Database audition method
A database and data packet technology, applied in the field of network security, can solve problems such as low audit efficiency, and achieve the effects of improving audit efficiency, reducing processing capacity, and eliminating load
Inactive Publication Date: 2018-11-23
郑州信大天瑞信息技术有限公司
5 Cites 5 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention relates to a database audition method. The method comprises the following steps of: 1) intercepting interaction data packets between a database client and a database server by audition equipment, and analyzing interaction contents between the database client and the database server from the interaction data packets; 2) generating session logs comprising interaction data packet processing results by the audition equipment, adding session identifiers of corresponding database access sessions in the session logs; and 3) grouping the session logs according to the session identifiersso that a preset audition user can carry out database audition. By utilizing independent audition equipment to carry out database audition, the load generated by carrying out database audition by thedatabase server can be eliminated, so that the data packet processing amounts, at the database server, of databases are reduced. Through the audition equipment, session identifiers can be added, so that for the condition of high database access traffic, the method is capable of remarkably improving the audition efficiency.
Application Domain
TransmissionSpecial data processing applications
Technology Topic
Traffic volumeTraffic capacity +5
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Sinter distributed temperature cooling method, sinter time-sharing unloading trolley and distributed temperature unloading device
Owner:ZHONGYE-CHANGTIAN INT ENG CO LTD
Banknote authenticity identification equipment based on number extraction and method thereof
Owner:BEIJING NUFRONT SOFTWARE TECH
Receiving apparatus and packet processing method thereof
Owner:REALTEK SEMICON CORP
Classification and recommendation of technical efficacy words
- reduce processing
System and method for optimizing handover in mobile communication system
Owner:SAMSUNG ELECTRONICS CO LTD
Credential caching for clustered storage systems
Owner:NETWORK APPLIANCE INC
Transistor With Embedded Si/Ge Material Having Reduced Offset and Superior Uniformity
Owner:TAIWAN SEMICON MFG CO LTD
Beer-like alcoholic beverage and process for producing the same
Owner:SAPPORO BREWERIES
Screenshot method and device, and computer readable storage medium
Owner:BEIJING XIAOMI MOBILE SOFTWARE CO LTD