Website data security system based on association analysis of database activity and web access

A technology for databases and websites, which can be used in other database retrieval and computing redundancy for data error detection, digital data protection, etc., and can solve the problem of being unable to know whether the website has been attacked or invaded.

Inactive Publication Date: 2014-11-12
朱烨 +1
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although various manufacturers claim that such protection is sufficiently secure, the reality is that there will always be new vulnerabilities / new attack methods emerging that can escape the detection and protection of these systems. As far as the customer is concerned, he has no way of knowing whether my website has been attacked or hacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website data security system based on association analysis of database activity and web access
  • Website data security system based on association analysis of database activity and web access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The specific implementation of this system is as follows;

[0015] 1. Deploy the data acquisition component of the system of the present invention in the same network area where the application layer of the website is located, including deploying the plug-in module on the Web server where the application layer is located. The plug-in should implement the following functions: For the mainstream web site application layer based on J2EE / PHP, intercept the identification information that forwards the URL request to a background processing entry, and record all the processing threads during the entire processing period. The SQL operation to invoke. The overall component should realize the following data collection function: record and upload the information intercepted at the network layer and the information obtained directly from the log on the Web service (such as Apache / Tomcat) to the correlation engine. The meta information used for association includes: Web request an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

At present, web security protection aims to discover and prevent attack and suspicious actions in time, but in reality, there are still new bug/attack manners can escape from system detection and protection. Webmasters most concern about security of core data; in other words, how to prevent data leakage/ data tampering and corruption is the big problem which is in great need of being solved in the field of security protection. The website data security system adopts the database activity monitoring technology which is applied to the field front, realizes association and statistical analysis of web requests and responses, corresponding database access and feedback results to acquire a request mode set of normal access to the core data to the website, and further, checks the subsequent web access according to a rule generated by the set so as to discover suspicious data leakage/tampering actions, thus the difficult problem about website data security protection is solved thoroughly through a data security data backup component.

Description

technical field [0001] The technical field of the present invention is the field of website security protection and data security protection in the field of computer security. Background technique [0002] With the rapid development of Internet applications, various Web sites are growing rapidly at a geometric progression rate, but the endless hacker attacks / DDOS attacks pose a huge threat to the usability and security of Web sites. The current mainstream security protection includes various types of systems: intrusion detection system, web application firewall, remote security scanning, etc. All of these systems / services focus on solving one problem: to detect and prevent attacks and suspicious behavior in time. Although various manufacturers claim that such protection is sufficiently secure, the reality is that there will always be new vulnerabilities / new attack methods emerging that can escape the detection and protection of these systems. As far as the customer is conc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50G06F11/14
CPCG06F21/62G06F16/958G06F21/552G06F21/554
Inventor 朱烨袁晓东
Owner 朱烨
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products