Font Size: a A A

Design And Implementation Of Data Leakage Protection System Based On Content Approval

Posted on:2021-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y S ChenFull Text:PDF
GTID:2428330602481511Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the gradual maturity of computer technology,computers have become an indispensable part in various industries.Due to the revolutionary advantages of computer technology,various industries have successively completed the informationization process.Computers and networks have become daily offices,Necessary tools and channels for communication and interaction.Data information generated by computer technology while changing people's lives has become a vital resource in the 21st century.Over the past decade or so,the importance of data has gradually been recognized,as at the Davos World Economic Forum in early 2012,a report entitled "Big Data,Big Impact" As stated,data has become a new asset class,just like currency and gold.However,data loss and even leakage have occurred frequently.The loss of some confidential data will cause huge losses to the company,and the leakage of personal privacy data is more likely to pose a threat to personal safety.Data leakage prevention is imminent.The purpose of this system design is to inadvertently or intentionally leak data to internal personnel.This system sets up a proxy server inside the enterprise and monitors the data on the proxy server.It prevents data from being leaked to the outside through a browser or email without affecting the enterprise's information exchange and normal company employees use of the computer.The client monitors the local file copying of the terminal machine,and detects and prevents intentional or unintentional unauthorized copying and sending of sensitive data.Overall,the system includes three parts:system management,terminal monitoring and network monitoring.In terms of system management,this system uses a B/S software architecture,adopts a separate development method of front and back ends,and selects Vue+Flask+MongoDB for development work.The specific business management uses a policy-based system management method to customize different strategies for different enterprise roles.The strategy here refers to detailed data on various data transmission rights of the terminal used by each user.In terms of terminal monitoring,the system selects the C/S architecture and uses the minifilter file to filter the micro-framework development.In terms of network monitoring,this system uses cutting-edge proxy servers such as Squid and Postfix to set up network proxies,and uses the icap protocol to exchange information between filters and Squid.The data monitoring of the system is based on content filtering.The system realizes the content restoration of multiple mailbox transmissions including qq mailboxes and 163 mailboxes by parsing messages of various protocols and multiple file transmission formats,using tika's file format analysis.Able to parse almost all file formats on the market,even compressed files,file matching is based on NFA regular content matching,and optimization is considered in the future,supporting file MD5 value matching,text similarity algorithm matching based on cosine similarity algorithm,etc.A variety of functions.After continuous exploration,this system has gone through a long process from the proposal of filter driver and network proxy model to the realization of the model,and then to the actual application.After absorbing the advantages of data leakage prevention solutions at home and abroad,a network-based agent and filter-driven data leakage prevention program has been formed.This system involves many languages and frameworks,the development environment is more complex,and the requirements for real-time and security are also higher.After a year of design and development work,the user needs have basically been completed.Now the system is running stably and basically meets the user's needs for data leakage protection.The system will continue to be improved and optimized in the future,and the functions will be continuously improved.
Keywords/Search Tags:Data leakage, data monitoring, network proxy, file analysis
PDF Full Text Request
Related items