Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security analysis method and system for database

A database and security technology, applied in the database field, achieves the effect of facilitating horizontal expansion, solving capacity bottlenecks, and reducing hardware costs

Inactive Publication Date: 2017-01-11
ALIBABA GRP HLDG LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] One of the technical problems solved by the present invention is to provide a database security analysis method and system, which solves the security analysis problem in large-scale database clusters or cloud computing database scenarios while reducing hardware costs and personnel costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security analysis method and system for database
  • Security analysis method and system for database
  • Security analysis method and system for database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] Before discussing the exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although the flowcharts describe operations as sequential processing, many of the operations may be performed in parallel, concurrently, or simultaneously. In addition, the order of operations can be rearranged. The process may be terminated when its operations are complete, but may also have additional steps not included in the figure. The processing may correspond to a method, function, procedure, subroutine, subroutine, or the like.

[0062] The computer equipment includes user equipment and network equipment. Wherein, the user equipment includes, but is not limited to, computers, smart phones, PDAs, etc.; Or a cloud composed of network servers, among them, cloud computing is a kind of distributed computing, a super virtual computer composed of a group of loosely coupled computer sets. Whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security analysis method and system for a database. The method comprises the steps of monitoring an access stream of the database in the database; on the basis of the monitored access stream of the database, analyzing to obtain an analysis parameter for the security analysis of the database; sending a to-be-analyzed data packet to a distributed message queue, wherein the to-be-analyzed data packet comprises the analysis data; and obtaining a security analysis result of the database through the to-be-analyzed data packet in the distributed message queue. According to the method and the system, the hardware cost and personnel cost are reduced, and the security analysis problem in a large-scale database cluster or cloud computing database scene is solved.

Description

technical field [0001] The invention relates to the technical field of databases, in particular to a database security analysis method and system. Background technique [0002] The purpose of analyzing the security of the database is to discover illegal database access behaviors to ensure the security of the database. At present, the security analysis method of the database is as follows: performing access traffic splitting or port mirroring on each database network switch, and then reorganizing or converging the access traffic to obtain a copy of the database access traffic; analyzing the access traffic to obtain SQL (StructuredQuery Language, structured query language) statement and execution result information; analyze the SQL statement and execution result information according to predetermined rules, generate analysis reports and generate alarms. The entire processing process is completed centrally on a hardware device for database security audit. [0003] The current...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F17/30
CPCG06F21/577G06F16/252G06F2221/034
Inventor 张园超肖磊方海峰
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products