Database attack defense method, device and system

A database and intrusion attack technology, which is applied in the field of information security, can solve the problems of vigilance of intruders and affecting the defense effect, and achieve the effect of improving the protection ability, increasing the possibility of discovery, and improving the defense effect

Active Publication Date: 2021-09-24
BANK OF CHINA
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such a solution may play a role, but this passive defense has the risk of alerting intruders and seriously affecting the defense effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database attack defense method, device and system
  • Database attack defense method, device and system
  • Database attack defense method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0035] As mentioned above, a real host in a network environment should interact with other hosts in the network in real time. In these connection communications, intruders usually use data, personnel information, and high-privilege hosts as the primary targets of intrusion. Database interactions tend to be more attractive to intruders.

[0036] At present, the common solutions in the industry are mostly to place some breadcrumbs (similar to database or terminal configuration files, etc.) in some vulnerable servers or office environments that are easy to be phished. T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database attack defense method, device and system. The method comprises the steps that a honeypot probe module receives database request information sent by a client at a preset time interval; a database simulation module receives the database request information forwarded by the honeypot probe module; the database simulation module generates a corresponding request result according to the database request information; the database simulation module feeds back the request result to the honeypot probe module; the honeypot probe module forwards a request result fed back by the database simulation module to the client; when the honeypot probe module monitors an intrusion attack, an alarm signal is sent out. Attack defense can be carried out on the database, intruders are prevented from being alerted, and the defense effect is guaranteed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a database attack defense method, device and system. Background technique [0002] As we all know, a real host in a network environment should interact with other hosts in the network in real time. In these connection communications, intruders usually use data, personnel information, and high-privilege hosts as the primary targets of intrusion. Therefore, it is necessary to defend the database against attacks. [0003] In the prior art, the breadcrumb technology is usually used to defend the database against attacks, that is, static files are deployed on real hosts, and the files point to monitoring devices such as honeypots or honeypot probes. Such a solution may play a role, but this kind of passive defense has the risk of alerting the intruder and seriously affecting the defense effect. [0004] Therefore, there is an urgent need for a database attack defense sc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1491
Inventor 刘翔盛倚天范永里
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products