CN115618342A - Method, device, equipment and storage medium for identifying tool name of access database - Google Patents

Method, device, equipment and storage medium for identifying tool name of access database Download PDF

Info

Publication number
CN115618342A
CN115618342A CN202211629981.7A CN202211629981A CN115618342A CN 115618342 A CN115618342 A CN 115618342A CN 202211629981 A CN202211629981 A CN 202211629981A CN 115618342 A CN115618342 A CN 115618342A
Authority
CN
China
Prior art keywords
session
information
database
tool name
accessing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211629981.7A
Other languages
Chinese (zh)
Other versions
CN115618342B (en
Inventor
刘永波
官文兵
陈燕帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ankki Technology Co ltd
Original Assignee
Shenzhen Ankki Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ankki Technology Co ltd filed Critical Shenzhen Ankki Technology Co ltd
Priority to CN202211629981.7A priority Critical patent/CN115618342B/en
Publication of CN115618342A publication Critical patent/CN115618342A/en
Application granted granted Critical
Publication of CN115618342B publication Critical patent/CN115618342B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Abstract

The invention discloses a method, a device, equipment and a storage medium for identifying a tool name for accessing a database, and belongs to the technical field of database auditing. The identification method for accessing the database tool name comprises the following steps: acquiring session message information for accessing a database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the method and the device, when no tool name information exists in the message, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information and matching the characteristic information with the preset tool name mapping information.

