Detecting system for suspect DBMS intrusion and detecting method thereof
An intrusion detection system and detection method technology, applied in transmission systems, digital transmission systems, special data processing applications, etc., can solve problems such as multiple deletions and complex confrontation techniques, and achieve the effect of preventing theft by malicious code
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] The present invention will be described in detail below in conjunction with the accompanying drawings.
[0052] The invention is an untrustworthy DBMS malicious intrusion detection system and method.
[0053] Such as figure 1 , the present invention introduces a database intrusion detection system (DBIDS) between the DBMS and the database application to intercept the message communication between the DBMS and the application, so as to detect malicious behaviors and protect key data. DBIDS is divided into two parts, the client and the server. The client is mainly responsible for intercepting and forwarding database messages, and the server is responsible for client identity authentication, analysis of communication protocols, transparent data encryption and decryption, and malicious database intrusion detection functions.
[0054] DBIDS uses data forwarding to intercept database communications. When setting the server address on the database client, use the address and...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com