Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device for recognizing abnormal operation in database

A database and abnormal technology, applied in the computer field, can solve problems such as system failures and privacy data leakage, achieve high accuracy and reduce labor costs

Pending Publication Date: 2021-11-19
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the protection of private data, it is necessary to identify abnormal operations in the database. The above abnormal operations may easily lead to privacy data leakage, system failure and other consequences. Usually, the database includes a large number of data tables, and there are dozens of fields in each data table on average. , each field corresponds to a label whether it belongs to private data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for recognizing abnormal operation in database
  • Method and device for recognizing abnormal operation in database
  • Method and device for recognizing abnormal operation in database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0049] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. This implementation scenario involves identifying abnormal operations in the database. The database includes multiple data tables, and each data table includes multiple fields. Each field corresponds to a label whether it belongs to private data, where the fields correspond to columns. Abnormal operations are also known as risky behaviors, which can easily lead to consequences such as privacy data leakage and system failures, usually including bypassing the platform desensitization mechanism to collect private data, illegal credentialing, etc. refer to figure 1 , Table 1 is the original data table in the database. Field 1 included in Table 1 belongs to private data. The operation for the database is to create Table 2. Field 1 in Tab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for recognizing abnormal operation in a database. The method comprises the steps of obtaining a target SQL statement used for executing target behavior operation for the database; analyzing the target SQL statement to obtain a plurality of data objects involved in the target behavior operation and a target association relationship among the data objects, wherein the single data object is a field or a data table; according to the multiple data objects and the target incidence relation, updating a pre-established data relation record, wherein the data relation record comprises at least part of the data objects in the database and the existing incidence relation between the data objects; inquiring a target field meeting a preset condition from the updated data relationship record, and judging whether the preset condition is related to a label of the field and the association relationship belongs to a preset relationship or not; and under the condition that the target field belongs to the plurality of data objects, determining that the target behavior operation belongs to the abnormal operation. High automation can be achieved, the labor cost is reduced, and meanwhile high accuracy can be kept.

Description

technical field [0001] One or more embodiments of this specification relate to the computer field, and in particular to a method and an apparatus for identifying abnormal operations in a database. Background technique [0002] Private data (private data) refers to secret data, which refers to information that does not want to be known by others or unrelated people. From the perspective of privacy owners, private data can be divided into personal private data and common private data. Personal private data includes Information that can be used to locate or identify individuals (such as phone numbers, addresses, credit card numbers, etc.) and sensitive information (such as personal health conditions, financial information, important company documents, etc.). Common privacy data is mainly based on family privacy, such as family annual income. The leakage and abuse of private data can easily cause various personal and public security issues. For the protection of private data, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/30G06F8/41G06F16/242G06F16/25G06F21/62
CPCG06F11/302G06F8/427G06F16/2433G06F16/254G06F21/6245
Inventor 刘佳伟鲍梦瑶章鹏殷雪梅张谦刘新源
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More