CN109766327A - The analysis method and device of database access request - Google Patents

The analysis method and device of database access request Download PDF

Info

Publication number
CN109766327A
CN109766327A CN201811614090.8A CN201811614090A CN109766327A CN 109766327 A CN109766327 A CN 109766327A CN 201811614090 A CN201811614090 A CN 201811614090A CN 109766327 A CN109766327 A CN 109766327A
Authority
CN
China
Prior art keywords
access request
access
database
key name
action type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811614090.8A
Other languages
Chinese (zh)
Inventor
杨艳杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201811614090.8A priority Critical patent/CN109766327A/en
Publication of CN109766327A publication Critical patent/CN109766327A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/211Schema design and management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/214Database migration support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2308Concurrency control
    • G06F16/2315Optimistic concurrency control
    • G06F16/2329Optimistic concurrency control using versioning

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention provides a kind of analysis method of database access request and devices.Wherein the analysis method of database access request this include: the action type for capturing to the access request of target database, and determining the access request captured;Judge whether action type is preset action type to be analyzed;If so, extracting simultaneously record access requests corresponding key name and corresponding access information.Using the solution of the present invention, the key name and statistical data of access request can be provided in real time, and analysis speed is fast, is particularly suitable for Redis database, directly reflects the accessed situation of database, the analysis tool provided convenience for database maintenance developer.

