CN114861213B - Full-period intelligent management system and method for scientific and technological projects - Google Patents

Full-period intelligent management system and method for scientific and technological projects Download PDF

Info

Publication number
CN114861213B
CN114861213B CN202210793331.XA CN202210793331A CN114861213B CN 114861213 B CN114861213 B CN 114861213B CN 202210793331 A CN202210793331 A CN 202210793331A CN 114861213 B CN114861213 B CN 114861213B
Authority
CN
China
Prior art keywords
node
nodes
risk
time
influence degree
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210793331.XA
Other languages
Chinese (zh)
Other versions
CN114861213A (en
Inventor
周凌云
李军
卢琰
罗宇恒
陈晓佳
刘良斌
李海威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Science & Technology Infrastructure Center
Original Assignee
Guangdong Science & Technology Infrastructure Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Science & Technology Infrastructure Center filed Critical Guangdong Science & Technology Infrastructure Center
Priority to CN202210793331.XA priority Critical patent/CN114861213B/en
Publication of CN114861213A publication Critical patent/CN114861213A/en
Application granted granted Critical
Publication of CN114861213B publication Critical patent/CN114861213B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Abstract

The invention discloses a scientific and technological project full-period intelligent management system and method, which relate to the technical field of project full-period intelligent management and comprise a historical data acquisition module, a transmission coefficient setting module, a process influence degree analysis module, a risk node setting module, a project real-time monitoring module and a node comparison analysis module; the historical data acquisition module is used for acquiring a circulation path of an encrypted file in the whole period of the historical item; the transmission coefficient setting module is used for setting a transmission coefficient on a link; the process influence degree analysis module is used for analyzing the process influence degree on the circulation path node; the risk node setting module is used for analyzing the influence degree of different nodes and setting risk nodes; the project real-time monitoring module is used for monitoring a flow path of a completed project; and the node comparison and analysis module is used for comparing and analyzing the actual node of the encrypted file in the historical data before the encrypted file reaches the risk node with the node in the real-time flow path.