Description

Method, device, equipment and storage medium for identifying tool name of access database
Technical Field
The invention relates to the technical field of database auditing, in particular to a method, a device, equipment and a storage medium for identifying a tool name for accessing a database.
Background
The key to obtain the main body information of the database operation behavior is whether the database audit, the database firewall, the database operation and maintenance gateway and the like can be comprehensively and accurately audited. Common subject information includes database account, source IP, source port, source MAC, access tool name, etc. The strange access tools can be easily found by accessing the tool names, and a safety manager can perform accurate strategy control according to the tool names. However, in the process of using data, the accessed client tools are various, and the access modes make the extraction of tool names difficult.
The existing main way for extracting and accessing the tool name is to send the information such as the tool name to a database server through the relevant information of the user login message. For some database client tools and programs, in the process of initiating connection for authentication, tool name information does not necessarily exist in a communication message, and at this time, an extraction mode is invalid.
Therefore, when the tool name cannot be extracted from the connection database request message, how to obtain the tool name for accessing the database is a problem to be solved at present.
Disclosure of Invention
The application mainly aims to provide a method, a device, equipment and a storage medium for identifying tool names for accessing a database, and aims to solve the problem of how to obtain the tool names for accessing the database when the tool names cannot be extracted from a request message for connecting the database.
In order to achieve the above object, the present application provides an identification method of an access database tool name, including the following steps:
acquiring session message information of an access database;
extracting session characteristic information from the session message information;
and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
Optionally, the preset tool name mapping information includes a preset tool name mapping table, and the step of matching the extracted session feature information with the preset tool name mapping information to obtain a tool name for accessing the database includes:
matching the SQL features in the session feature information with the preset tool name mapping table;
and if the matching is successful, obtaining the tool name for accessing the database.
Optionally, the step of matching the extracted session feature information with a preset tool name mapping table to obtain a tool name for accessing the database includes:
judging whether the session message information is valid or not according to the session state and the session information in the session characteristic information;
if yes, executing the following steps: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database.
Optionally, the preset tool name mapping information further includes a feature library, and after the step of matching the SQL feature in the session feature information with the preset tool name mapping table, the method further includes:
and if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, matching the binary feature in the session feature information with a preset feature library to obtain the tool name for accessing the database.
Optionally, the step of obtaining the session packet information of the access database includes:
when the access tool establishes a session with the database, session message information of the access database is obtained.
Optionally, the step of extracting session feature information from the session packet information includes:
and extracting SQL characteristics, binary characteristics, session state and session information from the session message information.
Optionally, the step of matching the extracted session feature information with preset tool name mapping information to obtain a tool name for accessing the database further includes:
and caching the tool name, the session information and the session state for accessing the database.
The application embodiment further provides an identification device for accessing the database tool name, and the identification device for accessing the database tool name includes:
the acquisition module is used for acquiring the session message information for accessing the database;
the extraction module is used for extracting the session characteristic information from the session message information;
and the matching module is used for matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
The embodiment of the present application further provides a terminal device, where the terminal device includes a memory, a processor, and an identification program stored in the memory and capable of running on the processor, and the identification program for accessing the database tool name is executed by the processor to implement the step of the identification method for accessing the database tool name.
The embodiment of the application also provides a storage medium, wherein the storage medium is stored with an identification program for accessing the database tool name, and the identification program for accessing the database tool name is executed by a processor to realize the steps of the identification method for accessing the database tool name.
The application provides a method, a device, equipment and a storage medium for identifying a tool name of an access database. Obtaining the session message information of an access database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the method and the device, when no tool name information exists in the message, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information and matching the characteristic information with the preset tool name mapping information.
Drawings
Fig. 1 is a schematic diagram of a functional module of a terminal device to which an identification apparatus for accessing a database tool name belongs;
FIG. 2 is a schematic flow chart diagram illustrating a first exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 3 is a flowchart illustrating a second exemplary embodiment of a method for identifying tool names for accessing a database according to the present application;
FIG. 4 is a flowchart illustrating a third exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 5 is a flowchart illustrating a fourth exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 6 is a schematic flow chart diagram illustrating a fifth exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 7 is a flowchart illustrating a sixth exemplary embodiment of a method for identifying tool names of an access database according to the present application;
FIG. 8 is a flowchart of a seventh exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
fig. 9 is a flowchart illustrating an eighth exemplary embodiment of the identification method for accessing a database tool name according to the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and do not limit the present application.
The main solution of the embodiment of the application is to obtain the session message information of the access database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the scheme, when the message is acquired without tool name information, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information and matching the characteristic information with the preset tool name mapping information.
Specifically, referring to fig. 1, fig. 1 is a schematic diagram of functional modules of a terminal device to which an identification apparatus for a database tool name of the present application belongs. The identification device for the tool name of the database is a device which is based on terminal equipment and can conveniently obtain the tool name for accessing the database by extracting characteristic information to match with preset tool name mapping information when no tool name information exists in a message, and the device can be borne on the terminal equipment in a hardware or software mode.
