CN105337976A - Real-time high-efficiency database audit realization method - Google Patents

Real-time high-efficiency database audit realization method Download PDF

Info

Publication number
CN105337976A
CN105337976A CN201510747643.7A CN201510747643A CN105337976A CN 105337976 A CN105337976 A CN 105337976A CN 201510747643 A CN201510747643 A CN 201510747643A CN 105337976 A CN105337976 A CN 105337976A
Authority
CN
China
Prior art keywords
data packets
effective data
packet
database audit
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510747643.7A
Other languages
Chinese (zh)
Inventor
何建锋
杨斌
武博
龚建国
荆胜利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiepu Network Science & Technology Co Ltd Xi'an Jiaoda
Original Assignee
Jiepu Network Science & Technology Co Ltd Xi'an Jiaoda
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiepu Network Science & Technology Co Ltd Xi'an Jiaoda filed Critical Jiepu Network Science & Technology Co Ltd Xi'an Jiaoda
Priority to CN201510747643.7A priority Critical patent/CN105337976A/en
Publication of CN105337976A publication Critical patent/CN105337976A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • G06F16/24578Query processing with adaptation to user needs using ranking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computational Linguistics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a real-time high-efficiency database audit realization method. A database audit device stores data packets received from a network interface card in a large memory area, through filtering and shunting the data packets, valid data packets are obtained for going into annular queues, layered processing is performed on the valid data packets obtained from the annular queues, and finally, recording and responding are performed on the valid data packets after the layered processing. According to the invention, the data packets in a network can be grabbed in real time, the data packets are stored in the large memory area distributed beforehand, pointer addresses of the data packets are added to the corresponding annular queues, the data packets are processed through a "zero copy" technology, and the processing speed of the data packets is greatly improved. At the same time, a packet capture engine performs filtering processing on vast data packets so that resource occupation of an audit system is substantially reduced; and since the multiple annular queues are corresponding to multiple analysis engines, such a concurrent processing mechanism improves the processing capability of the data packets.