Description

Full-period intelligent management system and method for scientific and technological projects
Technical Field
The invention relates to the technical field of project full-period intelligent management, in particular to a system and a method for managing a scientific and technological project full-period intelligent management.
Background
At present, in the whole-cycle management of some scientific and technological projects, a lot of files needing to be encrypted and some common files needing no encryption are often involved, the departments involved in the circulation process of the projects of the files are numerous, the processing flow and the environment are difficult to monitor and predict, the situations that the same department needs to process both encrypted files and unencrypted files in a short time exist, and the security of the encrypted files is also influenced by different processing habits corresponding to different departments when the encrypted files are processed; risks are difficult to predict in the whole period of encrypted file processing, certain risks are brought to the encrypted files in the whole period of project circulation, certain troubles and troubles are brought to the execution department of the project if errors occur, and redundant labor force is increased.
Disclosure of Invention
The invention aims to provide a system and a method for full-period intelligent management of scientific and technological projects, so as to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme: a full-period intelligent management method for scientific and technological projects comprises the following processes:
acquiring a circulation path of an encrypted file in the whole period of a historical project, wherein the circulation path comprises departments in which the encrypted file passes and a connection relation between the departments for transmitting the encrypted file; taking departments in which the encrypted files pass as nodes, taking the connection relation between the departments for transmitting the encrypted files as a link, forming a complete circulation path of the encrypted files by the nodes and the link, and setting a transmission coefficient on the link;
acquiring different circulation paths corresponding to the encrypted files in the whole period of the historical project as a circulation path set; analyzing the process influence degree on the circulation path node; sorting the process influence degrees of all nodes in the circulation path set from large to small, calculating the average value of the process influence degrees, and setting the nodes corresponding to the process influence degrees larger than the average value in the sorting as risk nodes;
monitoring a plan flow path of an encrypted file in the full-period implementation of a project, and judging whether an actual node of the encrypted file before reaching a risk node is the same as a node before the risk node in a flow path set or not when the plan flow path contains the risk node;
if the nodes are all the same, calculating a total risk index reaching the risk node, judging the deviation degree of the total risk index and analyzing whether to give an early warning; if the nodes are different, analyzing the process influence degree of the different nodes, and if the process influence degree of all the different nodes is smaller than the process influence degree of the risk node, monitoring in a first preset monitoring time period; and if the process influence degree of different nodes is larger than or equal to the process influence degree of the risk node, early warning is carried out on the node, and the node is stored, and the path corresponding to the node is transmitted to the circulation path set to calculate and update the risk node in real time.
Further, setting a transmission coefficient on the link includes the following steps:
acquiring nodes [ u, v ] connected by links in a circulation path set, wherein u represents a sending node of the link, v represents a receiving node of the link, recording a receiving node set v = { v1, v 2.., vi } of the same node u connected by different links, and acquiring a sending time set ti when the sending node u sends the receiving node set; recording a sending node set u = { u1, u 2.,. Uj } which is connected with the same node v through different links, and acquiring a receiving time set hi after a receiving node v receives an encrypted file sent by the sending node set;
using the formula:
Figure GDA0003832331710000021
calculating transmission coefficients e of different link nodes in the circulation path set; wherein { ti } max is the maximum value in the set ti, { ti } min is the minimum value in the set ti, { hi } max is the maximum value in the set hi, and { hi } min is the minimum value in the set hi; mv is the number of receiving node set v, i is less than or equal to mv, mu is the number of sending node set u, j is less than or equal to mu; if mv and mu are equal to 1, the transmission coefficient is e0=1, if one of mv or mu is 1, the transmission coefficient is e1, and e1 is the reciprocal of mv and mu, which is not 1.
The transmission coefficient is calculated by analyzing the time influence degree of all encrypted files in the flow path set in the receiving and sending processes, when the time for receiving the encrypted files by departments is closer, the possibility that the file processing is abnormal after the files are decrypted is higher, and the operation habits of the departments on the processing of the encrypted files can be accurately analyzed by analyzing the time for processing the encrypted files by the departments in the historical data.
Further, analyzing the influence degree of the process on the nodes of the circulation path, comprising the following processes:
recording that a set of unencrypted files processed by the node in a second preset monitoring period after the receiving time is P, P = { P1, P2., pk }; acquiring content similarity of the non-encrypted file set P and encrypted files to form a similarity set and an average value T0 of interval processing time corresponding to the encrypted files in the non-encrypted file set P; the second preset monitoring time period is greater than the first preset monitoring time period;
calculating a similarity average value W0 in the similarity set, and acquiring the number d of similarities which are greater than the similarity average value W0 in the similarity set W and a non-encrypted file interval processing time length set T1 which corresponds to the similarity average value W in the similarity set W; the interval processing time length represents the influence degree size relation of the non-encrypted file to the encrypted file; the larger the interval processing time of the non-encrypted files which are larger than the average value of the similarity in the similarity set W is, the smaller the influence degree on the encrypted files is, because the encrypted files and the non-encrypted files are easy to be confused under the condition that the files are similar;
using the formula:
Figure GDA0003832331710000031
calculating a process impact magnitude at a node; wherein { T1} min represents the minimum value in the interval processing time length set T1, n is the total number in the non-encrypted file set P, and k is less than or equal to n.
