Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for detecting database tampering behavior

A database and behavior technology, applied in the direction of database design/maintenance, digital data processing, computer security devices, etc., can solve the problem of low database security protection, and achieve the effect of improving security and applicability

Active Publication Date: 2017-10-27
SANGFOR TECH INC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, the defense against these problems usually relies on the security mechanism of the database itself, but the existing database products only have a small amount of security configuration functions, which cannot meet the needs of database security protection related to business needs, so The security of the existing database security protection is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting database tampering behavior
  • Method and device for detecting database tampering behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to solve the problem of insufficient security mentioned above, a method for detecting database tampering is proposed. The method relies entirely on a computer program that can run on a computer system based on the von Neumann architecture. The computer system may be a database server, a web server, a computer device for receiving a database access request at the front end of the database server, a gateway device or a network device with a gateway function, etc.

[0039] In this example, if figure 1 As shown, the method includes:

[0040] Step S102: Receive a network access request.

[0041] Step S104: identifying the database access request, and extracting the SQL statement in the database access request.

[0042] In this embodiment, the method can be run on a gateway device in a web server room. The web server in the web server room is in an intranet environment in the computer room and is connected to an external network through the gateway device. The ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting a database tampering behavior. The method comprises the steps of receiving a network access request; identifying a database access request, and extracting an SQL (structured query language) sentence in the database access request; extracting an instruction object, an instruction type and / or an instruction condition of the SQL sentence; obtaining a present database access rule; judging whether the instruction object, the instruction type and / or the instruction condition which are obtained by extraction are matched with the database access rule, and if the instruction object, the instruction type and / or the instruction condition which are obtained by extraction are matched with the database access rule, determining that the network access request is the tampering behavior. Furthermore, the invention also provides a device for detecting the database tampering behavior. According to the method and the device for detecting the database tampering behavior, the security can be improved.

Description

technical field [0001] The invention relates to the technical field of terminals, in particular to a method and device for detecting tampering behavior of a database. Background technique [0002] In the current web protection, with the advancement of the global informatization process, network risk has become an important factor hindering the informatization process, and network security issues have become the focus of public attention. Among them, database security risks are particularly concerned, because database security is directly related to the information security of enterprises and users. Database security mainly involves: abuse of excessive privileges, abuse of legal privileges, privilege escalation, SQL injection, data leakage, etc. [0003] In the existing technology, the defense against these problems usually relies on the security mechanism of the database itself, but the existing database products only have a small amount of security configuration functions,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30G06F21/56
CPCG06F16/21G06F16/2433G06F21/554
Inventor 曾加良
Owner SANGFOR TECH INC