Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Database auditing method, system and equipment under big data stream load

A database and data flow technology, applied in the field of network security, can solve problems such as the difficulty of auditing equipment, and achieve the effects of simplifying message preprocessing flow, improving processing efficiency, and improving processing performance

Inactive Publication Date: 2019-09-10
西安交大捷普网络科技有限公司
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the business system’s access to the database is the most widely used, and it is also the source of a large number of database operations. It is undoubtedly difficult for audit equipment to efficiently and quickly audit useful information from massive data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database auditing method, system and equipment under big data stream load
  • Database auditing method, system and equipment under big data stream load
  • Database auditing method, system and equipment under big data stream load

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0034] First of all, the database audit method under the load of large data flow includes environment detection, data flow collection and distribution, content analysis, and audit response; data packet content analysis includes analysis algorithms based on finite state machines, such as figure 1 Shown:

[0035] After getting the data packet from the network card, take out the database port by offset, confirm whether the protocol of the port needs to be audited, if not, discard it directly, and place the data packet on the ring queue if necessary;

[0036] Get the data packet from the ring queue, offset the five-tuple information and application layer data;

[0037] Call the public plug-in to match the host of the data packet, confirm whether the data flow of the business host needs to be audited, if not, discard it directly, and continue to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to provide a database high-efficiency auditing method, system and equipment for a big data stream load, various network messages are quickly classified through a finite-state machine processing mechanism, so that the message preprocessing stream is simplified, and full utilization of system resources is realized; by integrating the optimized Hash algorithm, the annular queue andthe large page cache, the large data flow obtained by the network card can be dynamically distributed to a plurality of engines for processing, so that the data packet processing performance is greatly improved; control and data processing are separated, so that scheduling among multiple engine threads is reduced, and the processing efficiency is improved; regular matching, binary comparison, accurate data analysis and other methods are adopted, and auditing of mainstream databases at home and abroad and SSL encrypted databases is achieved.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a database audit method for realizing adaptability and high-efficiency audit under the load of large data flow, and a database audit system and equipment applying the method. Background technique [0002] With the continuous acceleration of global informatization, the application of information technology is becoming more and more extensive, especially the rise of mobile Internet, social media, and e-commerce, which has generated massive amounts of data. As the basis of information, databases carry more and more Business-critical systems have gradually become important assets in business and public security. Once tampered with or leaked, it will cause economic losses to the company or society at the slightest, and affect the image of the company or even social security at the worst. In reality, database information assets are facing severe security threats: o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F9/50G06F16/903H04L9/06H04L29/06H04L29/08
CPCG06F21/552G06F9/5027G06F16/90344H04L9/0643H04L69/18H04L69/22H04L63/0227H04L67/568
Inventor 何建锋武博
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products