Database security auditing method

A security auditing and database technology, applied in the field of database security, can solve problems such as artificial intelligence auditing, inability to manage database permissions, and achieve the effect of preventing SQL injection

Inactive Publication Date: 2015-04-01
NANJING DUNLEI NETWORK TECH CO LTD
View PDF4 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Aiming at the deficiencies of the prior art, the purpose of the present invention is to provide a database security audit method to solve the problems in the prior art that the database cannot be managed, artificial intelligence audit, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Database network communication data collection: use bypass monitoring to capture data packets in the specified network, perform IP fragment reassembly and TCP session reassembly, filter out data packets not related to database protocol flow, and extract protocol packets related to database protocol flow The data.

[0035] Database network communication protocol analysis: extract the data in the protocol package according to the data package type and use the corresponding database protocol analysis module to restore the login and logout of the database user and the SQL request operation during the entire session, and perform lexical analysis on the SQL statement parsed by the database protocol , Grammatical analysis to form audit records in a unified format, and store them in the audit log library.

[0036] Self-learning of audit rules based on artificial intelligence algorithms: use association rule mining algorithms to construct normal behavior patterns and abnormal be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a database security auditing method which comprises the following steps: acquiring database network communication data; parsing a database network communication protocol; carrying out self-learning digging on audit rules; detecting database risk event invasion; evaluating database user permissions; tracking the three-layer correlation of a primary user. The database security auditing method can be used for auditing and monitoring a database in real time, so that the automatic assessment, audit, protection and invasion detection operation can be realized; the method can be used for preventing, recording and tracking the complete database operation behavior so as to help an administrator to find out the internal safety problems of unauthorized use, privilege abuse, permission theft and the like of the database in time; furthermore, after the method is used, the outside attacks such as SQL (structured query language) injection and the like can be avoided.

Description

technical field [0001] The invention relates to the field of database security, in particular to a database security audit method. Background technique [0002] In November 2009, IBM acquired the database security software Guardium, and released the upgraded product InfoSphere Guardium 8 for the first time in 2010. The functions provided by Guardium include database scanning and evaluation, detection of database transactions, tracking of user activities, monitoring of sensitive data, auditing of user behavior, automatic blocking of illegal access, complex but flexible audit reports and other functions. [0003] Imperva SecureSphere is a data security and compliance solution launched by Imperva, a global data security leader. Imperva supports three deployment methods: offline network monitoring, transparent online protection, and agent-based monitoring. The main functions provided are: 1) Database assessment, detecting database vulnerabilities and repairing them in a virtua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/55
CPCG06F16/21G06F21/6218
Inventor 罗平
Owner NANJING DUNLEI NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products