Description

The database audit implementation method of real-time high-efficiency
Technical field
The invention belongs to database audit technical field, be specifically related to a kind of database audit method of real-time high-efficiency.
Background technology
Along with computer and network technologies development, the application of information system is more and more extensive.Database is as the core of information technology and basis, and carry increasing key service system, gradually become in business and public safety and have strategic assets most, can the safe and stable operation of database also directly decide operation system and normally use.
The development rapidly of the Internet makes the value of business data library information and accessibility be improved, and meanwhile, also causes database information assets to be faced with formidable challenges.The security threat of database is mainly from two aspects, and on the one hand from the illegal invasion of enterprise external, hacker, for operation system or database leak, takes various attack means, distorts or steals data.This part threat effectively can be prevented by disposing the product such as fire compartment wall, IPS at business network entrance.And threat is on the other hand from enterprises, the malicious sabotage of interior employee, violation operation and unauthorized access, often bring data leak in a large number and badly damaged, even cause Database Systems to be collapsed.And these operations often do not possess attack signature, be difficult to be identified by common Information Security Defending System, just more hard to guard against, protect in the urgent need to the effective means of one.
Summary of the invention
In view of this, main purpose of the present invention is the database audit implementation method providing a kind of real-time high-efficiency.
For achieving the above object, technical scheme of the present invention is achieved in that
The embodiment of the present invention provides a kind of database audit implementation method of real-time high-efficiency, the method is: the packet received from network interface card is stored in large memory field by database audit equipment, after described packet is filtered and is shunted, acquisition effective data packets enters annular and lines up, layered shaping is carried out to the effective data packets of lining up middle acquisition from described annular, finally the effective data packets after layered shaping is recorded and respond.
In such scheme, described by after filtering described packet and shunt, acquisition effective data packets enters annular and lines up, be specially: the paging having stored packet in the large memory field of described database audit equipment searching loop, read the packet of fixed number successively, and judge whether the source port of packet and destination interface are registered, if registered, determine that described packet is effective data packets and sends into corresponding flow queue, otherwise described packet is discharged from paging; For the effective data packets read from flow queue, five-tuple information according to described effective data packets determines hash value according to CRC20 algorithm, the queue that described effective data packets should flow into is determined, then by the circle queue of the pointer of described effective data packets stored in correspondence according to the described hash value determined.
In such scheme, the described effective data packets to lining up middle acquisition from described annular carries out layered shaping, finally the effective data packets after layered shaping recorded and respond, be specially: described database audit equipment obtains effective data packets from circle queue, too layer head is gone to described effective data packets, other layer protocols, IPV4/6 head, TCP head/UPD head operation, extract the application layer data in described effective data packets, then carry out corresponding plug-in unit to affiliated application layer data to resolve, parse the field of needs and mate with the field that audit strategy configures, if the match is successful, then the data field of parsing is built into daily record to carry out recording and responding.
In such scheme, described five-tuple information comprises source IP, object IP, source port, destination interface, agreement ID.
In such scheme, his layer protocol described comprises VLAN, L2TP, PPPOE, MPLS, self-defined tunneling.
In such scheme, described database audit equipment read simultaneously several annulars line up in valid data parallel carry out layered shaping, finally the effective data packets after layered shaping recorded and respond.
Compared with prior art, beneficial effect of the present invention:
The present invention can capture the packet in network in real time, by packet stored in the large memory field distributed in advance, and the pointer address of this packet is added in corresponding circle queue, the process of packet is realized by " zero-copy " technology, substantially increases the processing speed of packet.The engine of packet capturing simultaneously, by carrying out filtration treatment to mass data bag, significantly reduces the resource occupation of auditing system; Due to the corresponding multiple analysis engine of multiple circle queue, this concurrent processing mechanism, improves the disposal ability of packet.
Accompanying drawing explanation
Fig. 1 provides a kind of flow chart of database audit implementation method of real-time high-efficiency for the embodiment of the present invention.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.
The embodiment of the present invention provides a kind of database audit implementation method of real-time high-efficiency, and the method realizes especially by following steps:
Step 101: the packet received from network interface card is stored in large memory field by database audit equipment.
Concrete, the memory field opened up time described large internal memory position system starts.
Step 102: after filtering described packet and shunt, acquisition effective data packets enters annular and lines up.
Concrete, filter process: because each agreement of audit that needs can register its corresponding port information, so stored the paging of packet in the large memory field of described database audit equipment searching loop, read the packet of fixed number successively, and judge whether the source port of packet and destination interface are registered, if registered, determine that described packet is effective data packets and sends into corresponding flow queue, otherwise described packet is discharged from paging;
Branching process: for effective data packets, five-tuple information according to described effective data packets determines hash value according to CRC20 algorithm, the queue that described effective data packets should flow into is determined, then by the circle queue of the pointer of described effective data packets stored in correspondence according to the described hash value determined.
Described five-tuple information comprises source IP, object IP, source port, destination interface, agreement ID.
Step 103: layered shaping is carried out to the effective data packets of lining up middle acquisition from described annular, finally the effective data packets after layered shaping is recorded and respond.
Concrete, described circle queue is that prototype is transformed with round-robin queue, and circle queue joins end to end, and the bag be stored in circle queue take timestamp as order arrangement, stores the pointer of packet, is also the address of packet in internal memory.Circle queue comprises each one of pointer end to end, and head pointer is responsible for data fetch packet, and tail pointer is responsible for deposit data, when head and the tail point to same data area, represent that circle queue stores full, then by data release in the region of head pointer indication, ensure that data are from tail pointer always stored in circle queue.
Described database audit equipment obtains effective data packets from circle queue, too layer head, other layer protocols, IPV4/6 head, TCP head/UPD head operation are gone to described effective data packets, extract the application layer data in described effective data packets, then carry out corresponding plug-in unit to affiliated application layer data to resolve, parse the field of needs and mate with the field that audit strategy configures, if the match is successful, then the data field of parsing is built into daily record and carries out recording and responding; Otherwise this packet will discharge.
His layer protocol described comprises VLAN, L2TP, PPPOE, MPLS, self-defined tunneling.
Described database audit equipment read simultaneously several annulars line up in valid data parallel carry out layered shaping, finally the effective data packets after layered shaping recorded and respond.
The mysql protocol data bag of the ipv4 type encapsulating vlan head is such as got from circle queue, first the ether layer head of this packet and vlan head are removed, then ip head is removed, wrap if this packet is out of order bag or restructuring, this packet can store and carry out sorting and reorganization operation with other packets of this stream by analysis engine, tcp head is removed again after having operated, remaining application layer data is given mysql plug-in unit to go to resolve according to the protocol format of mysql, compare with the field in the strategy of configuration after mysql plug-in unit parses the field information of needs, if comparison success, is built into daily record and carries out recording and responding by the data field of parsing.
The process of described effective data packets completes, need to analyze data Packet analyzing result, carry out alarm for database violation operation, notification data library manager process in time, the analytic functions such as the inquiry of daily record, statistics are also provided, and can define according to user the form generating various form.
The above, be only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention.

