Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Database security protection method and device

A security protection and database technology, applied in the network field, can solve the problem of low database security

Inactive Publication Date: 2012-05-30
BEIJING VENUS INFORMATION TECH +1
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a database security protection method and device, which solves the problem of low database security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database security protection method and device
  • Database security protection method and device
  • Database security protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to solve the problem of database security, the present invention provides a method that can realize abnormal detection of various database operation behaviors, so that abnormal database operation behaviors can be found from a large number of database operation events, and the protection of the database system is improved. ability.

[0043] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0044] The embodiment of the present invention proposes a database security protection method and device for detecting abnormal operation behavior in the database system. The normal behavior model of various operations in the database environment, and use this model as a standard to detect abnormal database operations. At the same t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a database security protection method and device, relates to the technical field of networks, and solves the problem of low security of a database. The method comprises the following steps of: receiving and resolving a message, and extracting database operation information in the message; carrying out statistics on the database operation information; and generating a normal behavioral model according to a statistical result, and detecting whether the database operation is abnormal or not according to the normal behavioral model. The technical scheme provided by the invention is suitable for database security protection.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a database security protection method and device. Background technique [0002] With the development of informatization, the use of various databases such as DB2, Oracle, MySQL, etc. has penetrated more and more into all walks of life. Especially in industries such as finance and information, databases are used to store a large amount of important data, and the auditing and protection of various data has become a problem that must be considered by network security products. [0003] Various current network security products, such as firewalls and intrusion detection systems, can only detect and protect against external attacks or potential safety hazards, but cannot effectively detect and protect against illegal operations by internal personnel in the database. As for the common database business audit system, it can only extract the operation information of the users in the cu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24G06F17/30
Inventor 孙海波
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products