2020
DOI: 10.1155/2020/8841417
|View full text |Cite
|
Sign up to set email alerts
|

Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System

Abstract: A DLP (data loss prevention) system usually arranges network monitors at the network boundary to perform network traffic capture, file parsing, and strategy matching procedures. Strategy matching is a key process to prevent corporate secret-related documents from leaking. This paper adopts the document fingerprint similarity detection method based on the SimHash principle and customizes the KbS (Keyword-based SimHash) fingerprint, PbS (Paragraph-based SimHash) fingerprint, and SoP (SimHash of Paragraph) finger… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 29 publications
(29 reference statements)
0
0
0
Order By: Relevance
“…The goal to be achieved by network and information security is to ensure information security issues in cyberspace, involving information confidentiality, integrity, authenticity, availability, nonrepudiation, controllability, and reviewability [1][2][3]. The research objects and scope of network and information security are defined differently from different perspectives and levels, while network security threats and network security technologies are the two most basic research objects in network and information security [4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…The goal to be achieved by network and information security is to ensure information security issues in cyberspace, involving information confidentiality, integrity, authenticity, availability, nonrepudiation, controllability, and reviewability [1][2][3]. The research objects and scope of network and information security are defined differently from different perspectives and levels, while network security threats and network security technologies are the two most basic research objects in network and information security [4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%