Claims (6)

1. the database audit implementation method of a real-time high-efficiency, it is characterized in that, the method is: the packet received from network interface card is stored in large memory field by database audit equipment, after described packet is filtered and is shunted, acquisition effective data packets enters annular and lines up, layered shaping is carried out to the effective data packets of lining up middle acquisition from described annular, finally the effective data packets after layered shaping is recorded and respond.
2. the database audit implementation method of real-time high-efficiency according to claim 1, it is characterized in that, described by after filtering described packet and shunt, acquisition effective data packets enters annular and lines up, be specially: the paging having stored packet in the large memory field of described database audit equipment searching loop, read the packet of fixed number successively, and judge whether the source port of packet and destination interface are registered, if registered, determine that described packet is effective data packets and sends into corresponding flow queue, otherwise described packet is discharged from paging; For the effective data packets read from flow queue, five-tuple information according to described effective data packets determines hash value according to CRC20 algorithm, the queue that described effective data packets should flow into is determined, then by the circle queue of the pointer of described effective data packets stored in correspondence according to the described hash value determined.
3. the database audit implementation method of real-time high-efficiency according to claim 1, it is characterized in that, the described effective data packets to lining up middle acquisition from described annular carries out layered shaping, finally the effective data packets after layered shaping recorded and respond, be specially: described database audit equipment obtains effective data packets from circle queue, too layer head is gone to described effective data packets, other layer protocols, IPV4/6 head, TCP head/UPD head operation, extract the application layer data in described effective data packets, then carry out corresponding plug-in unit to affiliated application layer data to resolve, parse the field of needs and mate with the field that audit strategy configures, if the match is successful, then the data field of parsing is built into daily record to carry out recording and responding.
4. the database audit implementation method of real-time high-efficiency according to claim 2, is characterized in that: described five-tuple information comprises source IP, object IP, source port, destination interface, agreement ID.
5. the database audit implementation method of real-time high-efficiency according to claim 3, is characterized in that: his layer protocol described comprises VLAN, L2TP, PPPOE, MPLS, self-defined tunneling.
6. the database audit implementation method of real-time high-efficiency according to claim 3, it is characterized in that: described database audit equipment read simultaneously several annulars line up in valid data parallel carry out layered shaping, finally the effective data packets after layered shaping recorded and respond.
CN201510747643.7A 2015-11-06 2015-11-06 Real-time high-efficiency database audit realization method Pending CN105337976A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510747643.7A CN105337976A (en) 2015-11-06 2015-11-06 Real-time high-efficiency database audit realization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510747643.7A CN105337976A (en) 2015-11-06 2015-11-06 Real-time high-efficiency database audit realization method

Publications (1)

Publication Number Publication Date
CN105337976A true CN105337976A (en) 2016-02-17

Family

ID=55288259

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510747643.7A Pending CN105337976A (en) 2015-11-06 2015-11-06 Real-time high-efficiency database audit realization method

Country Status (1)

