Deep recovery method for database content

A database, deep technology, applied in digital data protection, electronic digital data processing, special data processing applications, etc., to achieve the effect of ensuring security and effectively monitoring access behavior

Active Publication Date: 2012-09-26
西安交大捷普网络科技有限公司
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The technical problem solved by the present invention is to provide a deep restoration method of database content to overcome the problem that the important information of the database is changed at will and there is no evidence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Deep recovery method for database content
  • Deep recovery method for database content
  • Deep recovery method for database content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0024] see figure 1 , the invention is realized through the following steps:

[0025] (1), preprocessing stage:

[0026] Set the network card to promiscuous mode, and use Libpcap to capture packets cyclically. Libpcap uses zero-copy technology to map user memory to the kernel. Stream write file, if there is no new data within 30 seconds for this quadruple link, the write stream file ends, and the stream file is closed, and the protocol analysis module is notified that the restore stream file has been generated, and the stream file can be read and analyzed For each row of data, obtain whether there is a database operation statement. If there is new data within 30 seconds, first judge whether the quadruple has created a file. If it has created a file, append the data to the back of the created file. If not created file, create a new file. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a deep recovery method for the database content, which is realized by the following steps of: (1) pre-processing stage; and (2) matching stage: after the pro-processing is finished, notifying a protocol analysis module, reading a built database operation stream file by a process, reading the file line by line, invoking a kmt algorithm, and analyzing the real database operation in the line. According to the deep recovery method, a database operation process can be truly recovered, a database access behavior can be effectively monitored, the safe state of a database system is accurately mastered, events which violate a database security policy are found in time and are alarmed and recorded in real time, security incident positioning analysis and afterward tracing and evidence taking are convenient to carry out so as to guarantee the security of the database, and whether violated keywords exist is analyzed on the existing basis after the database content is completely recovered.

Description

Technical field: [0001] The invention relates to the technical field of information auditing, in particular to a method for deep restoration of database content. Background technique: [0002] Databases are the most strategic assets in any business and public security, and usually store important business partner and customer information, which need to be protected to prevent competitors and other illegal access. The rapid development of the Internet has made enterprises The value and accessibility of database information have been improved. At the same time, database information assets are facing severe challenges, and security is facing many problems. Due to computer software and hardware failures, hacker intrusions, virus attacks, etc., the database system will not operate normally. , data loss, etc. However, the higher risk comes from within the enterprise. Operations such as illegal access and malicious tampering by internal personnel in the enterprise pose even more ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/00G06F21/60
Inventor 陈晓兵周静何建锋
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products