Database security auditing method
A security auditing and database technology, applied in the field of database security, can solve problems such as artificial intelligence auditing, inability to manage database permissions, and achieve the effect of preventing SQL injection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0034] Database network communication data collection: use bypass monitoring to capture data packets in the specified network, perform IP fragment reassembly and TCP session reassembly, filter out data packets not related to database protocol flow, and extract protocol packets related to database protocol flow The data.
[0035] Database network communication protocol analysis: extract the data in the protocol package according to the data package type and use the corresponding database protocol analysis module to restore the login and logout of the database user and the SQL request operation during the entire session, and perform lexical analysis on the SQL statement parsed by the database protocol , Grammatical analysis to form audit records in a unified format, and store them in the audit log library.
[0036] Self-learning of audit rules based on artificial intelligence algorithms: use association rule mining algorithms to construct normal behavior patterns and abnormal be...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com