Database abnormal access monitoring method, monitoring system, equipment and storage medium

A database and exception technology, applied in the field of information security, can solve problems such as high consumption and inability to cover the entire network traffic, achieve the effect of low performance resource consumption, solving imperfect access monitoring, and controllable resource consumption

Pending Publication Date: 2022-02-18
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] A large amount of customer information and business data are stored in the database of financial enterprises. Usually, the risk of data leakage is discovered in time by deploying a database abnormal access monitoring model. Most enterprises adopt a bypass deployment method to analyze the database communication data packets in the network traffic. To obtain operation logs, but the anomaly monitoring measures based on network traffic have the problem of excessive consumption or unable to cover the entire network traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database abnormal access monitoring method, monitoring system, equipment and storage medium
  • Database abnormal access monitoring method, monitoring system, equipment and storage medium
  • Database abnormal access monitoring method, monitoring system, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Hereinafter, embodiments of the present application will be described with reference to the drawings. However, it should be understood that these descriptions are only exemplary and not intended to limit the scope of the present application. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present application. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present application.

[0042] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to limit the application. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, steps, operations ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a database abnormal access monitoring method which can be applied to the technical field of information security. The monitoring method comprises the following steps: acquiring initial network traffic for accessing a database; analyzing the initial network traffic to obtain access key information; screening out abnormal access information in the access key information; based on the abnormal access information, collecting and analyzing the network traffic of the next time period; and summarizing the abnormal access information and the network flow, and outputting the abnormal access information and the network flow in the form of alarm information. According to the method for monitoring the abnormal access of the database, only the initial network flow is subjected to network layer analysis, so that on one hand, all operations of accessing the database can be ensured to be included in a monitoring range, and the problem that the access monitoring of the database is imperfect is solved; and on the other hand, the server performance resource consumption of the acquisition end is small, the resource consumption of data transmission and storage is controllable, and the stability of the operation of the database can be ensured.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a monitoring method, monitoring system, equipment, storage medium and program product for abnormal database access. Background technique [0002] A large amount of customer information and business data are stored in the database of financial enterprises. Usually, the risk of data leakage is discovered in time by deploying a database abnormal access monitoring model. Most enterprises adopt a bypass deployment method to analyze the database communication data packets in the network traffic. To obtain operation logs, but the anomaly monitoring measures based on network traffic consume too much or cannot cover the entire network traffic. Contents of the invention [0003] This application aims to solve at least one of the technical problems existing in the prior art. [0004] For example, the method for monitoring abnormal database access of the present app...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1425H04L63/101
Inventor 沈怡凌奥凌怡
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products