Detecting system for suspect DBMS intrusion and detecting method thereof

An intrusion detection system and detection method technology, applied in transmission systems, digital transmission systems, special data processing applications, etc., can solve problems such as multiple deletions and complex confrontation techniques, and achieve the effect of preventing theft by malicious code

Active Publication Date: 2011-06-15
北京神舟航天软件技术股份有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 3. What is more dangerous is that in some special cases, the enemy may even intentionally modify the original standard DBMS according to the purpose of purchase, and inject various malicious codes, such as malicious addition, deletion, and modification. delete etc.
[0007] After years of development, many achievements have been made in identity authentication technology, access control technology, information flow control technology, encryption control technology, reasoning control technology, auditing technology, etc. in the traditional database security field, but the existing technologies focus on improving DBMS The ability to resist external attacks, how to improve the ability of the application system to resist malicious DBMS has not been studied in depth
Obviously, the anti-malicious DBMS technology will be more complicated, because the DBMS is responsible for managing the target data resources, it understands the structure and semantics of the target data resources, can perform any operation on the target data, and can also return arbitrary results to the user's request

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detecting system for suspect DBMS intrusion and detecting method thereof
  • Detecting system for suspect DBMS intrusion and detecting method thereof
  • Detecting system for suspect DBMS intrusion and detecting method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0052] The invention is an untrustworthy DBMS malicious intrusion detection system and method.

[0053] Such as figure 1 , the present invention introduces a database intrusion detection system (DBIDS) between the DBMS and the database application to intercept the message communication between the DBMS and the application, so as to detect malicious behaviors and protect key data. DBIDS is divided into two parts, the client and the server. The client is mainly responsible for intercepting and forwarding database messages, and the server is responsible for client identity authentication, analysis of communication protocols, transparent data encryption and decryption, and malicious database intrusion detection functions.

[0054] DBIDS uses data forwarding to intercept database communications. When setting the server address on the database client, use the address and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a detecting system for suspect DBMS intrusion and a detecting method thereof. The detecting method introduces a database intrusion detecting system between DBMS and database application, so as to intercept information communication between the DBMS and the application to detect malicious actions and protect critical data. The database intrusion detecting system comprises two units, including a client and a server; the client is used for intercepting and forwarding database information; the server manages suspect DBMS and credible DBMS synchronously; the credible DBMS stores important metadata information of the system to be taken as mirror image database of the suspect DBMS; the server manages client identity authentication, analyzes communication protocol, realizes transparent data encryption and decryption, and malicious database intrusion detection. The detecting system of the invention has the advantages that data insertion, revision and deletion operations initiated by malice codes in a data managing system is automatically found; a database damaged by malice codes is resumed; and critical data is encrypted, thereby preventing malice codes from stealing the critical data.

Description

technical field [0001] The invention relates to an untrustworthy DBMS malicious intrusion detection system and method, and belongs to the technical field of database security intrusion detection. Background technique [0002] In modern computing systems, databases hold the core information resources of the system. Therefore, the database is often the key attack target of hackers and commercial espionage. Due to the late start of database technology in our country, the current database product DBMS (database management system) is basically monopolized by foreign manufacturers, resulting in a serious situation of "core technology hollowing out" and "key technology and products being controlled by others". There may be "backdoors" or even "malicious codes" injected into foreign products to steal or destroy precious data resources. Of course, the most ideal way to solve this problem is to use all domestic database products in the key application systems. This is indeed the dir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26G06F17/30H04L29/06
Inventor 赵明智何清法顾云苏
Owner 北京神舟航天软件技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products