Analyzing the influence degree of the process in the process of processing the encrypted file is to consider whether the encrypted file exists in a non-encrypted file with similar content when the encrypted file is processed, and analyzing the interval processing duration of the non-encrypted file and the encrypted file is to judge the possibility of confusion of the two files; if there is no similar content in the environment for analyzing the encrypted file and the processing time interval between the encrypted file and the non-encrypted file is longer, the node at this point has a better processing environment for the encrypted file and the process influence degree is smaller.
Further, if the nodes are all the same, calculating the total process influence degree of the reached risk nodes, judging the deviation degree of the total process influence degree and analyzing whether to give an early warning, and the method comprises the following processes:
calculating the total risk index of the arrival risk nodes as follows:
Q=∑ef
ef is the process influence degree of the first sending node in the flow path formed by the overlapped nodes, the sequential product of the first receiving node and the transmission coefficient is the sequence generated by the nodes according to time sequence, and the repeated link and the repeated node are only calculated once;
when the same node is connected with a plurality of links in the transmission process of an encrypted file to generate repeated node calculation, the time difference generated by the links needs to be analyzed; if the time difference is greater than or equal to a second preset monitoring time period, calculating the total risk index by using the node corresponding to the first link, and if the time difference is less than the second preset monitoring time period, calculating the total risk index by summing the plurality of links and then calculating the process influence degree corresponding to the node;
calculating a total risk index Q0 in the whole process of the historical project and a total risk index Q1 of the same node corresponding to the project in implementation of the total risk index Q0; comparing the difference value of the Q0 and the Q1, and if the difference value is larger than or equal to a preset difference value threshold, early warning the project node which is being implemented; and if the difference value is smaller than the preset difference value threshold value, continuing to monitor in the first preset monitoring time period.
Calculating the total risk index according to nodes and links involved in a circulation path, wherein the nodes are related to risk environments influenced by other non-encrypted files when departments process encrypted files, and the links analyze transmission habits of the departments when different encrypted files are transmitted; a complete circulation path can analyze the overall risk index, and the judged risk node is used as a subsection node which can be monitored in real time in the working process to give an early warning in time.
Further, the receiving time is the time point when the department opens the encrypted file for decryption, but not the time point when the encrypted file is transmitted to the department; and the sending time is the time point when the department completes encryption and sends the encrypted data.
A scientific and technological project full-period intelligent management system comprises a historical data acquisition module, a transmission coefficient setting module, a process influence degree analysis module, a risk node setting module, a project real-time monitoring module and a node comparison analysis module;
the historical data acquisition module is used for acquiring a circulation path of the encrypted file in the whole period of the historical project, wherein the circulation path comprises departments in which the encrypted file passes and a connection relation between the departments and the department for transmitting the encrypted file; taking departments in which the encrypted files pass as nodes, taking the connection relation between the departments for transmitting the encrypted files as links, and forming a complete circulation path of the encrypted files by the nodes and the links;
the transmission coefficient setting module is used for setting a transmission coefficient on a link;
the process influence degree analysis module is used for analyzing the process influence degree on the circulation path node;
the risk node setting module is used for analyzing the influence degree of different nodes on the circulation path and setting risk nodes;
the project real-time monitoring module is used for monitoring the completed circulation path of the project and analyzing the relation between the current position and the risk node;
and the node comparison and analysis module is used for comparing and analyzing the actual node of the encrypted file in the historical data before the encrypted file reaches the risk node with the node in the real-time flow path.
Further, the transmission coefficient setting module comprises a node set classifying unit, a time set acquiring unit and a transmission coefficient calculating unit;
the node set classifying unit is used for classifying the nodes on the flow path into a sending node set and a receiving node set;
the time set acquisition unit acquires corresponding sending time and receiving time sets according to the sending node set and the receiving node set;
and the transmission coefficient calculating unit calculates the transmission coefficients corresponding to different link nodes according to the data of the node set classifying unit and the time set acquiring unit.
Further, the process influence degree analysis module comprises a non-encrypted file acquisition unit, a similarity analysis unit and a process influence degree calculation unit;
the non-encrypted file acquisition unit is used for acquiring a non-encrypted file set when the encrypted files are monitored in a second preset monitoring period;
the similarity analysis unit is used for analyzing the number of the unencrypted files in the unencrypted file set, the similarity of the unencrypted files to the content of the encrypted files is greater than the average similarity, and the interval processing time length between the unencrypted files in the unencrypted file set and the encrypted files;
the process influence degree calculating unit calculates the process influence degree according to the interval processing time length and the proportion of the non-encrypted files when the similarity of the non-encrypted files is larger than the average similarity.
Further, the node comparison and analysis module comprises a risk index analysis unit, a difference node comparison unit and an early warning storage unit;
the risk index analysis unit is used for analyzing that the historical data nodes and the real-time nodes are identical when the nodes subjected to the risk node condition are all the same, and calculating the total risk index;
the difference node comparison unit is used for analyzing the process influence degree of different nodes when the historical data nodes and the real-time nodes are not completely the same when the risk node conditions are reached;
and the early warning storage unit performs early warning according to the nodes which do not meet the difference threshold in the risk index analysis unit, performs early warning on the nodes when the process influence degree of different nodes in the difference node comparison unit is greater than or equal to the process influence degree of the risk nodes, and stores paths corresponding to the nodes to the circulation path set to calculate and update the risk nodes in real time.
