Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer firewall device based on cloud database and using method

A database and firewall technology, applied in electrical components, transmission systems, etc., can solve problems such as inability to guarantee effectiveness, inability to independently improve protection performance, and consumption of database session resources.

Pending Publication Date: 2021-03-02
南京哈佳智能科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the processing cannot be guaranteed to be effective, that is to say, in quite a few scenarios, there may be a large number of dead processes, consuming a large amount of database session resources, and even some shared resources are not released, resulting in the suspension of the database. The existing database firewalls are silent Type of protection measures, does not have active protection function, and cannot independently improve the protection performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] A computer firewall device and usage method based on cloud database, comprising the following steps:

[0021] S1. Intelligent identification and control of application protocols: it can automatically identify DBA protocols, operation and maintenance protocols, hacker access, and application software, comprehensively monitor access to all interfaces of the database, and realize effective access control;

[0022] S2. Accurate interception: It can be blocked based on various conditions such as IP address, time, operation, keyword, database account, statement length, column name, table name, row number, injection feature library, etc., to achieve precise access control;

[0023] S3, Anti-APT attack: quickly verify and block complex and continuous violation operations and malicious attacks according to the combination of access behaviors and statistical models;

[0024] S4. Built-in AI: Built-in intelligent learning module, machine intelligent learning, automatic modeling, a...

Embodiment 2

[0031] A computer firewall device and usage method based on cloud database, comprising the following steps:

[0032] S1. In the transparent bridging mode, there is no need to set an IP address for it, and it has "zero" impact on the original network configuration. Through various bypass modes, it can ensure that the business is still running normally under various software and hardware failures;

[0033] S2. The client logically connects to the address of the firewall device, and the firewall device forwards traffic to the database server; through the proxy access mode, the network topology remains unchanged;

[0034] S3. Accurate interception: It can be blocked based on various conditions such as IP address, time, operation, keyword, database account, statement length, column name, table name, row number, injection feature library, etc., to achieve precise access control;

[0035] S4. According to the combination of access behaviors and statistical models, quickly verify and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer firewall device based on a cloud database and a use method, and the method comprises the following steps: S1, application protocol intelligent recognition control: automatically recognizing a DBA protocol, an operation and maintenance protocol, hacker access and application software, carrying out the comprehensive monitoring of all interface access of the database, and achieving the effective access control; S2, precise interception: performing blocking based on various conditions such as IP addresses, time, operations, keywords, database accounts, statementlengths, column names, table names, line numbers and injection feature libraries, and precise access control is realized; S3, APT attack prevention: according to the combination of access behaviors, the statistical model quickly verifies and blocks complex and continuous violation operation and malicious attack behaviors; S4, built-in AI: a built-in intelligent learning module, machine intelligentlearning, automatic modeling and automatic generation of a blocking rule base for actively defending unknown security threats; S5, bypass blocking.

Description

technical field [0001] The present invention relates to the deployment of computer firewalls, and more specifically, to a computer firewall device and usage method based on a cloud database. Background technique [0002] A database firewall is a security device or product that resists and eliminates database security issues caused by application business logic loopholes or defects. The database firewall is generally deployed between the application server and the database server, and is completed by means of database protocol analysis. But this is not the only way to achieve it, you can deploy it outside the database without using protocol analysis. From this definition, it can be seen that the essential goal of the database firewall is to patch business applications to avoid affecting database security due to application business logic loopholes or defects [0003] The database does not handle the reset signal very well, and needs to rely on the dead process detection pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0236H04L63/1458
Inventor 胥波
Owner 南京哈佳智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products