Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Database security detection method and system based on user behavior rules

A technology of security detection and database, which is applied in the field of database security detection, can solve problems such as the influence of network facilities, and achieve the effect of easy filtering

Pending Publication Date: 2020-12-29
BEIJING AN XIN TIAN XING TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Secondly, if the security of the database cannot be guaranteed, the network facilities where it is located will also be affected by security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database security detection method and system based on user behavior rules
  • Database security detection method and system based on user behavior rules
  • Database security detection method and system based on user behavior rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] see figure 1 , the present embodiment provides a method for detecting database security based on user behavior rules, the method comprising the following steps:

[0038] Step 101: Obtain the normal SQL statement submitted by the user to the database.

[0039] Step 102: Split the normal SQL statement into user operation behavior vectors. In this embodiment, the user operation behavior vector includes but not limited to three elements: user name, operation behavior and operation object. It should be noted that in a database application, a SQL statement may contain many different operations, for example, "DELETE FROM table1 WHERE NOTEXISTS(SELECT*FROM table2 WHERE table1.d1=table2.d1)" contains both DELETE and SELECT. Operation types, where DELETE corresponds to the operation table table1, and SELECT corresponds to the operation table table2. Therefore, the SQL statement can be split into 1: , 2: .

[0040] Step 103: Use the set of user operation behavior vectors as a d...

Embodiment 2

[0075] see figure 2 , the present embodiment provides a database security detection system based on user behavior rules, the system includes:

[0076] The SQL statement acquisition module 201 is used to acquire the normal SQL statement submitted by the user to the database and acquire the SQL statement to be detected;

[0077] The SQL statement splitting module 202 is used for splitting the normal SQL statement into user operation behavior vectors and for splitting the SQL statement to be detected into user operation behavior vectors to be detected, and the user operation behavior vector includes user name, operation behavior and operation object;

[0078] The normal operation behavior vector screening module 203 is used to use the set of user operation behavior vectors as a data set, use the maximum confidence as a correlation metric, and use the Apriori algorithm to screen the user operation behavior vectors in the data set that are greater than the correlation threshold, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database security detection method and system based on user behavior rules. The method comprises the steps of obtaining a normal SQL statement submitted to a database by a user; splitting the normal SQL statement into a user operation behavior vector, wherein the user operation behavior vector comprises a user name, an operation behavior and an operation object; taking aset formed by the user operation behavior vectors as a data set, taking the maximum confidence coefficient as a correlation measurement standard, screening the user operation behavior vectors greaterthan a correlation threshold in the data set by adopting an Apriori algorithm, recording the screened user operation behavior vectors as normal operation behavior vectors, and recording the set formedby the normal operation behavior vectors as a user normal behavior library; obtaining a to-be-detected SQL statement; splitting the to-be-detected SQL statement into to-be-detected user operation behavior vectors; and matching the to-be-detected user operation behavior vector with each vector in a user normal behavior library to detect an abnormal behavior. The database security detection methodand system provided by the invention have the advantage of high identification precision for abnormal operation behaviors.

Description

technical field [0001] The invention relates to the technical field of database security detection, in particular to a database security detection method and system based on user behavior rules. Background technique [0002] With the widespread use of information technology in various industries, the database has gradually become an indispensable core asset of the information system, and a large amount of sensitive information stored in it is related to the fundamental interests of the society. Therefore, ensuring database security is of great significance to the entire information system. First of all, the user's information assets are stored in the database. Database security is very important to the security of user information assets. This requires the database to ensure that the stored data cannot be destroyed or leaked at will. Secondly, if the security of the database cannot be guaranteed, the network facilities where it is located will also be affected by security. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/21G06F16/242G06F16/2455
CPCG06F16/217G06F16/2433G06F16/24564
Inventor 邢亚君彭海龙孟铭赵崇鹏
Owner BEIJING AN XIN TIAN XING TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More