By-pass intercepting and reducing method for database access

A database and bypass technology, applied in the direction of preventing unauthorized use of memory, protecting stored content from loss, etc., can solve problems such as damaging the system and tampering with data, and achieve self-safety, normal operation, and complete information records Effect

Inactive Publication Date: 2002-07-24
上海光华如新信息科技股份有限公司
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This threat is fatal to the application system, and users may tamper with data or destroy the entire system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • By-pass intercepting and reducing method for database access
  • By-pass intercepting and reducing method for database access
  • By-pass intercepting and reducing method for database access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described through the following embodiments in conjunction with the accompanying drawings.

[0049] The bypass database access interception and restoration method is applied in an Oracle database audit system 3 . Such as figure 1 As shown, the network environment is 100M Ethernet, the equipment includes database user 1, Oracle database server 2, and database audit system 3, and the operating platform is Linux. The database audit system 3 is equipped with 100M network detection equipment 31, audit center software 32 and audit management software 33, and is equipped with a MS SQL SERVER database for audit data access. The 100M network detection device 31 is equipped with two 100M network cards, one of which has no IP address and is set to promiscuous mode to listen to data packets in the network, and the other network card is connected to the Oracle database server 2 to keep the internal communication of the audit system normal .

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A by-pass intercepting and restoring method for database access is characterized by that a database audit system is connected to network between database user and database server for filtering the data the user has accessed from the service port of database server, processing it by by-pass intercepting, and analyzing and restoring the information, so understanding all data accessed by user.

Description

technical field [0001] The invention relates to a method for monitoring and restoring database access, in particular to a method for bypassing database access monitoring and restoring. Background technique [0002] In most application systems, the database is the core of the entire system. Once the database is damaged, the entire system may be paralyzed. In addition to threats to the network layer and operating system of the database host (these are usually prevented by firewalls, intrusion detection and audit products), the database system platform itself faces many threats, such as theft of confidential data, unauthorized database operations, provision of false data, Identity impersonation, etc. Usually, the log function is provided in the database, but these logs have the following defects: [0003] a. It will consume the performance of the database host. The log function will consume a lot of CPU and hard disk resources, and it is difficult to s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F12/16
Inventor 张世永黄伟吴珺
Owner 上海光华如新信息科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products