Method and device for automatically detecting illegal data modification behavior

A data modification and illegal modification technology, which is applied in the computer field, can solve the problems of wrong logic and poor identification ability of illegal operation channels, cannot completely eliminate illegal operations, and the method of directly modifying the database by the client does not have preventive capabilities, etc., to achieve accurate and efficient identification and warning effects

Active Publication Date: 2017-02-15
BEIJING RES CENT FOR INFORMATION TECH & AGRI
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The implementation of security measures in advance cannot completely rule out illegal operations. There are two main reasons: the system design itself is difficult to achieve zero defects, and the system may have various loopholes in the programming implementation process; there is no defense against directly modifying the database through the client ability
Although post-event data audits can capture all data changes and provide early warnings for certain specific behaviors, this method is mainly aimed at the data itself and does not consider the logic of business data and data operation behavior. Therefore, for error logic and illegal operations Poor identification of pathways

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for automatically detecting illegal data modification behavior
  • Method and device for automatically detecting illegal data modification behavior
  • Method and device for automatically detecting illegal data modification behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] figure 1 It is a schematic flowchart of the method for automatically detecting illegal data modification provided by the present invention. see figure 1 , the method includes:

[0037] S1: Read the data modification behavior data with data modification behavior in the preset detection database;

[0038] S2: comparing the data modif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for automatically detecting an illegal data modification behavior. The method comprises the steps of extracting database operation information from a business system database and generating a detection database; carrying out illegal modification behavior detection on to-be-detected data in the detection database according to a preset detection rule; and marking the data suspected to be illegally modified and further generating information of informing a manager. According to the detection method, the legality of the data modification behavior can be accurately and efficiently identified and pre-warned by combining the detection rule stored in the detection database and data access connection information on the basis of a logic relationship in the business system database.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to an automatic detection method and device for illegal data modification behavior. Background technique [0002] Data security is crucial to the operation of business systems. The database is not only the basis for the operation of the business system, but also an important asset of the enterprise and the management department. Therefore, it is very important to maintain the security of the database and ensure the integrity and logical consistency of the data. However, driven by interests, there may be behaviors of concealing or falsifying data by illegally modifying business data. Illegal modification of database data may cause damage to the logical integrity and consistency of system data, leading to errors in system operation or output of wrong decision-making information, resulting in information deviation and information asymmetry, and ultimately the guidance and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 郝星耀潘瑜春高秉博李晓岚李淑华
Owner BEIJING RES CENT FOR INFORMATION TECH & AGRI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products