

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119475369A (en) * 2024-09-29 2025-02-18 山东亚泽信息技术有限公司 A data security management method and system based on cloud computing
CN118972174A (en) * 2024-10-15 2024-11-15 河北大学 Information security risk management method and system for data transmission monitoring

Also Published As

Publication number Publication date
CN120105475A (en) 2025-06-06

Similar Documents

Publication Publication Date Title
US11647039B2 (en) User and entity behavioral analysis with network topology enhancement
US11757920B2 (en) User and entity behavioral analysis with network topology enhancements
US11924237B2 (en) Digital asset based cyber risk algorithmic engine, integrated cyber risk methodology and automated cyber risk management system
US10438001B1 (en) Identification, prediction, and assessment of cyber security risk
US11792218B2 (en) Method, apparatus, and computer-readable medium for determining risk associated with anomalous behavior of a user on a computer network
US11640470B1 (en) System and methods for reducing an organization's cybersecurity risk by determining the function and seniority of employees
US20230412620A1 (en) System and methods for cybersecurity analysis using ueba and network topology data and trigger - based network remediation
US10878102B2 (en) Risk scores for entities
US9832214B2 (en) Method and apparatus for classifying and combining computer attack information
US10339309B1 (en) System for identifying anomalies in an information system
CN108780479B (en) System and method for detecting and scoring anomalies
US9038134B1 (en) Managing predictions in data security systems
US9479518B1 (en) Low false positive behavioral fraud detection
US8566956B2 (en) Monitoring and reporting of data access behavior of authorized database users
US11424993B1 (en) Artificial intelligence system for network traffic flow based detection of service usage policy violations
US12363145B1 (en) Run-time configurable cybersecurity system
US20070113281A1 (en) Method used in the control of a physical system affected by threats
Sharma Behavioral analytics and zero trust
US10795738B1 (en) Cloud security using security alert feedback
US20180253737A1 (en) Dynamicall Evaluating Fraud Risk
US20250029009A1 (en) Software application for continually assessing, processing, and remediating cyber-risk in real time
WO2023283349A1 (en) Fraud detection and prevention system
CN105825130B (en) A kind of information security early warning method and device
CN120105475B (en) Business data security management system and method based on big data
KR20050093196A (en) Method and system for calculating an risk index in real-time of information assets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Jin Donghui

Inventor after: Shen Hao

Inventor before: Jin Donghui

Inventor before: Shen Hao

GR01 Patent grant