Database auditing method based on bridged mode

A database and pattern technology, applied in the direction of electrical digital data processing, special data processing applications, calculations, etc., can solve problems such as the inability to audit databases, and achieve the effect of improving data security

Inactive Publication Date: 2013-12-25
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional bastion host adopts the bypass deployment method, such as figure 1 As shown, in order to specify that only the bastion host is allowed to connect to the remote server for operation and maintenance management operations, it must be implemented with the help of the access control list and port forwarding of routers and switches. Once these rules fail, the remote server will be in a dangerous state
Moreover, traditional bastion hosts can only operate and maintain servers and network devices, and cannot audit databases.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database auditing method based on bridged mode
  • Database auditing method based on bridged mode

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0025] as attached figure 2 As shown, a kind of database auditing method based on bridge pattern of the present invention, specific implementation is as follows:

[0026] 1. The network port of the bastion machine is configured as a bridge mode, and is deployed on the intermediate path between the local device and the remote database server;

[0027] 2. On the local device, log in to the management system of the bastion host through a browser, and add information such as the IP address, port, database user name, and password of the remote database server;

[0028] 3. The management system of the bastion host can create a virtual desktop connection of the added remote database server through the protocol proxy mode, and the operation and maintenance user can connect to the remote database server through the special database management tool 21 to perform related operation and maintenance management operations;

[0029] 4. After the user logs in the special database management ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of database auditing, in particular to a database auditing method based on a bridged mode. According to the database auditing method, a bastion host establishes the connection of a local device and a remote database server through the bridged mode, meanwhile, the bastion host analyzes an SQL sentence executed by a user according to a security policy, when the SQL sentence belongs to normal database operation, the user can execute the operation continuously, when the SQL sequence comprises high-risk operation fields, the user is forbidden to continue executing, and a prompt is given out. According to the database auditing method based on the bridged mode, the bastion host makes the security policy so as to audit the operation to the remote database server on the local device by an operational user, and the data safety of a remote kernel database is improved.

Description

technical field [0001] The invention relates to the technical field of database auditing, in particular to a bridge mode-based database auditing method. Background technique [0002] The bastion machine is an operation and maintenance security audit product for operation and maintenance users in large data centers. The operation and maintenance users can complete the operation and maintenance management of a large number of device accounts through the centralized management and authorization management functions of the bastion machine. At the same time, the bastion machine can Audit the operation process of operation and maintenance users. In the traditional operation and maintenance mode, the operation and maintenance user directly connects to the remote server through the local device to perform operation and maintenance management operations. The entire operation process is invisible and uncontrollable, and there are great risks; the bastion machine is used for operation ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08G06F17/30
Inventor 张和超
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products