Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Defense method for database dragging and collision attack on database layer

A database and database dragging technology, which is applied in the defense field of database dragging and database stuffing attacks against the database layer, can solve problems such as database protection, and achieve the effect of ensuring security.

Inactive Publication Date: 2018-01-09
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The traditional methods of defense against database dragging and database collision are hierarchical management of passwords, regular password modification, website vulnerability detection, real-time monitoring of website hanging horses and real-time monitoring of website tampering, etc., but these methods do not protect the database

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention are clearly and completely described. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. For example, based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] The invention relates to a method for defending against database layer dragging and credential stuffing attacks, and the method includes the following steps.

[0025] Step 1.1: Configure the background defense module for phishing attacks in the database.

[0026] Step 1.2: Enter the SQL request.

[0027] Step 1.3: The background defense module judges according to the return value of the SQL request; if it meets the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a defense method for database dragging and collision attack on a database layer. The method includes the steps that a backstage defense module for enticing attack is allocatedin a database, an SQL request is input, and the backstage defense module conducts judgement according to a feedback value of the SQL request; if an attack condition is satisfied, blockage is carriedout; otherwise, the the access is normal, the request is completed and data is returned back to finish the whole process. According to the method, by means of the backstage defense module for enticingthe attack, during actual operation, the input SQL request is responded, whether or not the current SQL is aggressive can be judged, the aggressive SQL is blocked, and data is returned back to normalaccess. According to the method, by setting a backdoor structure on the database directly, the database dragging and collision behaviors of an attacker can be dug out and found out more proactively,intelligently and efficiently to ensure safety of the database.

Description

technical field [0001] The present invention relates to the transmission of digital information, such as the technical field of telegram communication, and in particular to a method for defending against database layer dragging and credentialing attacks in terms of network technology and database security protection technology. Background technique [0002] With the rapid development of the Internet and mobile Internet, more and more applications are connected to the network, making more and more people appreciate the convenience it brings, and people's work, life, and entertainment are gradually inseparable from the network. [0003] However, most of the network application services that people use are based on the web. These web systems contain a large amount of user data. Once the data is leaked, it will not only bring huge losses to the user's spirit and economy, but also to the service provider. Negative impact on operators. This mainly includes credential stuffing att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/62
Inventor 王飞飞范渊刘博龙文洁
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products