Compared with the prior art, the invention has the following beneficial effects: according to the invention, the departments involved in the whole period of the project are regarded as nodes, and the transmission relation between the departments is regarded as a link, so that the complex organization architecture is simplified; meanwhile, the influence degree of different file influence environments on the encrypted file processing process in the node is analyzed, the operation habit of an analysis department on the encrypted file on the link is analyzed, the node and the link form a complete circulation path to analyze the overall risk trend, the position of the encrypted file with risk in the whole project period is effectively judged, the department is reminded to give an early warning, and the risk of the encrypted file in the transmission process is reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic structural diagram of a full-period intelligent management system for scientific and technical projects according to the present invention;
fig. 2 is a schematic diagram of a flow path of a full-period intelligent management method of a scientific and technological project according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, the present invention provides a technical solution: a full-period intelligent management method for scientific and technological projects comprises the following processes:
acquiring a circulation path of an encrypted file in the whole period of a historical project, wherein the circulation path comprises departments in which the encrypted file passes and a connection relation between the departments and transmitting the encrypted file; taking departments in which the encrypted files pass as nodes, taking the connection relation between the departments for transmitting the encrypted files as a link, forming a complete circulation path of the encrypted files by the nodes and the link, and setting a transmission coefficient on the link;
acquiring different circulation paths corresponding to the encrypted files in the whole period of the historical project as a circulation path set; analyzing the process influence degree on the circulation path node; sorting the process influence degrees of all nodes in the circulation path set from large to small, calculating the average value of the process influence degrees, and setting the nodes corresponding to the process influence degrees larger than the average value in the sorting as risk nodes;
monitoring a plan flow path of an encrypted file in the full-period implementation of a project, and judging whether an actual node of the encrypted file before reaching a risk node is the same as a node before the risk node in a flow path set or not when the plan flow path contains the risk node;
if the nodes are all the same, calculating a total risk index reaching the risk node, judging the deviation degree of the total risk index and analyzing whether to give an early warning; if the nodes are different, analyzing the process influence degree of the different nodes, and if the process influence degree of all the different nodes is smaller than the process influence degree of the risk node, monitoring in a first preset monitoring time period; and if the process influence degree of different nodes is larger than or equal to the process influence degree of the risk node, early warning is carried out on the node, and the node is stored, and the path corresponding to the node is transmitted to the circulation path set to calculate and update the risk node in real time.
Setting transmission coefficients on a link, comprising the following processes:
acquiring nodes [ u, v ] connected by links in a flow path set, wherein u represents a sending node of the link, v represents a receiving node of the link, recording a receiving node set v = { v1, v 2.. Multidot.vi } connected by the same node u through different links, and acquiring a sending time set ti when the sending node u is sent to the receiving node set; recording a sending node set u = { u1, u2,..,. Uj } of the same node v connected through different links, and acquiring a receiving time set hj after a receiving node v receives an encrypted file sent by the sending node set;
using the formula:
Figure GDA0003832331710000081
calculating transmission coefficients e of different link nodes in the circulation path set; wherein { ti } max is the maximum value in the set ti, { ti } min is the minimum value in the set ti, { hi } max is the maximum value in the set hi, and { hi } min is the minimum value in the set hi; mv is the number of receiving node set v, i is less than or equal to mv, mu is the number of sending node set u, j is less than or equal to mu; if mv and mu are equal to 1, the transmission coefficient is e0=1, and if one of mv and mu is 1, the transmission coefficient is e1, and e1 is the reciprocal of mv and mu, which is not 1.
The transmission coefficient is calculated by analyzing the time influence degree of all encrypted files in the flow path set in the receiving and sending processes, when the time for receiving the encrypted files by departments is closer, the possibility that the file processing is abnormal after the files are decrypted is higher, and the operation habits of the departments on the processing of the encrypted files can be accurately analyzed by analyzing the time for processing the encrypted files by the departments in the historical data.
As shown in fig. 2, there are 2 circulation paths of the encrypted file, the circulation path of the encrypted file one is a solid line, and the circulation path of the encrypted file two is a broken line;
for example, analyzing the nodes [ c2, d ] connected by the link, wherein c2 is the sending node of the link, and d is the receiving node of the link;
c2 a set of receiving nodes v = { d, e } connected by different links; corresponding to { ti } = {12, 01,12 };
d set of transmitting nodes u = { c0, c1, c2} connected by different links; corresponding to { hi } = {14, 15;
then { ti } max- { ti } min =4 minutes, { hi } max- { hi } min =20 minutes;
then e = [4 x (1/2) ]/[20 x (1/3) ] =0.3.
Analyzing the influence degree of the process on the circulation path node, comprising the following processes:
recording that a set of unencrypted files processed by the node in a second preset monitoring period after the receiving time is P, P = { P1, P2., pk }; acquiring content similarity of the non-encrypted file set P and encrypted files to form a similarity set and an average value T0 of interval processing time corresponding to the encrypted files in the non-encrypted file set P; the second preset monitoring time period is greater than the first preset monitoring time period;
calculating a similarity average value W0 in the similarity set, and acquiring the number d of similarities which are greater than the similarity average value W0 in the similarity set W and a non-encrypted file interval processing time length set T1 which corresponds to the similarity average value W in the similarity set W; the interval processing duration represents the influence degree relation of the non-encrypted file on the encrypted file; the larger the interval processing time of the non-encrypted files which are larger than the average value of the similarity in the similarity set W is, the smaller the influence degree on the encrypted files is, because the encrypted files and the non-encrypted files are easy to be confused under the condition that the files are similar;
using the formula:
Figure GDA0003832331710000091
calculating a process impact magnitude at a node; wherein { T1} min represents the minimum value in the interval processing time length set T1, n is the total number in the non-encrypted file set P, and k is less than or equal to n.
Analyzing the influence degree of the process of processing the encrypted file is to consider whether the unencrypted file with similar content exists in the encrypted file when the encrypted file is processed, and analyzing the interval processing duration of the unencrypted file and the encrypted file is to judge the possibility of confusion of the two files; if there is no similar content in the environment for analyzing the encrypted file and the processing time interval between the encrypted file and the non-encrypted file is longer, the node at this point has a better processing environment for the encrypted file and the process influence degree is smaller.
If the nodes are all the same, calculating the total process influence degree of the reached risk nodes, judging the deviation degree of the total process influence degree and analyzing whether to give an early warning, and the method comprises the following steps:
calculating the total risk index of the arrival risk nodes as follows:
Q=∑ef
ef is the process influence degree of the first sending node in the flow path formed by the overlapped nodes, the sequential product of the first receiving node and the transmission coefficient is the sequence generated by the nodes according to time sequence, and the repeated link and the repeated node are only calculated once;
when the same node is connected with a plurality of links in the transmission process of an encrypted file to generate repeated node calculation, the time difference generated by the links needs to be analyzed; if the time difference is greater than or equal to a second preset monitoring time period, calculating the total risk index by using the node corresponding to the first link, and if the time difference is less than the second preset monitoring time period, calculating the total risk index by summing the plurality of links and then calculating the process influence degree corresponding to the node;
calculating a total risk index Q0 in the whole process of the historical project and a total risk index Q1 of the same node corresponding to the project in implementation of the total risk index Q0; comparing the difference value of the Q0 and the Q1, and if the difference value is larger than or equal to a preset difference value threshold, early warning the project node which is being implemented; and if the difference value is smaller than the preset difference value threshold value, continuing to monitor in the first preset monitoring time period.
For example in fig. 2: analyzing a flow path corresponding to the encrypted file II;
if the risk node is d, the flow path reaching the risk node is as follows:
a0 → b1 → c0 → d and a0 → b1 → c2 → d; generating a separate node at b1, wherein the time sequence of the node c0 and the node c2 is that c0 precedes c2; the time of receiving the file sent by the c2 node by the node d is prior to the time of receiving the file sent by the c0 node; if the time difference between the node d receiving the link generated by the node c2 and the node d receiving the link generated by the node c0 is larger than a second preset monitoring time period, selecting the node d to receive the link corresponding to the node c2;
the total risk index for this flow path is Q = e (a 0 → b 1) f (b 1) + e (b 1 → c 0) f (c 0) + e (b 1 → c 2) f (c 2) + e (c 2 → d) f (d);
if the time difference between the link generated when the node d receives the node c2 and the link generated when the node d receives the node c0 is smaller than a second preset monitoring period, performing summation calculation on the part: [ e (c 2 → d) + e (c 0 → d) ] f (d);
the total risk index for this flow path is Q = e (a 0 → b 1) f (b 1) + e (b 1 → c 0) f (c 0) + e (b 1 → c 2) f (c 2) + [ e (c 2 → d) + e (c 0 → d) ] f (d).
Calculating the total risk index according to nodes and links involved in a circulation path, wherein the nodes relate to risk environments influenced by other non-encrypted files when departments process encrypted files, and the links analyze transmission habits of the departments when different encrypted files are transmitted; a complete circulation path can analyze the overall risk index, and the judged risk node is used as a subsection node which can be monitored in real time in the working process to give an early warning in time.
The receiving time is the time point when the department opens the encrypted file for decryption, but the time point when the non-encrypted file is transmitted to the department; and the sending time is the time point when the department completes encryption and sends the encrypted data.
A scientific and technological project full-period intelligent management system comprises a historical data acquisition module, a transmission coefficient setting module, a process influence degree analysis module, a risk node setting module, a project real-time monitoring module and a node comparison analysis module;
the historical data acquisition module is used for acquiring a circulation path of the encrypted file in the whole period of the historical project, wherein the circulation path comprises departments in which the encrypted file passes and a connection relation between the departments and the department for transmitting the encrypted file; taking departments in which the encrypted files pass as nodes, taking the connection relation between the departments for transmitting the encrypted files as links, and forming a complete circulation path of the encrypted files by the nodes and the links;
the transmission coefficient setting module is used for setting a transmission coefficient on a link;
the process influence degree analysis module is used for analyzing the process influence degree on the circulation path node;
the risk node setting module is used for analyzing influence degrees of different nodes on the circulation path and setting risk nodes;
the project real-time monitoring module is used for monitoring the completed circulation path of the project and analyzing the relationship between the current position and the risk node;
and the node comparison and analysis module is used for comparing and analyzing the actual node of the encrypted file in the historical data before the encrypted file reaches the risk node with the node in the real-time flow path.
The transmission coefficient setting module comprises a node set classifying unit, a time set acquiring unit and a transmission coefficient calculating unit;
the node set classifying unit is used for classifying the nodes on the flow path into a sending node set and a receiving node set;
the time set acquisition unit acquires corresponding sending time and receiving time sets according to the sending node set and the receiving node set;
and the transmission coefficient calculation unit calculates the transmission coefficients corresponding to different link nodes according to the data of the node set classification unit and the time set acquisition unit.
The process influence analysis module comprises a non-encrypted file acquisition unit, a similarity analysis unit and a process influence calculation unit;
the non-encrypted file acquisition unit is used for acquiring a non-encrypted file set when the encrypted files are monitored in a second preset monitoring period;
the similarity analysis unit is used for analyzing the number of the unencrypted files in the unencrypted file set, the similarity of the unencrypted files to the content of the encrypted files is greater than the average similarity, and the interval processing time length between the unencrypted files in the unencrypted file set and the encrypted files;
the process influence degree calculating unit calculates the process influence degree according to the interval processing time length and the proportion of the non-encrypted files when the similarity of the non-encrypted files is larger than the average similarity.
The node comparison and analysis module comprises a risk index analysis unit, a difference node comparison unit and an early warning storage unit;
the risk index analysis unit is used for analyzing that the historical data nodes and the real-time nodes are identical when the nodes subjected to the risk node condition are all the same, and calculating the total risk index;
the difference node comparison unit is used for analyzing the process influence degree of different nodes when the historical data nodes and the real-time nodes are not completely the same when the risk node conditions are met;
and the early warning storage unit performs early warning according to the nodes which do not meet the difference threshold in the risk index analysis unit, performs early warning on the nodes when the process influence degree of different nodes in the difference node comparison unit is greater than or equal to the process influence degree of the risk nodes, and stores paths corresponding to the nodes to the circulation path set to calculate and update the risk nodes in real time.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described above, or equivalents may be substituted for elements thereof. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. A full-period intelligent management method for scientific and technological projects is characterized by comprising the following processes:
acquiring a circulation path of an encrypted file in the whole period of a historical project, wherein the circulation path comprises departments in which the encrypted file passes and a connection relation between the departments and transmitting the encrypted file; taking departments in which the encrypted files pass as nodes, taking the connection relation between the departments for transmitting the encrypted files as a link, and forming a complete circulation path of the encrypted files by the nodes and the link, wherein a transmission coefficient is set on the link;
acquiring different circulation paths corresponding to the encrypted files in the whole period of the historical project as a circulation path set; analyzing the process influence degree on the circulation path node; sorting the process influence degrees of all nodes in the circulation path set from large to small, calculating the average value of the process influence degrees, and setting the nodes corresponding to the process influence degrees larger than the average value in the sorting as risk nodes;
in the implementation of a project full cycle, monitoring a plan flow path of an encrypted file, and when the plan flow path comprises risk nodes, judging whether actual nodes of the encrypted file before the encrypted file reach the risk nodes are the same as nodes before the risk nodes in a flow path set or not;
if the nodes are all the same, calculating a total risk index reaching the risk node, judging the deviation degree of the total risk index and analyzing whether to give an early warning; if the nodes are different, analyzing the process influence degree of the different nodes, and if the process influence degree of all the different nodes is smaller than the process influence degree of the risk node, monitoring in a first preset monitoring time period; and if the process influence degree of different nodes is larger than or equal to the process influence degree of the risk node, early warning is carried out on the node, and the node is stored, and the path corresponding to the node is transmitted to the circulation path set to calculate and update the risk node in real time.
2. The full-period intelligent management method for science and technology projects according to claim 1, wherein the full-period intelligent management method comprises the following steps: setting a transmission coefficient on the link, comprising the following processes:
acquiring nodes [ u, v ] connected by links in a flow path set, wherein u represents a sending node of the link, v represents a receiving node of the link, recording a receiving node set v = { v1, v 2.. Multidot.vi } connected by the same node u through different links, and acquiring a sending time set ti when the sending node u is sent to the receiving node set; recording a sending node set u = { u1, u2, ·, uj } which is connected with the same node v through different links, and acquiring a receiving time set hj after a receiving node v receives an encrypted file sent by the sending node set;
using the formula:
Figure FDA0003842156400000021
calculating transmission coefficients e of different link nodes in the circulation path set; wherein { ti } max is the maximum value in the set ti, { ti } min is the minimum value in the set ti, { hj } max is the maximum value in the set hj, and { hj } min is the minimum value in the set hj; mv is the number of receiving node set v, i is less than or equal to mv, mu is the number of sending node set u, j is less than or equal to mu; if mv and mu are equal to 1, the transmission coefficient is e0=1, if one of mv or mu is 1, the transmission coefficient is e1, and e1 is the reciprocal of mv and mu, which is not 1.
3. The full-period intelligent management method for science and technology projects according to claim 2, wherein the full-period intelligent management method comprises the following steps: the method for analyzing the process influence degree on the circulation path node comprises the following steps:
recording that a set of unencrypted files processed by the node in a second preset monitoring period after the receiving time is P, P = { P1, P2., pk }; acquiring content similarity of the unencrypted file set P and the encrypted files to form a similarity set and an average value T0 of interval processing time lengths corresponding to the encrypted files in the unencrypted file set P; the second preset monitoring time period is greater than the first preset monitoring time period;
calculating a similarity average value W0 in the similarity set, and acquiring the number d of similarities which are greater than the similarity average value W0 in the similarity set W and a non-encrypted file interval processing time length set T1 which corresponds to the similarity average value W in the similarity set W; the interval processing duration represents the influence degree relation of the non-encrypted file on the encrypted file;
using the formula:
Figure FDA0003842156400000022
calculating a process impact magnitude at a node; wherein { T1} min represents the minimum value in the interval processing time length set T1, n is the total number in the non-encrypted file set P, and k is less than or equal to n.
4. A full-period intelligent management method for scientific and technological projects according to claim 3, characterized in that: if the nodes are all the same, calculating the total process influence degree of the reached risk nodes, judging the deviation degree of the total process influence degree and analyzing whether to give an early warning, and the method comprises the following processes:
calculating the total risk index of the arrival risk nodes as follows:
Q=∑ef
when ef is the process influence degree of the first sending node in the flow path formed by the overlapped nodes, the sequential products of the first receiving node and the transmission coefficient are obtained, the sequential product sequence is the sequence generated by the nodes according to time sequence, and the repeated link and the repeated node are only calculated once;
when the same node is connected with a plurality of links in the transmission process of an encrypted file to generate repeated node calculation, the time difference generated by the links needs to be analyzed; if the time difference is greater than or equal to a second preset monitoring time period, calculating the total risk index by using the node corresponding to the first link, and if the time difference is less than the second preset monitoring time period, calculating the total risk index by summing the plurality of links and then calculating the process influence degree corresponding to the node;
calculating a total risk index Q0 in the whole process of the historical project, and calculating a total risk index Q1 of the same node corresponding to the project in implementation of the total risk index Q0; comparing the difference value of the Q0 and the Q1, and if the difference value is larger than or equal to a preset difference value threshold, early warning the project node which is being implemented; and if the difference value is smaller than the preset difference value threshold value, continuing to monitor in the first preset monitoring time period.
5. The full-period intelligent management method for science and technology projects according to claim 4, wherein the full-period intelligent management method comprises the following steps: the receiving time is the time point when the department opens the encrypted file for decryption, but not the time point when the encrypted file is transmitted to the department; and the sending time is the time point when the department completes encryption and sends.
6. The scientific and technological project full-period intelligent management system applied to the scientific and technological project full-period intelligent management method of any one of claims 1 to 5 is characterized by comprising a historical data acquisition module, a transmission coefficient setting module, a process influence degree analysis module, a risk node setting module, a project real-time monitoring module and a node comparison analysis module;
the historical data acquisition module is used for acquiring a circulation path of the encrypted file in the whole period of the historical project, wherein the circulation path comprises departments in which the encrypted file passes and a connection relation between the departments and the department for transmitting the encrypted file; taking departments in which the encrypted files pass as nodes, taking the connection relation between the departments for transmitting the encrypted files as a link, and forming a complete circulation path of the encrypted files by the nodes and the link;
the transmission coefficient setting module is used for setting a transmission coefficient on a link;
the process influence degree analysis module is used for analyzing the process influence degree on the circulation path node;
the risk node setting module is used for analyzing the influence degree of different nodes on the circulation path and setting risk nodes;
the project real-time monitoring module is used for monitoring a flow path of a project completed and analyzing the relation between the current position and a risk node;
the node comparison and analysis module is used for comparing and analyzing the actual node of the encrypted file in the historical data before the encrypted file reaches the risk node with the node in the real-time circulation path.
7. The system according to claim 6, wherein the system comprises: the transmission coefficient setting module comprises a node set classifying unit, a time set acquiring unit and a transmission coefficient calculating unit;
the node set classifying unit is used for classifying the nodes on the flow path into a sending node set and a receiving node set;
the time set acquisition unit acquires corresponding sending time and receiving time sets according to the sending node set and the receiving node set;
and the transmission coefficient calculating unit calculates the transmission coefficients corresponding to different link nodes according to the data of the node set classifying unit and the time set acquiring unit.
8. A science and technology project full-cycle intelligent management system according to claim 7, wherein: the process influence analysis module comprises a non-encrypted file acquisition unit, a similarity analysis unit and a process influence calculation unit;
the non-encrypted file acquisition unit is used for acquiring a non-encrypted file set when encrypted files are monitored in a second preset monitoring period;
the similarity analysis unit is used for analyzing the number of the unencrypted files in the unencrypted file set, the similarity of the unencrypted files to the content of the encrypted files is greater than the average similarity, and the interval processing time length between the unencrypted files in the unencrypted file set and the encrypted files;
and the process influence degree calculating unit calculates the process influence degree according to the interval processing time length and the proportion of the non-encrypted files when the similarity of the non-encrypted files is greater than the average similarity.
9. A science and technology project full-cycle intelligent management system according to claim 8, wherein: the node comparison and analysis module comprises a risk index analysis unit, a difference node comparison unit and an early warning storage unit;
the risk index analysis unit is used for analyzing that the historical data nodes and the real-time nodes are identical when the nodes subjected to the risk node condition are all the same, and calculating the total risk index;
the difference node comparison unit is used for analyzing the process influence degree of different nodes when the historical data nodes and the real-time nodes are not completely the same when the risk node conditions are met;
and the early warning storage unit performs early warning according to the nodes which do not meet the difference threshold in the risk index analysis unit, performs early warning on the nodes when the process influence degree of different nodes in the difference node comparison unit is greater than or equal to the process influence degree of the risk nodes, and stores paths corresponding to the nodes to the circulation path set to calculate and update the risk nodes in real time.
CN202210793331.XA 2022-07-07 2022-07-07 Full-period intelligent management system and method for scientific and technological projects Active CN114861213B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210793331.XA CN114861213B (en) 2022-07-07 2022-07-07 Full-period intelligent management system and method for scientific and technological projects

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210793331.XA CN114861213B (en) 2022-07-07 2022-07-07 Full-period intelligent management system and method for scientific and technological projects

Publications (2)

Publication Number Publication Date
CN114861213A CN114861213A (en) 2022-08-05
CN114861213B true CN114861213B (en) 2022-10-28

Family

ID=82625880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210793331.XA Active CN114861213B (en) 2022-07-07 2022-07-07 Full-period intelligent management system and method for scientific and technological projects

Country Status (1)

Country Link
CN (1) CN114861213B (en)

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070067845A1 (en) * 2005-09-22 2007-03-22 Alcatel Application of cut-sets to network interdependency security risk assessment
KR102230394B1 (en) * 2014-09-24 2021-03-22 삼성에스디에스 주식회사 Method and apparatus for logistics risk prediction
CN108647840A (en) * 2018-06-28 2018-10-12 安吉汽车物流股份有限公司 A kind of Path mining method and device, storage medium, server
CN109190051B (en) * 2018-11-29 2020-11-03 广东省科技基础条件平台中心 User behavior analysis method and resource recommendation method based on analysis method
US11184385B2 (en) * 2018-12-03 2021-11-23 Accenture Global Solutions Limited Generating attack graphs in agile security platforms
CN110062301B (en) * 2019-01-23 2021-12-14 中通服咨询设计研究院有限公司 Routing method, device, equipment and storage medium
CN111666186B (en) * 2020-04-26 2023-09-15 杭州数梦工场科技有限公司 Method and device for detecting data access abnormality, storage medium and computer equipment
WO2022059146A1 (en) * 2020-09-17 2022-03-24 日本電信電話株式会社 Risk value calculation device, risk value calculation method, and risk value calculation program
CN112257175B (en) * 2020-10-19 2023-09-22 北京交通大学 Risk propagation path prediction method based on improved SIR model
CN114117311B (en) * 2022-01-25 2022-04-19 深圳红途科技有限公司 Data access risk detection method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN114861213A (en) 2022-08-05

Similar Documents

Publication Publication Date Title
Pan et al. Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data
CN108600009B (en) Network alarm root positioning method based on alarm data analysis
Ma et al. {Jump-Starting} multivariate time series anomaly detection for online service systems
JP6827266B2 (en) Detection program, detection method and detection device
Zhang et al. Time series anomaly detection for smart grids: A survey
Tran et al. Anomaly detection using long short term memory networks and its applications in supply chain management
CN106371975A (en) Automatic operation and maintenance early-warning method and system
CN113687972B (en) Processing method, device, equipment and storage medium for abnormal data of business system
CN114819862A (en) Cold-chain logistics tracing service method, system and storage medium
US20230118175A1 (en) Event analysis in an electric power system
Samaniego et al. On estimating population characteristics from record‐breaking observations II. Nonparametric results
CN114861213B (en) Full-period intelligent management system and method for scientific and technological projects
Zhang et al. Transition permutation entropy and transition dissimilarity measure: Efficient tools for fault detection of railway vehicle systems
CN112232843B (en) Drug supervision system and method based on big data technology
CN113111095B (en) Intelligent information management method and system
CN111339050A (en) Centralized security audit method and system based on big data platform
Sajan et al. Realistic synchrophasor data generation for anomaly detection and event classification
Jaison et al. A survey on traceability in food safety system using blockchain
Hegedűs et al. Towards building method level maintainability models based on expert evaluations
Hussain et al. An improved industrial control system device logs processing method for process-based anomaly detection
Park et al. Statistical process control‐based intrusion detection and monitoring
González Nonparametric models and bayesian networks: applications to anomaly detection
Mohammed et al. PWIDB: A framework for learning to classify imbalanced data streams with incremental data re-balancing technique
Ranaweera et al. Anomaly detection in complex trading systems
CN114969831B (en) Financial data real-time analysis device and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant