Supercharge Your Innovation With Domain-Expert AI Agents!

Database three-layer correlation audit method, device, computer equipment and storage medium

A database and data technology, applied in database management systems, computing, security communication devices, etc., can solve problems such as low accuracy, large errors, and uncertain associations, and achieve the effect of improving accuracy.

Active Publication Date: 2022-05-17
深圳红途科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the three-layer association audit method of the database includes the fuzzy matching method, that is, by capturing packets at both ends of the Web server and mirroring traffic, the two types of events from the browser to the Web server and from the Web server to the database are audited, and then the two types of events are compared. Events are associated with fuzzy matching based on time, session ID, thread ID, access IP and other related characteristics, and the accessed resource user account is associated with related database operations for auditing. However, the principle of this method is basically Correlation based on the time dimension and other features that are not sure during this period, the overall accuracy of the association is not high; when the number of user visits is large, it is a disaster, the accuracy of the association is greatly reduced, and the error is very large, only applicable to users Scenarios with a small amount of visits; when used in complex business, complex system architecture, and complex application multi-service calls and inter-application calls, it is basically impossible to perform three-tier association auditing of the database, which is only applicable to simple business scenarios and application systems Scenarios with simple architecture; and need to use packet capture or mirror traffic analysis, making it extremely difficult to deploy in a cloud environment; need to analyze network traffic on the web server, so it is necessary to obtain its users to web services and web servers for different applications The traffic to the database, the deployment is limited by the deployment location and line of the application, and the deployment will become complicated. When the application scale is large, and the system architecture and deployment of the application change, the operation and maintenance will become more and more difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database three-layer correlation audit method, device, computer equipment and storage medium
  • Database three-layer correlation audit method, device, computer equipment and storage medium
  • Database three-layer correlation audit method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0067] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0068] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database three-layer association auditing method, device, computer equipment and storage medium. The method includes formulating a collection strategy and sending it to the application server, and the application server uses switch mode to set the actual collection strategy according to the collection strategy; the application server uses bytecode enhancement technology to intercept the behavior and data of the user's access to the application, so as to obtain For the intercepted data, collect user behavior data and application transmission data for the intercepted data according to the actual collection strategy, and write the data access link information to obtain the target data; assemble the access link for the data related to database access in the target data , to obtain the access link information map of the user's access to the application and database; extract the database audit information according to the access link information map, and correlate the database audit information to obtain the three-tier associated audit information. The present invention is applicable to business scenarios and application system architecture scenarios with any number of concurrent users, and improves the accuracy rate.

Description

technical field [0001] The present invention relates to a database auditing method, and more specifically refers to a database three-layer association auditing method, device, computer equipment and storage medium. Background technique [0002] Due to laws and regulations and the needs of enterprise security, database auditing is more and more widely used. In the existing database auditing system, the user terminal usually sends an access request to the WEB server through the browser, and the WEB server sends an SQL request to the database. . The access users of the system application layer are associated with the access behavior to the database to generate audit information, and the application users, the application middle layer and the database are associated and audited, which is called the database three-tier associated audit. [0003] At present, the three-layer association audit method of the database includes the fuzzy matching method, that is, by capturing packets ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/63H04L9/40G06F16/242G06F16/25
CPCH04L63/108H04L63/20H04L63/0236G06F16/2433G06F16/252H04L67/63
Inventor 肖茂林
Owner 深圳红途科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More