Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Database protection system and method

A protection system and database technology, applied in the database field, can solve the problem of inability to scan out vulnerability threat intelligence information in real time, achieve fast and accurate vulnerability scanning, and improve security

Active Publication Date: 2019-06-11
SHENZHEN ANTECH TECH
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention aims to provide a database protection system and method, which solves the technical problem that the latest vulnerability threat intelligence information cannot be scanned in real time at present, realizes real-time update of the vulnerability information database, and the vulnerability scanning is faster and more accurate, and improves the security of the database. safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database protection system and method
  • Database protection system and method
  • Database protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] see figure 1 , figure 1 It is a schematic structural diagram of a database protection system provided by an embodiment of the present invention; figure 1 As shown, the database protection system 100 includes: a vulnerability information base 10, a database threat intelligence collection engine 20, a threat intelligence information cleaning engine 30, a scanning engine 40, and an alarm engine 50, wherein the database threat intelligence collection engine 20 is connected to The threat intelligence information cleaning engine 30 , the threat intelligence information cleaning engine 30 is connected to the scanning engine 40 , the scanning engine 40 is connected to the alarm engine 50 , and the scanning engine 40 is also connected to the vulnerability information database 10 .

[0047] Specifically, the vulnerability information database 10 is used to save database product information and corresponding threat intelligence information, wherein the database product informatio...

Embodiment 2

[0063] see figure 2 , figure 2 It is a work flow diagram of a database protection system provided by an embodiment of the present invention;

[0064] Among them, the database protection system includes: a vulnerability information database, which is used to store database product information and corresponding threat intelligence information; a database threat intelligence collection engine, which is used to obtain threat intelligence information;

[0065] A threat intelligence information cleaning engine, connected to the vulnerability information database and the database threat intelligence collection engine, used to clean the threat intelligence information, and save the cleaned threat intelligence information to the vulnerability information database;

[0066] The deep learning scanning model is used to learn the threat intelligence information added in the vulnerability information base to generate an upgraded deep learning scanning model;

[0067] The scanning engine...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of databases, and discloses a database protection system and method, and the system comprises a vulnerability information library which is used for storing threat intelligence information; The database threat intelligence collection engine is used for acquiring threat intelligence information; The threat intelligence information cleaning engine is used for cleaning the threat intelligence information and storing the cleaned threat intelligence information into the vulnerability information base; The deep learning scanning model isused for learning the threat information added into the vulnerability information base and generating an upgraded deep learning scanning model; And the scanning engine is used for carrying out vulnerability scanning on the to-be-scanned database based on the upgraded deep learning model, obtaining threat information perfection information and making a scanning result report. Through the mode, thetechnical problem that the latest vulnerability threat information cannot be scanned in real time at present is solved, vulnerability scanning is faster and more accurate, and the security of a database is improved.

Description

technical field [0001] The invention relates to the technical field of databases, in particular to a database protection system and method. Background technique [0002] As database technology is more and more widely used, it also makes the risk of database being leaked, altered or damaged higher, including: the threat of hacker attacks, the existence of vulnerabilities in the database itself and other factors that constantly affect the security of the database. When the vulnerabilities of mainstream databases are gradually exposed, the number of vulnerabilities is huge, and the number of vulnerabilities announced by the CVE of the so-called secure Oracle database has reached more than 1,100. Most of these loopholes are discovered by international security experts after researching the security situation of databases. Although database vendors have provided a large number of patch packages based on this, the number of vulnerabilities fixed by these patch packages is also li...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/57G06N20/00
Inventor 金枝柱刘华春
Owner SHENZHEN ANTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products