In this embodiment, the terminal device to which the database tool name recognition apparatus belongs at least includes an output module 110, a processor 120, a memory 130, and a communication module 140.
The memory 130 stores therein an operating system and an identification program of a database tool name, and the identification device of the database tool name can acquire session message information for accessing the database; extracting session characteristic information from the session message information; matching the extracted session characteristic information with preset tool name mapping information to obtain information such as tool names for accessing the database and storing the information in the memory 130; the output module 110 may be a display screen or the like. The communication module 140 may include a WIFI module, a mobile communication module, a bluetooth module, and the like, and communicates with an external device or a server through the communication module 140.
Wherein the identification program of the database tool name in the memory 130, when executed by the processor, implements the steps of:
acquiring session message information of an access database;
extracting session characteristic information from the session message information;
and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
Further, the preset tool name mapping information includes a preset tool name mapping table, and when executed by the processor, the database tool name recognition program in the memory 130 further implements the following steps:
matching the SQL features in the session feature information with the preset tool name mapping table;
and if the matching is successful, obtaining the tool name for accessing the database.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
judging whether the session message information is effective or not according to the session state and the session information in the session characteristic information;
if yes, executing the following steps: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
and if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, matching the binary feature in the session feature information with a preset feature library to obtain the tool name for accessing the database.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
and when the access tool establishes a session with the database, acquiring the session message information of the access database.
Further, the identification procedure of the database tool name in the memory 130 when executed by the processor further realizes the following steps:
and extracting SQL characteristics, binary characteristics, session state and session information from the session message information.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
and caching the tool name, the session information and the session state for accessing the database.
Based on the above terminal device architecture but not limited to the above architecture, embodiments of the method of the present application are provided.
Referring to fig. 2, fig. 2 is a flowchart illustrating a first exemplary embodiment of a method for identifying a tool name of a database. The identification method of the database tool name comprises the following steps:
step S110, obtaining the session message information of the access database;
specifically, after the database is connected with the client access tool through a TCP/IP protocol, three-way handshake connection is completed, and the connected message information is acquired at the client or the database or a third terminal independent of the database and the client.
Step S120, extracting session characteristic information from the session message information;
specifically, in step S110, the message of the SQL execution statement sent by the client to the server after the request connection is successful is obtained, and information such as the IP address, the source port, the destination port, the executed SQL statement or the binary feature of the client and the database may be extracted from the message.
And step S130, matching the extracted session characteristic information with preset tool name mapping information to obtain a tool name for accessing the database.
Specifically, the extracted information of the client and the database, such as the IP address, the source port, the destination port, the executed SQL statement or binary feature, is matched with the preset tool name mapping information, and it is specifically determined which information is matched according to the actual situation.
According to the scheme, the embodiment specifically obtains the session message information of the access database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the scheme, when the message is acquired without tool name information, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information and matching the characteristic information with the preset tool name mapping information.
Further, referring to fig. 3, fig. 3 is a flowchart illustrating a second exemplary embodiment of the method for identifying a tool name for accessing a database, where the preset tool name mapping information includes a preset tool name mapping table, and the step of matching the extracted session feature information with the preset tool name mapping information to obtain the tool name for accessing the database includes:
step S1301, matching the SQL features in the session feature information with the preset tool name mapping table;
specifically, the SQL features of different client access tools are different, and the corresponding tool name is determined by extracting the features and matching the features with a preset tool name mapping table, where the tool name mapping table stores the mapping between the tool name and the SQL features, and the tool name and the corresponding SQL features of the common access database.
Step S1302, if the matching is successful, the tool name for accessing the database is obtained.
According to the scheme, the SQL feature in the session feature information is matched with the preset tool name mapping table; and if the matching is successful, obtaining the tool name for accessing the database. Based on the scheme, the effect of conveniently obtaining the tool name for accessing the database when the information without the tool name in the message is obtained is achieved.
Further, referring to fig. 4, fig. 4 is a flowchart illustrating a third exemplary embodiment of the method for identifying a tool name for accessing a database, where the step of matching the extracted session feature information with a preset tool name mapping table to obtain a tool name for accessing the database includes:
step 1300, judging whether the session message information is valid according to the session state and the session information in the session feature information.
Specifically, the session characteristic information includes at least a session state and session information, the session state is a connection state of TCP/IP, it can be ensured that the acquired tool name is valid by judging whether the state is valid, otherwise, the session is invalid, and the acquisition of the tool name is invalid, thereby avoiding resource waste; the session information mainly includes whether the IP addresses and ports of the client tool and the database end are valid or not, and whether the sending and receiving objects of the acquired session information message are correct or not.
In step S1306, if valid, the method performs the steps of: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database.
According to the scheme, whether the session message information is valid is judged specifically according to the session state and the session information in the session characteristic information; if yes, executing the following steps: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database. Based on the scheme, by judging whether the session state and the session information in the session characteristic information are effective or not, meaningless acquisition of session message information is avoided, and resource waste is avoided.
Further, referring to fig. 5, fig. 5 is a schematic flowchart of a fourth exemplary embodiment of the method for identifying a tool name for accessing a database, where the preset tool name mapping information further includes a feature library, and the step of matching the SQL feature in the session feature information with the preset tool name mapping table further includes:
step S1303, if the matching between the SQL features in the session feature information and the preset tool name mapping table fails, matching the binary features in the session feature information with a preset feature library to obtain the tool name for accessing the database.
Specifically, when the matching of the session feature information and a preset tool name mapping table fails, matching is performed through a binary feature and a preset feature library, the binary feature is a binary system of tool-related information during login, and a mapping relation between the binary feature during login request and a corresponding tool name for accessing a database is stored in the feature library, so that tool name mapping information is determined.
By the above scheme, in particular, if the matching between the SQL features in the session feature information and the preset tool name mapping table fails, the binary features in the session feature information are matched with a preset feature library to obtain the tool name for accessing the database. Based on the scheme, the binary characteristics related to the request tool and extracted from the logged-in message are matched with the characteristic library, so that the effect of conveniently obtaining the tool name for accessing the database is achieved.
Further, referring to fig. 6, fig. 6 is a schematic flowchart of a fifth exemplary embodiment of the method for identifying a tool name of an access database, where the step of obtaining the session packet information of the access database includes:
step S1101, when the access tool establishes a session with the database, acquiring session message information of the access database.
Specifically, by obtaining the session message information when the access tool establishes a session with the database, binary information related to the access tool, IP addresses and ports of the access tool and the database, and SQL feature information may be extracted.
By the above scheme, in the embodiment, specifically, when the access tool establishes a session with the database, the session message information for accessing the database is acquired. Based on the scheme, the session message information when the access tool establishes the session with the database is obtained, the relevant information about the login of the access tool can be obtained, and the purpose of obtaining more information about the access tool from the session message is achieved.
Further, referring to fig. 7, fig. 7 is a flowchart illustrating a sixth exemplary embodiment of the identification method for accessing a database tool name, where the step of extracting the session feature information from the session message information includes:
step S1201, extracting SQL characteristics, binary characteristics, session state, and session information from the session packet information.
Specifically, the SQL characteristics of different client access tools are different, the session state is the TCP/IP connection state, it can be ensured that the obtained tool name is valid by determining whether the state is valid, the session information mainly includes the IP addresses and ports of the client tool and the database, and the binary characteristic is the binary information carried when logging in by using the access database tool.
In this embodiment, by using the above scheme, the SQL feature, the session state, and the session information are specifically extracted from the session message information. Data support is provided for judging whether the session message information is effective and matching tool name mapping information subsequently through the acquired information.
Further, referring to fig. 8, fig. 8 is a flowchart illustrating a seventh exemplary embodiment of the method for identifying a tool name for accessing a database, where the step of matching the extracted session feature information with preset tool name mapping information to obtain a tool name for accessing the database further includes:
step S1305, caching the tool name, the session information, and the session state for accessing the database.
According to the scheme, the tool name of the session message information sending tool can be quickly identified by caching the tool name, the session information and the session state of the access database.
Further, referring to fig. 9, fig. 9 is a flowchart illustrating an eighth exemplary embodiment of the identification method for accessing a database tool name, where the specific steps of the flowchart are as follows:
first, a session connection between the access tool and the database is established, starting as shown in fig. 9.
After three handshakes with a database server, SQL and characteristics are extracted, namely session message information is obtained, and binary characteristic information, session state and the like including but not limited to SQL characteristics and tool login are extracted;
matching the extracted information with session information, a tool name mapping table, an intermediate state and the like in sequence, and judging whether the information is consistent with the session information, the tool name mapping table, the intermediate state and the like;
if the matching is successful, the tool name of the current visit is obtained;
if the matching fails, matching the binary characteristic with the characteristic library, and recording the intermediate state to obtain the tool name of the current visit;
and caching the binding information of the session information and the tool name.
In addition, an embodiment of the present application further provides an identification apparatus for accessing a database tool name, where the identification apparatus for accessing a database tool name includes:
the acquisition module is used for acquiring the session message information for accessing the database;
the extraction module is used for extracting session characteristic information from the session message information;
and the matching module is used for matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
In addition, the embodiment of the present application further provides a terminal device, where the terminal device includes a memory, a processor, and an identification program of an access database tool name that is stored in the memory and is executable on the processor, and the identification program of the access database tool name implements the step of the identification method of the access database tool name when executed by the processor.
Since the identification program for accessing the database tool name is executed by the processor, all technical solutions of all the foregoing embodiments are adopted, so that at least all the beneficial effects brought by all the technical solutions of all the foregoing embodiments are achieved, and no further description is given here.
In addition, an embodiment of the present application further provides a readable storage medium, where the storage medium stores an identification program of an access database tool name, and the identification program of the access database tool name, when executed by a processor, implements the steps of the identification method of the access database tool name.
Since the identification program for accessing the database tool name is executed by the processor, all technical solutions of all the foregoing embodiments are adopted, so that at least all the beneficial effects brought by all the technical solutions of all the foregoing embodiments are achieved, and no further description is given here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of other like elements in a process, method, article, or system comprising the element.
The above-mentioned serial numbers of the embodiments of the present application are merely for description, and do not represent the advantages and disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, a controlled terminal, or a network device) to execute the method of each embodiment of the present application.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all the equivalent structures or equivalent processes that can be directly or indirectly applied to other related technical fields by using the contents of the specification and the drawings of the present application are also included in the scope of the present application.