Description

The analysis method and device of database access request
The application be the applying date be 2015.05.29, application No. is 201510290595.3, it is entitled that " database is visited Ask the analysis method and device of request " divisional application of application for a patent for invention.
Technical field
The present invention relates to technical field of data processing, more particularly to the analysis method and dress of a kind of database access request It sets.
Background technique
Database (Database) is the data processing system for coming tissue, storage and management data according to data structure, with The development of internet, database be more widely applied, performance requirement is also higher and higher.Database Systems must have at present Standby higher issued transaction speed and application reliability.
Due to the importance of database, also become by the target of network attack, a kind of common attack pattern is malice mould The quasi- centralized operation to a certain data externally can not normally provide data service so that exception occurs in database data storage Or hash write-in database is occupied into a large amount of memory spaces.But lacks in the prior art and access request is analyzed Means.Especially for this kind of database memory-based of Redis, the monitoring tools itself provided are unable to satisfy identification malice The requirement of access, leads to the reliability decrease of database, and occupies a large amount of memory headrooms.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind State the analytical equipment of the database access request of problem and the analysis method of corresponding database access request.
A further object of the present invention is to provide the real-time analysis to database access request.
Another further object of the present invention is to be convenient for quickly positioning amount of access exception.
According to one aspect of the present invention, a kind of analysis method of database access request is provided.Database access is asked This includes: the access request captured to target database to the analysis method asked, and determines the operation class of the access request captured Type;Judge whether action type is preset action type to be analyzed;If so, extract and record access request corresponding key name and Corresponding access information.
Optionally it is determined that the step of action type of the access request captured includes: that the access request that will be captured is write Enter memory, and the access request captured is analyzed in memory, to determine action type.
Optionally, it includes: preparatory in memory that record access, which requests the step of corresponding key name and corresponding access information, The key name extracted and access information are recorded in the access dictionary of foundation, are accessed and are configured to save key name and the key name in dictionary Access information.
Optionally, access information includes accessed number, and records and mention in the access dictionary pre-established in memory The key name and access information step of taking-up include: in queried access dictionary with the presence or absence of the key name extracted;If so, in access word It is accumulated once on the accessed number of the key name extracted in allusion quotation;If it is not, increasing the key name extracted newly in access dictionary, and will Its accessed number is initialized as one.
Optionally, above method further include: after receiving the trigger signal for stopping analysis, access request is caught in stopping It catches.
Optionally, after the step of stopping the capture to access request further include: according to accessed number to access word The key name recorded in allusion quotation is ranked up, and generates access request analytical statement according to ranking results.
Optionally, the trigger signal for stopping analysis includes: to capture to reach pre- to the time of the access request of target database If the timing trigger signal after the time;Or it captures and reaches the meter after preset times to the number of the access request of target database Number trigger signal.
Optionally, it in the case where action type is not preset action type to be analyzed, returns and captures to target data The step of access request in library, to analyze next access request, and action type includes any of the following or more Kind: it reads data, write-in data, delete data.
Optionally, the step of capturing the access request to target database utilizes the extraneous capture being located at outside target database Device executes.
Optionally, target database is Redis database.
According to another aspect of the present invention, a kind of analytical equipment of database access request is additionally provided.The database The analytical equipment of access request include: request capture module, be configured to: capturing the access request to target database;Type Analysis module is configured to: determining the action type of the access request captured;Judgment module is configured to: judging that action type is No is preset action type to be analyzed;And logging modle, be configured to: if the judging result of judgment module be it is yes, extract simultaneously Record access requests corresponding key name and corresponding access information.
Optionally, type analysis module is configured to: memory is written in the access request captured, and in memory to catching The access request grasped is analyzed, to determine action type.
Optionally, logging modle is configured to: recording the key name extracted in the access dictionary pre-established in memory And access information, access the access information for being configured to save key name and the key name in dictionary.
Optionally, access information includes accessed number, and logging modle is configured to: in queried access dictionary whether In the presence of the key name extracted;If so, being accumulated once on the accessed number of the key name extracted in access dictionary;If it is not, The key name extracted is increased newly in access dictionary, and is accessed number and is initialized as one.
Optionally, apparatus above further include: analysis terminates module, is configured to receiving the trigger signal for stopping analysis Afterwards, stop the capture to access request.
Optionally, apparatus above further include: report generation module is configured to: according to accessed number in access dictionary The key name of record is ranked up, and according to ranking results output access requirement analysis report.
Optionally, the trigger signal for stopping analysis includes: to capture to reach pre- to the time of the access request of target database If the timing trigger signal after the time;Or it captures and reaches the meter after preset times to the number of the access request of target database Number trigger signal.
Optionally, request capture module be configured to: if the judging result of judgment module be it is no, return execute capture to mesh The step of marking the access request of database, to analyze next access request, and action type includes following any one Kind is a variety of: reading data, write-in data, deletes data.
Optionally, request capture module is set on the extraneous catcher outside target database, with outer using being located at Boundary's catcher captures the access request to target database.
Optionally, target database is Redis database.
The analysis method and device of database access request of the invention, available database access request, and to need The access request for the type analyzed is analyzed, and can provide the key name and statistical data of access request in real time, and And it can be needed that starting is selected to capture and stop the opportunity capturing according to analysis.
Further, the analysis method and device of database access request of the invention, the visit pre-established in memory Ask the key name and access information that dictionary is requested with record access, analysis speed is fast, and the key for directly reflecting database is accessed The case where.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
According to the following detailed description of specific embodiments of the present invention in conjunction with the accompanying drawings, those skilled in the art will be brighter The above and other objects, advantages and features of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 is the application architecture schematic diagram of the analytical equipment of database access request according to an embodiment of the invention;
Fig. 2 is the schematic block diagram of the analytical equipment of database access request according to an embodiment of the invention;
Fig. 3 is the schematic block diagram of the analytical equipment of database access request according to another embodiment of the present invention;And
Fig. 4 is the schematic diagram of the analysis method of database access request according to an embodiment of the invention.
Specific embodiment
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
Fig. 1 is the application architecture schematic diagram of the analytical equipment of database access request according to an embodiment of the invention. The analytical equipment 100 of the database access request of the present embodiment utilizes the extraneous catcher being located at outside target database 200 300 obtain the access request from user 400, and these access requests are analyzed and handled.Such as catcher 300 can be with The access request that user 400 initiates to target database 200 is captured using means such as front end processors.Catcher 300 will not be to data The normal use in library 400 and access affect.
