CN104143064A - Website data security system based on association analysis of database activity and web access - Google Patents

Website data security system based on association analysis of database activity and web access Download PDF

Info

Publication number
CN104143064A
CN104143064A CN201310165877.1A CN201310165877A CN104143064A CN 104143064 A CN104143064 A CN 104143064A CN 201310165877 A CN201310165877 A CN 201310165877A CN 104143064 A CN104143064 A CN 104143064A
Authority
CN
China
Prior art keywords
data
access
web
website
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310165877.1A
Other languages
Chinese (zh)
Inventor
朱烨
袁晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310165877.1A priority Critical patent/CN104143064A/en
Publication of CN104143064A publication Critical patent/CN104143064A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

At present, web security protection aims to discover and prevent attack and suspicious actions in time, but in reality, there are still new bug/attack manners can escape from system detection and protection. Webmasters most concern about security of core data; in other words, how to prevent data leakage/ data tampering and corruption is the big problem which is in great need of being solved in the field of security protection. The website data security system adopts the database activity monitoring technology which is applied to the field front, realizes association and statistical analysis of web requests and responses, corresponding database access and feedback results to acquire a request mode set of normal access to the core data to the website, and further, checks the subsequent web access according to a rule generated by the set so as to discover suspicious data leakage/tampering actions, thus the difficult problem about website data security protection is solved thoroughly through a data security data backup component.

