Database security auditing method and system and computer readable storage medium

A security audit and database technology, applied in the field of network security, can solve the problems of lack of database security audit methods, etc., and achieve the effect of reducing the workload of manual audit, improving work efficiency, and increasing coverage

Inactive Publication Date: 2019-06-14
SF TECH
View PDF7 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current common database audit methods mainly follow the laws and regulations of various countries or the strategies formulated by the characteristics of financial and other industries, and there is a lack of database security audit methods suitable for the express delivery industry.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database security auditing method and system and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The specific embodiments of the present invention are used to illustrate the present invention, but are not limited to the specific embodiments.

[0023] According to the application scenario of the express industry system, this embodiment audits various operation behaviors of the database account. Certainly, the present invention is not only applicable to the security audit of the express industry database, but also applicable to various business systems and databases with huge data volume.

[0024] figure 1 It is an overall flowchart of the database security audit method in the embodiment of the present invention.

[0025] Such as figure 1 As shown, the database security audit method of the present embodiment includes the following steps:

[0026] Step S1, formulate an audit strategy and an early warning report for the operation behavior of the database account.

[0027] The operation behavior of the database account includes the operation behavior of the personal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A database security auditing method comprises the following steps of obtaining a database message in traffic; carrying out unpacking analysis on the message; executing a preset auditing strategy according to the obtained operation behavior of the database account through analysis, and generating an auditing log; and generating an early warning report for the operation behavior violating the auditing strategy according to the auditing log, and storing the auditing log and the early warning report. According to the database security auditing method, different auditing strategies are formulated for different operation behaviors, so that the coverage range of abnormal operation behaviors of a database in the express industry is expanded; the identification accuracy of the sensitive informationis improved, and the machine learning mode greatly reduces the workload of manual audit and improves the working efficiency.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to the security audit of databases. Background technique [0002] With the development of Internet technology, databases have brought great convenience to users in storing and querying data in the application of various industries. In some logistics companies, there are a large number of express business systems and databases. These data have user privacy information characteristic of the express industry, or internal confidential business information. Therefore, in order to ensure the security of user information and prevent information leakage, it is extremely important to conduct a security audit on the database. However, the current common database audit methods mainly follow the laws and regulations of various countries or the strategies formulated by the characteristics of industries such as finance, and there is a lack of database security audit methods suitable fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/21G06F21/45H04L29/06
Inventor 吕栋梁刘卫明卢樱洁
Owner SF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products