Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Database security audit system, method and server

A security auditing and database technology, applied in the field of database security auditing systems, can solve problems such as message leakage and no auditing rules designed

Active Publication Date: 2021-09-14
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the problems existing in the prior art, the embodiment of the present invention provides a database security audit system, method and server, which is used to solve the problem in the prior art that the database audit system does not design audit rules that conform to the database format according to the characteristics of the database. Defects, and problems that are prone to risks such as message leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database security audit system, method and server
  • Database security audit system, method and server
  • Database security audit system, method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] This embodiment provides a database security audit system, such as figure 1 As shown, the security audit system is installed in the database, and the security audit function is deployed to the existing database by changing the source code of the storage engine module in the existing database or through a plug-in; including the database module, audit data collection module , audit data storage module, audit data analysis module and visualization module;

[0044] The database module is built on the storage engine module of the existing database, and is used to process the data in the database according to the command request of the client, and store the operation log in the data processing process. At the same time, the data that needs to be stored stored on disk or other media;

[0045] The database module provided in this example is the storage engine part of the self-developed database. After receiving the command request from the client, it stores the data to be stor...

Embodiment 2

[0059] Corresponding to Embodiment 1, this embodiment provides a database security audit method, the method is applied to the database, such as figure 2 As shown, the method includes the following steps:

[0060] (1) Process the data in the database according to the client's command request, and store the operation log in the data processing process, and at the same time, store the data to be stored in the disk or other media;

[0061] (2) Collect and store the operation log of the database module, and format the collected operation log, convert it into a format that can be stored, and use it as the audit data of the security audit system;

[0062] (3) Change the underlying source code of Elasticsearch and use the open source search engine Elasticsearch storage format to classify and store the audit data collected and transformed by the audit data collection module, and index the audit log information according to time, database, and user keywords;

[0063] (4) Analyzing and...

Embodiment 3

[0068] This embodiment provides a server, such as image 3 As shown, it includes a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor implements the following steps when executing the program:

[0069] (1) Process the data in the database according to the client's command request, and store the operation log in the data processing process, and at the same time, store the data to be stored in the disk or other media;

[0070] (2) Collect and store the operation log of the database module, and format the collected operation log, convert it into a format that can be stored, and use it as the audit data of the security audit system;

[0071] (3) Change the underlying source code of Elasticsearch and use the open source search engine Elasticsearch storage format to classify and store the audit data collected and transformed by the audit data collection module, and index the audit log information according to time, databas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a database security audit system, method and server. The security audit system includes a database module, an audit data collection module, an audit data storage module, an audit data analysis module and a visualization module; the database module processes the data in the database The audit data collection module collects the operation log of the database module; the audit data storage module stores the audit log data, and ensures the efficient and safe processing of the audit data by introducing an improved storage engine; the audit data analysis module analyzes and processes the audit log data ; The visualization module visually displays the audit log data to better monitor the changes of the database. The system can well solve the database audit problem, realize the compliance check of the database, and give early warning to the violation operation.

Description

technical field [0001] The invention belongs to the technical field of database auditing, and in particular relates to a database security auditing system, method and server. Background technique [0002] The database is the foundation of the modern information system. There are a large amount of valuable information system business data in the database. These data involve the security of the information business. It is necessary to ensure the reliability and availability of the data, so there is a database security audit system. The database audit system is used to record database operation activities in real time, perform fine-grained audit compliance check management on database operations, and issue alarms on risky behaviors encountered by databases. By recording, analyzing and reporting user access to the database, it helps users generate compliance reports afterwards and trace the source of accidents, while strengthening the security of audit data itself and improving ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F16/21
CPCG06F21/6218
Inventor 曹晟蒋长红邹杰成王靖梅亚双
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products