Description

Based on the website data security system of database activity and web access correlation analysis
Technical field
Technical field of the present invention is web portal security protection and the data security protection field of computer safety field.
Background technology
Along with the high speed development of internet, applications, various Web website is with the speed rapid growth of geometric series, but availability and security that the assault emerging in an endless stream/DDOS attacks Web website have caused huge threat.The security protection of main flow at present comprises the system of multiple types: intruding detection system, Web application firewall, telesecurity scanning etc.All these system/service all focus on and solve a problem: find in time and stop to attack and suspicious actions.Although Ge Jia manufacturer all declares that this type of protects safe enough; and realistic situation is detection and the protection that always has the new leak/new attack mode continuing to bring out and can escape from these systems; that is to say; to the client by these security protection systems, he cannot know whether my website has been attacked or invaded actually.Meanwhile, according to global authority mechanism investigation result, what portal management person was concerned about most is the safety of its core data in fact, even if attack and succeed in other words, can not cause the leakage of data, be tampered or damaged, this is the greatest problem that safety protection field is wished 100% guarantee most.The present invention is exactly the database activity monitoring technique (Database Activity Monitoring) in application industry forward position, by Web request and response, corresponding database access and returning results, jointly carry out association and make heuristic analysis (Heuristic Profiling), find suspicious data leak/tampering, thoroughly solve a website data security protection difficult problem.
As its name suggests, database activity monitoring technique, is exactly by special tools and techniques, and the SQL statement that client is initiated is carried out intelligent analysis and audit, to find suspicious data access behavior.This technology reaches its maturity in recent years, can catch in real time and record polytype, the SQL activity on the database of Multi-instance.But because independent SQL Acti auditing can not be distinguished the normal and abnormal access to website core data effectively; therefore the present invention pioneeringly accesses user the request/response key message that Web website produces; carry out correlation analysis the classification of taking statistics property with corresponding SQL activity, thereby guarantee that all abnormal access and abnormal movement can be found in time.Lift a typical case, certain URL inquiry of user-accessible transaction data in month in the past in person, if and system discovery of the present invention has the access of certain this URL to attempt other people transaction data of inquiry, or the data of passing by a year in person, or returned and recorded quantity and obviously result set different from the past of field, can be judged to be abnormal access.
Summary of the invention
The present invention has set up a set of Web website data security protection system based on database activity and web access correlation analysis, and it comprises following three assemblies in logic:
be deployed in the data acquisition assembly (this assembly also can integrated traditional Web intrusion detection and protection engine) of same logical layer with website application layer, it is divided into again two submodules: Web request/response monitoring module and database activity monitoring module;
correlation engine and the administrative center's assembly disposed separately, be responsible for collection, assemble, Regularization (normalize), the data that classification (categorization) or cluster (clustering) and associated (correlate) acquisition component are uploaded, and generate audit regulation didactic or that keeper arranges as required, apply these rules simultaneously real-time flow is detected, finding when suspicious actions and alarm notice protection engine are taked safeguard measure automatically;
the 3rd is relatively independent data safety backup assembly, can be according to the core data of tactful timed backup website, and to guarantee last ring of data security, can fast quick-recovery after data are damaged.
Below will set forth for the pioneering content of the present invention in the first two assembly:
Data acquisition assembly: by the static content request of access first filtering out without monitoring, and after correlation engine heuristic analysis, confirm countless Web according to potential safety hazard request, then by the information of intercepting and capturing in network layer and the information recording directly obtaining in the daily record from Web service (as Apache/Tomcat) be uploaded to correlation engine.Comprise for associated metamessage: Web request and response (request URL, user ID/session id of requestor, required parameter, the identification informations such as corresponding Action method name/entrance function/Thread Id are processed in request, structure/the size of response contents, sensitive data block sampling content in response etc.), database activity (SQL asks and returns results).Wherein how each Web request being mapped with the database manipulation of its initiation, is the key that subsequent association is analyzed.The present invention proposes a kind of pioneering method, in the upper loading of plug-in module of Web server (as Apache/Tomcat), for the Web website application layer building based on J2EE/PHP etc. of main flow, intercept and capture the identification information that it is transmitted to URL request certain background process entrance, record all SQL operations of calling during whole processing of this processing threads simultaneously.And based on above-mentioned information, just certain Web request can be mapped completely with database manipulation and the result set of its initiation.
Correlation engine and administrative center's assembly: obtain after information that acquisition component uploads, automatic analysis is gone out each URL access by correlation engine will cause for which SQL access and composite sequence thereof, which field information will which table of acquisition; By to identical URL but cluster and the heuristic analysis of different parameters, by obtaining this URL, to SQL, which access has plant the classification of Different Results, and other information that its and this URL asks are as the statistical rule between user/session id; Final manual checking and the adjustment also needing through keeper, obtains all request mode set that normally core data conducted interviews in this website.After this in constantly improving this set, this engine rule of also auditing, the suspicious access that is about to not meet this pattern is found out, and finds data leakage/tampering.
Three aspects: for data security threatens, and the present invention provides effective detecting and protection.Attempt parameter by any legal URL and page logic while revising illegally obtain/Update Table when there being external attacker, correlation engine all can find that this access has caused the not access of the SQL in normal mode set or returned results, thereby risk is revealed/distorted to discovery data.In the time that assailant increases illegal URL newly on website, correlation engine also can be found the legal URL that this and non-administrator add by administrative center.Finally, even if attack is succeeded and destroyed core data, SQL Operation Log and data backup assembly that the administrative center in the present invention also can preserve by this locality recover core data set rapidly.
Brief description of the drawings
The structural representation of this system of Fig. 1
This working-flow of Fig. 2 figure
Embodiment
The embodiment of native system is as follows;
1, affix one's name to the data acquisition assembly of system of the present invention at the consolidated network intra-zone at application layer place, website, be included in the Web server deploy card module at application layer place.This plug-in unit should be achieved as follows function: for the Web website application layer building based on J2EE/PHP etc. of main flow, intercept and capture the identification information that it is transmitted to URL request certain background process entrance, record all SQL operations of calling during whole processing of this processing threads simultaneously.The data acquisition function that this black box should be achieved as follows: by the information of intercepting and capturing in network layer and the information recording directly obtaining in the daily record from Web service (as Apache/Tomcat) be uploaded to correlation engine.Comprise for associated metamessage: Web request and response (request URL, user ID/session id of requestor, required parameter, the identification informations such as corresponding Action method name/entrance function/Thread Id are processed in request, structure/the size of response contents, sensitive data block sampling content in response etc.), database activity (SQL asks and returns results).
2, on the correlation engine and management center server disposed separately, to be achieved as follows function: the information of uploading based on acquisition component, automatic analysis goes out each URL access will cause for which SQL access and composite sequence thereof, will obtain which field information of which table; By to identical URL but cluster and the heuristic analysis of different parameters, which access has plant the classification of Different Results to SQL to obtain this URL, and other information that its and this URL asks are as the statistical rule between user/session id; Final manual checking and the adjustment also needing through keeper, obtains all request mode set that normally core data conducted interviews in this website.
3,, after one period of stationary phase, on correlation engine, for the request of each legal URL+ specific parameters combinations, all generated corresponding SQL operational set and returned results characteristic set.Keeper is after administrative center has started didactic audit regulation, correlation engine is in constantly improving above-mentioned information, also can be for the request of access of newly arrived each URL and parameter combinations, check its SQL operational set and return results feature whether meet the legal operational set having generated.If do not met, be judged to be suspicious actions and report to the police.
4, the optional assembly of this system can be included in application layer protection engine before, can be with reference to the realization of traditional Web application firewall, and the alert notice herein sending based on administrative center is taked corresponding safeguard procedures, as blocks this IP or similar subsequent access.
5, keeper receives after warning, can check by hand whether this suspicious access has brought the safety hazard to core data, if had, optionally take recovery measure, can be by data backup component recovery to last backup point, the SQL Operation Log that also can file based on administrative center optionally recovers the data that are tampered/destroy.If this warning is erroneous judgement, can manually adds/adjust and change the related information set that URL is corresponding.
6, native system can move constantly oneself's evolution constantly along with website, finally reaches efficient data security protection.The related information that the code upgrade of irregularly carrying out for website causes changes, and keeper can reset these URL for newly-increased state by administrative center, thereby makes correlation engine can restart to accumulate data and rebuild heuristic rule.

