Research Article
A Sensitive File Abnormal Access Detection Method Based on Application Classification
Table 2
Sensitive file protection strategy scenarios based on preset strategy.
| Serial number | File | Application UID | Accessible directories | Access permission and containment |
| 1 | F1 | 385820 | d(3, 7) | 0, do not include | 2 | F2 | 385820 | d(3, 4) | 1, include | 3 | F3 | 678643 | d(6, 7) | 1, include |
|
|