Dblink monitoring method and system
A monitoring system and monitoring module technology, applied in the database field, can solve the problems of heavy workload, cumbersome operation, inability to understand the use and security of Dblink, etc., to reduce losses, ensure data security, and reduce professional ability requirements.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] In S1, JDBC drivers include: JDBC-ODBC bridge driver, JDBC-local driver, JDBC network driver and native protocol pure JDBC driver. Different JDBC drivers can be used to access different databases, and the specific access method can adopt existing technologies.
[0042] The Dblink obtained in S2 of the present invention is a Dblink whitelist corresponding to the target database to be queried, and its content can be set by the operation and maintenance personnel of the corresponding database.
[0043] In S3, by calling the Statement() interface of JDBC, the database to be queried is instantiated, and the executeQuery() method is executed to obtain the return value of sql on Dblink, which is the Dblink information. The Statement interface is used to send simple SQL statements without parameters to the database based on the established database connection. executeQuery is one of the methods for executing SQL statements provided by the Statement interface, which is used to gener...
Embodiment 2
[0047] In the Dblink monitoring method of this embodiment, S3 further includes: setting a Dblink blacklist corresponding to different databases to be accessed, judging whether the suspected illegal Dblink is included in the Dblink blacklist, if it is, the monitoring is ended, and the alarm information is output; Step S4;
[0048] In S4, for Dblink that is still not allowed to access the database to be queried in consideration of actual application needs, the corresponding Dblink is added to the blacklist. For some illegal Dblink, the blacklist simplifies the identification and judgment process, which can reduce the data redundancy during Dblink monitoring and alarm processing.
Embodiment 3
[0050] A Dblink monitoring system includes:
[0051] The database connection establishment module establishes a connection with the database to be queried through the JDBC driver to obtain Dblink information;
[0052] Database connection whitelist obtaining module, to obtain the Dblink whitelist of the database to be queried;
[0053] The Dblink monitoring module determines whether the currently obtained Dblink is included in the Dblink whitelist, if it is, the monitoring is ended, if otherwise, the current Dblink is set as a suspected illegal Dblink, the access permission of the Dblink is closed, and an alarm message is generated;
[0054] The alarm processing module, for the Dblink corresponding to the alarm information, determines whether it is allowed to access the database to be queried due to actual application needs. If it is not allowed, the corresponding Dblink is defined as an illegal access link, the alarm information is output, and the monitoring ends. The corresponding Db...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com