Claims (7)

1. a critical data that ensures Web website is avoided data leakage, and the system of data tampering and corrupted data comprises:
Find and stop possible data to be revealed and data tampering behavior by analyzing Web website visiting record and correspondence database activity;
By pressing the data of named policer timed backup website, to guarantee the fast quick-recovery of energy after data are damaged.
2. in claim 1, find that by analyzing Web website visiting record and correspondence database activity the method that data security threatens comprises:
Web website visiting record is carried out associated with the database activity that this access causes;
By analyzing associated data or a certain amount of recorded information in a period of time, obtain the set of request/resulting schema that this website conducts interviews to data under normal circumstances;
Based on the set of this normal request pattern, automatically or by hand generate the rule that subsequent access is checked, in the time finding that there is the access varying from a rule, be judged to be suspicious data and reveal or tampering.
3. after method described in claim 2 is found suspicious access, be used for stoping follow-up data to reveal, or distort, or the method for other attacks can be included in the guard assembly of accessing for blocking malice in claim 1, can be also to notify other intrusion detections of this system outside and guard system to take measures to stop.
4. in claim 2, it can be any method that all database activity of web access request follow-up direct or indirect generation with it are associated that the database activity that Web website visiting record is caused with this access is carried out associated method; Also can be any method that the data acquisition obtaining from site databases of web access request generation follow-up with it is associated; Also can be any method that the response contents that comprises website data of web access request generation follow-up with it is associated.
5. the request mode in claim 2 refers to the metastable relation between behavior database and a return data results set web access (comprising the parameter that URL request and this request are carried) and it causing.In the situation that not illegal/malice is accessed, obtain pattern corresponding to all normal web accesss and formed a set, the follow-up not access module in this set can be judged to be suspicious behavior.
6. in claim 2, the method for correlation analysis comprises
Classification analysis: the different behavior database that identical request of access is produced is divided into several classification of homogeny/similarity;
Cluster analysis: the behavior database that has similar features that different access request is produced carries out cluster, is finally divided into representational some classifications;
Association analysis: use the heuristic analysis that comprises algorithms of different and artificial regulation rule to find the relation between all web access and behavior databases of its initiation under normal circumstances.
7. the database in claim 1 can be any Database Systems, can be also NoSQL system, can be also data warehouse, can be also the system of the critical data of this required protection in website of any storage.
CN201310165877.1A 2013-05-08 2013-05-08 Website data security system based on association analysis of database activity and web access Pending CN104143064A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310165877.1A CN104143064A (en) 2013-05-08 2013-05-08 Website data security system based on association analysis of database activity and web access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310165877.1A CN104143064A (en) 2013-05-08 2013-05-08 Website data security system based on association analysis of database activity and web access

Publications (1)

Publication Number Publication Date
CN104143064A true CN104143064A (en) 2014-11-12

