Research Article

A Sensitive File Abnormal Access Detection Method Based on Application Classification

Table 2

Sensitive file protection strategy scenarios based on preset strategy.

Serial numberFile Application UID Accessible directories Access permission and containment

1F1 385820d(3, 7)0, do not include
2F2 385820d(3, 4)1, include
3F3 678643d(6, 7)1, include