Country Link
CN (1) CN105337976A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105703972A (en) * 2016-03-07 2016-06-22 深圳前海微众银行股份有限公司 Data capturing method and device applied to auditing process
CN106060149A (en) * 2016-06-24 2016-10-26 北京交通大学 Mobile internet mass data analysis and audit technical architecture
CN106789728A (en) * 2017-01-25 2017-05-31 甘肃农业大学 A kind of voip traffic real-time identification method based on NetFPGA
CN107465567A (en) * 2017-06-29 2017-12-12 西安交大捷普网络科技有限公司 A kind of data forwarding method of database fire wall
CN108667921A (en) * 2018-04-27 2018-10-16 中国农业银行股份有限公司 A kind of banking recommendation information generation method and system based on network bypass
CN109600304A (en) * 2018-12-21 2019-04-09 成都九洲电子信息系统股份有限公司 Based on time wheel mail data reduction, threat detection and trend behavior analysis method
CN110502391A (en) * 2019-07-12 2019-11-26 苏宁云计算有限公司 The grasping means and system of SQL information in a kind of MySQL database
CN111240599A (en) * 2020-01-17 2020-06-05 北京马赫谷科技有限公司 Data stream storage method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007038856A1 (en) * 2005-10-05 2007-04-12 Nortel Networks Limited Provider link state bridging
CN101150485A (en) * 2007-11-15 2008-03-26 曙光信息产业(北京)有限公司 A management method for network data transmission of zero copy buffer queue
CN101764760A (en) * 2010-03-24 2010-06-30 深圳市中科新业信息科技发展有限公司 Multilink message capturing method, and method and system for processing multilink message
CN102739473A (en) * 2012-07-09 2012-10-17 南京中兴特种软件有限责任公司 Network detecting method using intelligent network card
CN104994032A (en) * 2015-05-15 2015-10-21 京信通信技术(广州)有限公司 Information processing method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007038856A1 (en) * 2005-10-05 2007-04-12 Nortel Networks Limited Provider link state bridging
CN101150485A (en) * 2007-11-15 2008-03-26 曙光信息产业(北京)有限公司 A management method for network data transmission of zero copy buffer queue
CN101764760A (en) * 2010-03-24 2010-06-30 深圳市中科新业信息科技发展有限公司 Multilink message capturing method, and method and system for processing multilink message
CN102739473A (en) * 2012-07-09 2012-10-17 南京中兴特种软件有限责任公司 Network detecting method using intelligent network card
CN104994032A (en) * 2015-05-15 2015-10-21 京信通信技术(广州)有限公司 Information processing method and apparatus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
董志良: "《电子商务概论》", 30 June 2014 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105703972A (en) * 2016-03-07 2016-06-22 深圳前海微众银行股份有限公司 Data capturing method and device applied to auditing process
CN105703972B (en) * 2016-03-07 2019-09-03 深圳前海微众银行股份有限公司 Data grab method and device applied to audit
CN106060149A (en) * 2016-06-24 2016-10-26 北京交通大学 Mobile internet mass data analysis and audit technical architecture
CN106789728A (en) * 2017-01-25 2017-05-31 甘肃农业大学 A kind of voip traffic real-time identification method based on NetFPGA
CN107465567A (en) * 2017-06-29 2017-12-12 西安交大捷普网络科技有限公司 A kind of data forwarding method of database fire wall
CN107465567B (en) * 2017-06-29 2021-05-07 西安交大捷普网络科技有限公司 Data forwarding method of database firewall
CN108667921A (en) * 2018-04-27 2018-10-16 中国农业银行股份有限公司 A kind of banking recommendation information generation method and system based on network bypass
CN108667921B (en) * 2018-04-27 2021-12-14 中国农业银行股份有限公司 Bank business recommendation information generation method and system based on network bypass
CN109600304A (en) * 2018-12-21 2019-04-09 成都九洲电子信息系统股份有限公司 Based on time wheel mail data reduction, threat detection and trend behavior analysis method
CN110502391A (en) * 2019-07-12 2019-11-26 苏宁云计算有限公司 The grasping means and system of SQL information in a kind of MySQL database
CN111240599A (en) * 2020-01-17 2020-06-05 北京马赫谷科技有限公司 Data stream storage method and device
CN111240599B (en) * 2020-01-17 2021-06-25 北京马赫谷科技有限公司 Data stream storage method and device

Similar Documents

Publication Publication Date Title
CN105337976A (en) Real-time high-efficiency database audit realization method
CN1574839B (en) Multi-layered firewall architecture
CN110753064A (en) Machine learning and rule matching fused security detection system
CN110401624A (en) The detection method and system of source net G system mutual message exception
CN110572412A (en) Firewall based on intrusion detection system feedback in cloud environment and implementation method thereof
US20170034195A1 (en) Apparatus and method for detecting abnormal connection behavior based on analysis of network data
CN105282169A (en) DDoS attack warning method and system based on SDN controller threshold
CN101321171A (en) Method and apparatus for detecting distributed refusal service attack
CN107302534A (en) A kind of DDoS network attack detecting methods and device based on big data platform
WO2009018737A1 (en) Method and network device for preventing dos attacks
CN112688932A (en) Honeypot generation method, honeypot generation device, honeypot generation equipment and computer readable storage medium
CN107690051A (en) One kind alarm video recording method and device
Ma et al. A design of firewall based on feedback of intrusion detection system in cloud environment
US20150331808A1 (en) Packet capture deep packet inspection sensor
CN105260378A (en) Database audit method and device
Chi Intrusion detection system based on snort
JP2002124996A (en) Fast packet acquiring engine/security
CN101582880B (en) Method and system for filtering messages based on audited object
CN1350231A (en) By-pass investigation and remisson method for rejecting service attack
CN102053970B (en) Database auditing method and system
JP2007249348A (en) Data collection device and method in application trace-back and its program
Hsiao et al. High-throughput intrusion detection system with parallel pattern matching
KR101384618B1 (en) A system for analyzing dangerous situation using node analysis
KR101615587B1 (en) System for implementing Deep Packet Inspection Simulation for detecting and analyzing cyber attack in electronic warfare and Method thereof
CN106657087B (en) Method for realizing industrial firewall dynamically tracked by Ethernet/Ip protocol

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160217