Unlock instant, AI-driven research and patent intelligence for your innovation.

Database detection method and device, storage medium and electronic device

A detection method and database technology, which is applied in the field of database attacks, can solve problems such as inability to use different attack methods on databases, and achieve the effect of improving security and detection efficiency

Active Publication Date: 2022-05-10
BEIJING ANHUA JINHE TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a database detection method and device, a storage medium, and an electronic device, so as to at least solve the problems in related technologies, such as the inability to determine different attack methods according to different types of database vulnerabilities, etc. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database detection method and device, storage medium and electronic device
  • Database detection method and device, storage medium and electronic device
  • Database detection method and device, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Embodiments of the present invention will be described in detail below with reference to the drawings and in combination with the embodiments.

[0026] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence.

[0027] The method embodiments provided in the embodiments of the present application may be executed in computer terminals, databases or similar computing devices. Take running on the database as an example, figure 1 It is a hardware structure block diagram of a database of a database detection method in an embodiment of the present invention. Such asfigure 1 As shown, the database can include one or more ( figure 1 Only one is shown in the figure) processor 102 (processor 102 may include but not limited to processing devices such as microprocessor MCU or programmable logic dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database detection method and device, a storage medium and an electronic device. The method includes: obtaining a preset database identification list, and remotely identifying a target database through the database identification list, wherein the database identification list includes at least the following One: database service type, database version information; conduct security detection on the target database according to the remote identification results to determine the security vulnerability information of the target database; determine the vulnerability type corresponding to the security vulnerability information, and configure the penetration attack corresponding to the target database according to the vulnerability type method; execute the penetration attack method corresponding to the target database, detect the attack result of the penetration attack method, and determine the vulnerability of the target database that leaks the content of the database according to the attack result, and solve the problem that in related technologies, different attacks cannot be performed according to the type of vulnerability in the database Determination of methods and other issues.

Description

technical field [0001] The invention relates to the field of database attacks, in particular to a database detection method and device, a storage medium and an electronic device. Background technique [0002] Database attack technology is a technology that exploits the defects and loopholes in the database itself to attack the database from multiple levels and dimensions. Traditional software attack techniques focus more on network security attacks, but lack of truly professional and extensive techniques for vulnerability attacks in the database field. Database vulnerability attacks are relatively more complex and difficult, and the real process requires strong professionalism and considerable accumulation of database vulnerabilities. Traditional attack methods cannot achieve accurate and effective attacks on databases. [0003] Aiming at the problem in related technologies that different attack methods cannot be determined according to different types of database vulnerab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 杨海峰王迪静
Owner BEIJING ANHUA JINHE TECH