Operation behavior security auditing method, device and system of industrial control database

A security audit and database technology, applied in computer security devices, transmission systems, digital data protection, etc., can solve the problems of low efficiency in the security resolution process of industrial control databases

Inactive Publication Date: 2019-01-01
江苏亨通工控安全研究院有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide an industrial control database operation behavior security audit method, device and system to alleviate the technical problem of low efficiency in the industrial control database security resolution process existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation behavior security auditing method, device and system of industrial control database
  • Operation behavior security auditing method, device and system of industrial control database
  • Operation behavior security auditing method, device and system of industrial control database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. the embodiment. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0059] At present, there are two trends in database information leakage: (1) Hackers use B / S applications and use Web servers as springboards to steal data in databases. (2) Database data leakage often occurs within the company, and a large number of database operation users directly contact sensitive data.

[0060] In practical applications, the existing industrial control database...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an operation behavior security auditing method, device and system of an industrial control database. The method applied to an audit terminal comprises: an access request sent bya user terminal through a switch is received, wherein the access request includes a resource identifier and a user name; according to the resource identifier and the user name, whether the user terminal is allowed to have access to to-be-opreated resources in a database server is determined; if so, an access allowing notice is sent to the user terminal and thus the user terminal sends operation information to the audit terminal after receiving the access allowing notice; according to a first audit strategy and the received operation information, whether the user terminal is allowed to operatethe to-be-operated resources is determined; and if so, the operation information is sent to the database server. Therefore, a problem of low efficiency of the safety solution process of the industrial control database in the prior art is solved; and thus a technical effect of improving the efficiency of the safety solution process of the industrial control database is realized.

Description

technical field [0001] The invention relates to the technical field of industrial control database operation behavior auditing, in particular to a method, device and system for security auditing of industrial control database operation behavior. Background technique [0002] At present, there are two trends in database information leakage: (1) Hackers use B / S applications and use Web servers as springboards to steal data in databases. (2) Database data leakage often occurs within the company, and a large number of database operation users directly contact sensitive data. [0003] In practical applications, the existing industrial control database security solutions are mainly to prevent external intrusion. In fact, the information leakage of industrial control database is often caused by the company's internal staff. If the industrial control database security solution is only to prevent external intrusion, it will cause the problem of low efficiency in the industrial contr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F21/62
CPCG06F21/6218H04L63/10H04L67/12
Inventor 袁键徐乐晨吴志华
Owner 江苏亨通工控安全研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products