Claims (10)

1. An identification method for accessing a database tool name is characterized by comprising the following steps:
acquiring session message information for accessing a database;
extracting session characteristic information from the session message information;
and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
2. The method according to claim 1, wherein the preset tool name mapping information comprises a preset tool name mapping table, and the step of matching the extracted session feature information with the preset tool name mapping information to obtain the tool name for accessing the database comprises:
matching the SQL features in the session feature information with the preset tool name mapping table;
and if the matching is successful, obtaining the tool name for accessing the database.
3. The method for identifying tool names for accessing a database according to claim 2, wherein the step of matching the extracted session feature information with a preset tool name mapping table to obtain tool names for accessing the database comprises:
judging whether the session message information is valid or not according to the session state and the session information in the session characteristic information;
if yes, executing the following steps: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database.
4. The method according to claim 2, wherein the preset tool name mapping information further includes a feature library, and the step of matching the SQL feature in the session feature information with the preset tool name mapping table further includes:
and if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, matching the binary feature in the session feature information with a preset feature library to obtain the tool name for accessing the database.
5. The method according to claim 3, wherein the step of extracting session feature information from the session message information comprises:
and extracting SQL characteristics, binary characteristics, session state and session information from the session message information.
6. The method for identifying the tool name of the access database according to claim 1, wherein the step of obtaining the session message information of the access database comprises:
and when the access tool establishes a session with the database, acquiring the session message information of the access database.
7. The method for identifying tool names according to claim 5, wherein the step of matching the extracted session feature information with preset tool name mapping information to obtain tool names for accessing the database further comprises:
and caching the tool name, the session information and the session state for accessing the database.
8. An apparatus for identifying a name of an access database tool, the apparatus comprising:
the acquisition module is used for acquiring the session message information of the access database;
the extraction module is used for extracting the session characteristic information from the session message information;
and the matching module is used for matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
9. A terminal device, characterized in that the terminal device comprises a memory, a processor and an identification program of an access database tool name stored on the memory and executable on the processor, the identification program of the access database tool name realizing the steps of the identification method of the access database tool name according to any one of claims 1-7 when executed by the processor.
10. A storage medium having stored thereon an identification program for an access database tool name, the identification program for an access database tool name realizing the steps of the identification method for an access database tool name according to any one of claims 1 to 7 when executed by a processor.
CN202211629981.7A 2022-12-19 2022-12-19 Method, device, equipment and storage medium for identifying tool name of access database Active CN115618342B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211629981.7A CN115618342B (en) 2022-12-19 2022-12-19 Method, device, equipment and storage medium for identifying tool name of access database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211629981.7A CN115618342B (en) 2022-12-19 2022-12-19 Method, device, equipment and storage medium for identifying tool name of access database

Publications (2)

Publication Number Publication Date
CN115618342A true CN115618342A (en) 2023-01-17
CN115618342B CN115618342B (en) 2023-03-28

Family

ID=84879687

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211629981.7A Active CN115618342B (en) 2022-12-19 2022-12-19 Method, device, equipment and storage medium for identifying tool name of access database

Country Status (1)

Country Link
CN (1) CN115618342B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070271570A1 (en) * 2006-05-17 2007-11-22 Brown Douglas P Managing database utilities to improve throughput and concurrency
JP2008077285A (en) * 2006-09-20 2008-04-03 Hitachi Information Systems Ltd Sql management system and sql management method and program
CN101505276A (en) * 2009-03-23 2009-08-12 杭州华三通信技术有限公司 Network application flow recognition method and apparatus and network application flow management apparatus
JP2009211588A (en) * 2008-03-06 2009-09-17 Nec Corp Analysis information sampling device of database access delay, analysis information sampling method, and program
GB0914797D0 (en) * 2008-10-06 2009-09-30 Ibm Method and system for identifying applications in a database system
CN103902565A (en) * 2012-12-26 2014-07-02 阿里巴巴集团控股有限公司 Method and device for determining data access relation
US20140280259A1 (en) * 2013-03-15 2014-09-18 Oracle International Corporation Run-time sql language translation
CN104184723A (en) * 2014-07-28 2014-12-03 华为技术有限公司 Application identifying method and device and network equipment
CN104660636A (en) * 2013-11-20 2015-05-27 华为技术有限公司 Peer-to-peer application identification processing method and peer-to-peer application identification processing device
US20170103106A1 (en) * 2015-10-07 2017-04-13 International Business Machines Corporation Processing sql statement in alternating modes
CN106970939A (en) * 2017-02-14 2017-07-21 深圳昂楷科技有限公司 A kind of database audit method and its system
CN107590259A (en) * 2017-09-21 2018-01-16 浪潮软件股份有限公司 The dissemination method and device of a kind of data, services
CN108573156A (en) * 2018-04-25 2018-09-25 杭州闪捷信息科技股份有限公司 A method of the database risk detection based on SQL sequences
CN110413638A (en) * 2019-08-27 2019-11-05 中信百信银行股份有限公司 A kind of SQL detection device and method
CN111182072A (en) * 2019-12-31 2020-05-19 奇安信科技集团股份有限公司 Application identification method and device of session request and computer equipment
CN113420007A (en) * 2021-03-31 2021-09-21 阿里巴巴新加坡控股有限公司 Audit processing method and device for database access and electronic equipment
CN115481106A (en) * 2022-09-13 2022-12-16 北京天融信网络安全技术有限公司 MongoDB database-based analysis method, device, equipment and medium

