Method and equipment for detecting deviant behavior of database

A database and behavioral technology, applied in the field of communication, can solve the problems of high false negative rate and difficulty in comprehensive coverage of database abnormal behavior detection, and achieve the effect of improving efficiency

Inactive Publication Date: 2013-02-06
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method and equipment for detecting abnormal behaviors of databases, so as to solve the problems in the prior art that it is difficult to fully cover abnormal behaviors detection of databases and the rate of false positives is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for detecting deviant behavior of database
  • Method and equipment for detecting deviant behavior of database
  • Method and equipment for detecting deviant behavior of database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, the described embodiments are part of the embodiments of the present invention , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0040] figure 1 It is a flow chart of Embodiment 1 of the method for detecting abnormal database behavior in the present invention, as shown in figure 1 As shown, the method of this embodiment may include:

[0041] Step 101, collecting SQL statements corresponding to the normal behavior of the database.

[0042] In step 101, there are many ways to collect the SQL statements corresponding t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and equipment for detecting the deviant behavior of a database. The method comprises the following steps: collecting SQL (Structured Query Language) sentences corresponding to the normal behavior of the database; carrying out SQL sentence keyword analysis, SQL built-in function analysis, SQL expansion storage process analysis and SQL sentence sensitive region analysis of the SQL sentences; generating a white list database; and adopting a formula V=f1*w1+f2*w2+f3*w3+f4*w4 to obtain an analysis result V of the database, and if the analysis result V is larger than or equal to a preset value, determining the behavior of the database is deviant. The method and the equipment for detecting the deviant behavior of the database, which are provided by the invention, can comprehensively detect the database, avoid omission and improve the efficiency of detecting the deviant behavior of the database.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and equipment for detecting abnormal behavior of a database. Background technique [0002] With the widespread application of system firewalls and hardware firewalls, system-level risks in network security have been greatly reduced, and most security vulnerabilities cannot be exploited due to network inaccessibility. At present, the biggest risk of network security lies in specific applications rather than in on the operating system. The most important information assets of the enterprise are stored in the database, and its importance is self-evident. Therefore, the database is often the focus of hacker attacks. Structured query language SQL injection attacks and the current prevalent target of dragging databases in the network are all core databases. Therefore, it is necessary to strengthen the protection of the database, and distinguish the normal database oper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 周振李志昕
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products