A database security exception identification method and system
An anomaly identification and database technology, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve problems such as the inability to effectively identify malicious behaviors in multilateral databases, and achieve the effect of accurate security detection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0057] In this embodiment, a database security anomaly identification system, such as figure 2 As shown, it includes an acquisition unit 1 , an extraction unit 2 , a matching unit 3 , a determination unit 4 and an alarm unit connected in sequence.
[0058] The acquisition unit acquires real-time database instruction data;
[0059] An extraction unit extracts behavioral features from real-time database instruction data, and the behavioral features include access domains and operation domains;
[0060] The matching unit performs feature matching on the behavioral features according to the known malicious feature database, and determines whether it is a known malicious behavior;
[0061] The judging unit is configured to judge the same-origin session access domain and the same-origin session operation domain for the behavior characteristics of the non-known malicious behavior, and then judge the abnormal behavior;
[0062] The alarm unit judges the abnormal access domain and t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