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070271570A1 (en) * 2006-05-17 2007-11-22 Brown Douglas P Managing database utilities to improve throughput and concurrency
JP2008077285A (en) * 2006-09-20 2008-04-03 Hitachi Information Systems Ltd Sql management system and sql management method and program
JP2009211588A (en) * 2008-03-06 2009-09-17 Nec Corp Analysis information sampling device of database access delay, analysis information sampling method, and program
GB0914797D0 (en) * 2008-10-06 2009-09-30 Ibm Method and system for identifying applications in a database system
CN101505276A (en) * 2009-03-23 2009-08-12 杭州华三通信技术有限公司 Network application flow recognition method and apparatus and network application flow management apparatus
CN103902565A (en) * 2012-12-26 2014-07-02 阿里巴巴集团控股有限公司 Method and device for determining data access relation
US20140280259A1 (en) * 2013-03-15 2014-09-18 Oracle International Corporation Run-time sql language translation
CN104660636A (en) * 2013-11-20 2015-05-27 华为技术有限公司 Peer-to-peer application identification processing method and peer-to-peer application identification processing device
CN104184723A (en) * 2014-07-28 2014-12-03 华为技术有限公司 Application identifying method and device and network equipment
US20170103106A1 (en) * 2015-10-07 2017-04-13 International Business Machines Corporation Processing sql statement in alternating modes
CN106970939A (en) * 2017-02-14 2017-07-21 深圳昂楷科技有限公司 A kind of database audit method and its system
CN107590259A (en) * 2017-09-21 2018-01-16 浪潮软件股份有限公司 The dissemination method and device of a kind of data, services
CN108573156A (en) * 2018-04-25 2018-09-25 杭州闪捷信息科技股份有限公司 A method of the database risk detection based on SQL sequences
CN110413638A (en) * 2019-08-27 2019-11-05 中信百信银行股份有限公司 A kind of SQL detection device and method
CN111182072A (en) * 2019-12-31 2020-05-19 奇安信科技集团股份有限公司 Application identification method and device of session request and computer equipment
CN113420007A (en) * 2021-03-31 2021-09-21 阿里巴巴新加坡控股有限公司 Audit processing method and device for database access and electronic equipment
CN115481106A (en) * 2022-09-13 2022-12-16 北京天融信网络安全技术有限公司 MongoDB database-based analysis method, device, equipment and medium

Also Published As

Publication number Publication date
CN115618342B (en) 2023-03-28

Similar Documents

Publication Publication Date Title
TWI475863B (en) Secure resource name resolution using a cache
CN110808897A (en) Proxy access method, user equipment, storage medium, device and system
US10743183B2 (en) Method and device for realizing wireless access point connection authentication
CN111049844B (en) Internet access behavior management method, device, equipment and storage medium based on Socks agents
US20080244514A1 (en) Scriptable object model for network based services
CN110795174A (en) Application program interface calling method, device, equipment and readable storage medium
CN103581881B (en) Comprehensive number-obtaining device as well as system and method for obtaining cell phone number of user on network side
CN106856575B (en) Automatic configuration method of IPTV terminal, server and IPTV system
CN111901151A (en) Method, device, equipment and medium for gateway equipment to manage IOT equipment
CN115618342B (en) Method, device, equipment and storage medium for identifying tool name of access database
US7386617B2 (en) Method, system and program product for managing multiple network application versions
CN108123807B (en) System and method for tracing user identity in broadband network
CN109413049B (en) Data safety communication method and system based on web map transmission
CN114006724B (en) Method and system for discovering and authenticating encryption DNS resolver
CN107018140B (en) Authority control method and system
CN107071040B (en) Authority control method and system based on file descriptor and session
CN113709187B (en) Multi-server data request method, device, equipment and storage medium
CN115695400A (en) Method and terminal for interaction between Web page and local application
CN111770203B (en) Automatic evidence obtaining method and system based on GoIP equipment
CN114491328A (en) Website access method, equipment, storage medium and device
CN113626789A (en) User operation request processing method and device and electronic equipment
CN108768987B (en) Data interaction method, device and system
CN112399379A (en) Intelligent Internet of vehicles communication protocol method, device, equipment and storage medium
CN107329713B (en) Cross-network-segment printing method and system
KR20090000289A (en) Network auto login system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant