Method and device for detecting database tampering behavior
A database and behavior technology, applied in the direction of database design/maintenance, digital data processing, computer security devices, etc., can solve the problem of low database security protection, and achieve the effect of improving security and applicability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] In order to solve the problem of insufficient security mentioned above, a method for detecting database tampering is proposed. The method relies entirely on a computer program that can run on a computer system based on the von Neumann architecture. The computer system may be a database server, a web server, a computer device for receiving a database access request at the front end of the database server, a gateway device or a network device with a gateway function, etc.
[0039] In this example, if figure 1 As shown, the method includes:
[0040] Step S102: Receive a network access request.
[0041] Step S104: identifying the database access request, and extracting the SQL statement in the database access request.
[0042] In this embodiment, the method can be run on a gateway device in a web server room. The web server in the web server room is in an intranet environment in the computer room and is connected to an external network through the gateway device. The ne...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