Family

ID=51852234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310165877.1A Pending CN104143064A (en) 2013-05-08 2013-05-08 Website data security system based on association analysis of database activity and web access

Country Status (1)

Country Link
CN (1) CN104143064A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833499A (en) * 2018-05-28 2018-11-16 北京浩科技有限公司 The data processing method and device of hypertext transfer protocol, server
CN111092910A (en) * 2019-12-30 2020-05-01 深信服科技股份有限公司 Database security access method, device, equipment, system and readable storage medium
CN112199677A (en) * 2020-11-03 2021-01-08 安徽中安睿御科技有限公司 Data processing method and device
CN112769853A (en) * 2021-01-20 2021-05-07 付中野 Internet data intrusion detection method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020082886A1 (en) * 2000-09-06 2002-06-27 Stefanos Manganaris Method and system for detecting unusual events and application thereof in computer intrusion detection
CN1553293A (en) * 2003-12-19 2004-12-08 华中科技大学 Cooperative invading testing system based on distributed data dig
US20100017870A1 (en) * 2008-07-18 2010-01-21 Agnik, Llc Multi-agent, distributed, privacy-preserving data management and data mining techniques to detect cross-domain network attacks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020082886A1 (en) * 2000-09-06 2002-06-27 Stefanos Manganaris Method and system for detecting unusual events and application thereof in computer intrusion detection
CN1553293A (en) * 2003-12-19 2004-12-08 华中科技大学 Cooperative invading testing system based on distributed data dig
US20100017870A1 (en) * 2008-07-18 2010-01-21 Agnik, Llc Multi-agent, distributed, privacy-preserving data management and data mining techniques to detect cross-domain network attacks

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李卫强: "基于数据库的入侵检测技术的研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
董晓梅 等: "基于关联规则数据挖掘的数据库系统入侵检测方法", 《第十九届数据库学术会议论文集(研究报告篇)》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833499A (en) * 2018-05-28 2018-11-16 北京浩科技有限公司 The data processing method and device of hypertext transfer protocol, server
CN111092910A (en) * 2019-12-30 2020-05-01 深信服科技股份有限公司 Database security access method, device, equipment, system and readable storage medium
CN112199677A (en) * 2020-11-03 2021-01-08 安徽中安睿御科技有限公司 Data processing method and device
CN112769853A (en) * 2021-01-20 2021-05-07 付中野 Internet data intrusion detection method and device

Similar Documents

Publication Publication Date Title
CN107958322B (en) Urban network space comprehensive treatment system
Dong et al. Real-time network intrusion detection system based on deep learning
CN102902928B (en) Method and device for webpage integrity assurance
CN112560027A (en) Data safety monitoring system
CN104283889A (en) Electric power system interior APT attack detection and pre-warning system based on network architecture
US10645100B1 (en) Systems and methods for attacker temporal behavior fingerprinting and grouping with spectrum interpretation and deep learning
CN108154029A (en) Intrusion detection method, electronic equipment and computer storage media
US10505986B1 (en) Sensor based rules for responding to malicious activity
CN109347808B (en) Safety analysis method based on user group behavior activity
CN107612924A (en) Attacker's localization method and device based on wireless network invasion
Al-Dhaqm et al. A generic database forensic investigation process model
CN103561012A (en) WEB backdoor detection method and system based on relevance tree
CN107426196B (en) Method and system for identifying WEB invasion
CN113542279A (en) Network security risk assessment method, system and device
CN114003903B (en) Network attack tracing method and device
CN108337269A (en) A kind of WebShell detection methods
CN107154939A (en) A kind of method and system of data tracing
CN112560029A (en) Website content monitoring and automatic response protection method based on intelligent analysis technology
WO2020016906A1 (en) Method and system for intrusion detection in an enterprise
CN104143064A (en) Website data security system based on association analysis of database activity and web access
Suo et al. Research on the application of honeypot technology in intrusion detection system
CN107509200A (en) Equipment localization method and device based on wireless network invasion
Aldwairi et al. Flukes: Autonomous log forensics, intelligence and visualization tool
Okereafor et al. A review of application challenges of digital forensics
CN114257403B (en) False alarm detection method, equipment and readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141112