首页>
外国专利>
Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs
Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs
展开▼
机译:在发生数据渗漏时或发生数据渗漏后检测数据渗漏
展开▼
页面导航
摘要
著录项
相似文献
摘要
A device may identify exfiltration information to be used to detect data exfiltration. The exfiltration information may be associated with a file being tested to determine whether the file exfiltrates data. The exfiltration information may include a resource identifier that identifies a resource to be used to detect the data exfiltration. The device may determine that the resource, to be used to detect the data exfiltration, has been accessed. The device may identify, based on determining that the resource has been accessed, the file associated with the exfiltration information. The device may perform an action, associated with the file, to counteract the data exfiltration based on determining that the resource has been accessed and based on identifying the file.
展开▼