Database auditing method based on blood relationship

A blood relationship and database technology, applied in the field of database auditing based on blood relationship, can solve the problem of low correct rate and achieve the effect of meeting the needs of use, work efficiency and high correct rate

Active Publication Date: 2019-11-15
SHANGHAI GUAN AN INFORMATION TECH
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Database auditing is the basis for correct application. Although existing database auditing methods can achieve certain results, the accuracy of finding abnormal results is not high. People are also conducting related research

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database auditing method based on blood relationship
  • Database auditing method based on blood relationship
  • Database auditing method based on blood relationship

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] A database audit method based on consanguinity relationship, the specific steps are as follows:

[0025] Step 1. Find the blood relationship R between the fields in the database. Method 1 is: read the SQL statement in the database operation record, analyze the SQL statement, and find out the blood relationship that reflects the data transmission through the unique rules in the SQL statement , so as to establish a blood relationship table, the second method is: use the kmeans algorithm, the k-means algorithm is a clustering algorithm, the so-called clustering, that is, according to the principle of similarity, divide the data objects with high similarity into the same cluster , to divide data objects with high dissimilarity into different clusters. The biggest difference between clustering and classification is that the clustering process is an unsupervised process, that is, the data objects to be processed do not have any prior knowledge, while the classification process...

Embodiment 2

[0028] A database audit method based on consanguinity relationship, the specific steps are as follows:

[0029] Step 1, extract the create table and insert into two statements with "data transfer" from the SQL statement. Use the sqlparse tool for statement analysis. The sqlparse tool can parse out the part of speech of a word. Parts of speech include: keywords, methods, symbols, etc. The target table name Tt can be located according to the create or insert keyword; the source table name can be located according to the from keyword gather. (Get the table name of a single table or the table name and alias associated with the table); according to the select keyword, you can locate the column name and column alias set (the column name is the original column name, the column alias is the target table column name, and if there is no column alias, the target table The column names are the same as the original column names). Replace the table alias of the column name set with the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database auditing method based on a blood relationship, and aims at solving the problems existing in existing database auditing. The method comprises the following specific steps: step 1, finding out a blood relationship R between fields of a database; 2, based on the blood relationship R, carrying out sensitive data field, unauthorized operation and important table operation auditing on the database, and obtaining an abnormal result. According to the invention, related data is extracted; the database operation record is used for extracting the blood relationship, a blood relationship table is generated, the blood relationship table is associated with other data, data processing and feature extraction is performed by using associated data, and identification is performed by using a related model to find out an abnormal result record, so that the working efficiency and the accuracy are high, and the use requirements of people are met.

Description

technical field [0001] The invention relates to the field of database auditing, in particular to a blood relationship-based database auditing method. Background technique [0002] SQL (Structured Query Language) is a database language with multiple functions such as data manipulation and data definition. This language is interactive and can provide users with great convenience. The database management system should make full use of SQL language to improve computer application systems. work quality and efficiency. The SQL language can not only be independently applied to the terminal, but also can be used as a sub-language to provide effective assistance for other programming. [0003] Database auditing is the basis of correct application. Although the existing database auditing methods can achieve certain effects, the correct rate of finding abnormal results is not high, and people are also conducting related research. Contents of the invention [0004] The purpose of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/28G06F16/242G06F21/62G06K9/62
CPCG06F16/288G06F16/2433G06F21/6227G06F21/6245G06F2221/2141G06F18/23213G06F18/22
Inventor 王启凡魏国富殷钱安陈一根余贤喆陶景龙刘胜
Owner SHANGHAI GUAN AN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products