Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting database risk, server and storage medium

A database and risk technology, applied in electrical components, transmission systems, etc., can solve problems such as inability to deal with data leakage, inability to deal with mutated attack methods, inability to deal with failure of database update and protection failure, etc., to improve security and improve efficiency and accuracy, the effect of avoiding data leakage

Active Publication Date: 2018-04-06
SANGFOR TECH INC
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main purpose of the present invention is to detect the risky access to the database by calculating the target matching degree between each target behavior feature and the preset baseline behavior feature, so as to solve the problem of misjudgment in the prior art that relies on feature recognition and cannot cope with mutation attacks method, unable to deal with the failure of protection caused by untimely database updates, and unable to deal with the technical problems of data leakage caused by risky behaviors of internal personnel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting database risk, server and storage medium
  • Method for detecting database risk, server and storage medium
  • Method for detecting database risk, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] The solution of the embodiment of the present invention is mainly: by acquiring the target user’s target access records, extracting multiple target behavior features from the target access records, and calculating the target matching degree between each target behavior feature and the preset baseline behavior feature , using a behavior assessment model to determine the target behavior risk level corresponding to the target matching degree, the behavior assessment model is used to reflect the correspondence between the matching degree and the behavior risk level, and based on the preset baseline behavior characteristics, external attacks and Internal threats can also be effectively detected in response to mutation attacks, without the need to repeatedly update the database in real time, avoiding the occurrence of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting a database risk, a server and a storage medium. The method comprises the steps of obtaining a target access record of a target user; extracting multipletarget behavior characteristics from the target access record; calculating a target matching degree between each target behavior characteristic and a preset baseline behavior characteristic; determining a target behavior risk level corresponding to the target matching degree through a behavior estimation model, wherein the behavior estimation model is used for reflecting a corresponding relationship between the matching degree and the behavior risk level. Based on the preset baseline behavior characteristic, the method for detecting the database risk can detect external attacks and internal threats, also can detect variable attacks efficiently without updating the database repeatedly and in real time, avoids data leakage caused by risky behavior of internal personnel, can detect threatening access to the database more comprehensively, can protect the database more efficiently, improves the database risk detection efficiency and accuracy and improves the database security.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a method for detecting database risks, a server and a storage medium. Background technique [0002] With the development of the Internet, more and more businesses have migrated to the Internet, and the security of the database has been paid more and more attention. At present, database security protection in the industry mainly uses signature databases for risk identification, but this traditional protection mechanism is based on collecting the characteristics of existing attack methods and forming a signature database, and then analyzing protocol requests based on the signature database. Do a match check. This detection mechanism based on feature matching has the following defects: [0003] 1. Relying on feature updates, there are many misjudgments and even failures. The way of attack constantly mutates into new types, leading to the failure of protection. Usu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 陆明友
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products