The analytical equipment 100 of the access request of the present embodiment is particularly suitable for analyzing Redis database, compare Lack the analysis means of access request in existing Redis database, the feelings that each key assignments is accessed in the predetermined time can be counted Condition, personnel convenient for safeguarding are handled.
Redis database be being write using ANSI C language an of open source, support network, it is memory-based also can be lasting Log type, key-value (Key-Value) database of change.Redis supports that the value data type of storage includes character string (string), chained list (list), set (set), ordered set (sorted set), hashed value (hash).Redis uses memory Storage, read-write frequency is fast, performance is high, data type is abundant, has wide range of applications.
The analytical equipment 100 of the access request of the present embodiment realizes the system that each key in Redis database is accessed situation Meter can carry out classification according to access type and carry out statistics and analysis, and can automatically generate analytical statement, facilitate database Maintenance Development personnel use.
Fig. 2 is the schematic block diagram of the analytical equipment 100 of database access request according to an embodiment of the invention;It should The analytical equipment 100 of database access request is generally can include: request capture module 110, is sentenced type analysis module 120 Disconnected module 130, logging modle 140.
In each component of the database access request analytical equipment 100 of the present embodiment, request capture module 110 is configured At: capture the access request to target database 200.Request capture module 110 can use outer outside target database Boundary's catcher 300 captures the access request to target database 200.Being captured as extraneous catcher 300 is real-time, so as to To realize the real-time processing analysis of access request.It may include access IP for Redis database, in access request, visit Ask type, target key name etc..
Type analysis module 120 can be configured to: the action type of the access request captured be determined, in order to improve analysis Efficiency, the database access request analytical equipment 100 of the present embodiment can access in memory request analysis processing, with Improve analysis efficiency.Such as memory can be written in the access request captured by type analysis module 120, and in memory to catching The access request grasped is analyzed, to determine action type.Action type may include it is following any one or more: read Access evidence, deletes data at write-in data.
Judgment module 130 can be configured to: judge whether action type is preset action type to be analyzed;To be analyzed Action type can be all operationss type of database support, be also possible to a part of all operationss type, such as only right The operation of write-in data is analyzed.
Logging modle 140 can be configured to: if the judging result of judgment module 130 is yes, extraction and record access request Corresponding key name and access information.These access informations may include the accessed number of each key, also may include action type, Operating time, access IP etc..
If the judging result of judgment module 130 is that the action type of current accessed is not preset operation class to be analyzed Type is then returned by request capture module and executes the step of capturing the access request to target database, to next access request It is analyzed.
When being analyzed in memory, records and mention in the access dictionary that logging modle 140 can pre-establish in memory The key name of taking-up accesses the accessed number for being configured to save key name and the key name in dictionary.Wherein logging modle 140 is being visited Ask a kind of detailed process that key name and its access times are recorded in dictionary are as follows: with the presence or absence of the key extracted in queried access dictionary Name;If so, being accumulated once on the accessed number of the key name extracted described in access dictionary;If it is not, in access dictionary The newly-increased key name extracted, and be accessed number and be initialized as one.
Fig. 3 is the schematic block diagram of the analytical equipment of database access request according to another embodiment of the present invention;At this One or all in setting analysis termination module 150 and report generation module 160 can be increased in embodiment.
Analysis terminates module 150 and can be configured to: after receiving the trigger signal for stopping analysis, triggering catcher stops Capture to access request.The trigger signal for stopping analysis includes: to capture to reach the time of the access request of target database Timing trigger signal after preset time;Or after capture reaches preset times to the number of the access request of target database Count trigger signal.Such as it can count each in the situation or default statistics number that each key assignments is accessed in a period of time The accessed situation of key assignments.
Report generation module 160 can be ranked up the key name recorded in access dictionary according to accessed number, and press According to ranking results output access requirement analysis report.It is provided for database analysis maintenance personnel and is more clear specific result.Example Such as the access request analytical statement can export in predetermined time or scheduled visit number, be accessed amount it is highest several Key, in order to identify the key of these amount of access hot topic whether by malicious access.
The embodiment of the invention also provides a kind of analysis method of database access request, points of the database access request Analysis method can be executed by the analytical equipment 100 of any one database access request of above embodiments introduction.Fig. 4 is root According to the schematic diagram of the analysis method of the database access request of one embodiment of the invention, as shown, the database access is asked The analysis method asked the following steps are included:
Step S402 captures the access request to target database, and determines the action type of the access request captured;
Step S404 judges whether action type is preset action type to be analyzed;And
Step S406, if so, extracting simultaneously record access requests corresponding key name and access information.
If the judging result of step S404 is that action type is not preset action type to be analyzed, it can return and hold Row step S402, to analyze next access request
In addition during executing above step, after receiving the trigger signal for stopping analysis, triggering catcher stops Only to the capture of access request.
The analysis method of the database access request of the present embodiment is preferably applied in Redis database, and may be implemented Each key is accessed the statistics of situation in Redis database, and classification can be carried out according to access type and carries out statistics and analysis, and can To automatically generate analytical statement, database maintenance developer use is facilitated.Step S402 determine action type include with It descends any one or more: reading data, write-in data, deletes data.
Step S402 can use the execution of the extraneous catcher outside the target database.And in order to improve analysis Efficiency, above step S402 to step 406 can be realized in memory, such as the access request captured is written step S402 Memory, and the access request captured is analyzed in memory, to determine action type.Step 406 can be in memory In record the key name extracted and access information in the access dictionary that pre-establishes, these access informations may include the quilt of each key Access times also may include action type, operating time, access IP etc..
In an alternative embodiment, the accessed number for being configured to save key name and the key name in dictionary is accessed.One Kind concrete implementation mode is in queried access dictionary with the presence or absence of the key name extracted;If so, being extracted in access dictionary Key name accessed number on accumulate once;If it is not, increasing the key name extracted newly in access dictionary, and it is accessed secondary Number is initialized as one.
Wherein step S404 judges whether action type is preset action type to be analyzed, preset operation class to be analyzed Type can be all action types of database support, be also possible to preset action type.
After stopping to the capture of access request, the method for the present embodiment can also be according to accessed number to access word The key name recorded in allusion quotation is ranked up, and generates access request analytical statement according to ranking results, for database maintenance personnel Quickly and easily further analysis.
The trigger signal for stopping analysis may include: when capturing to reach default to the time of the access request of target database Between after timing trigger signal;Or capture the counting touching after reaching preset times to the number of the access request of target database It signals.For example, if setting timing time to 1 second, each key assignments can be obtained by according to the accessed counting in access dictionary Access frequency.
Database of the example analyzed with the access request of the write-in data of a Redis database to the present embodiment The analysis method of access request is described further, and memory will be written to the access request of Redis database first, until connecing The trigger signal for stopping capturing is received, to the access request of write-in memory, is successively identified whether as the action type of data is written, If it is not, this access request is deleted, lower access request is analyzed;If so, determine the key name of this access request, and The key name is searched in access dictionary in memory, if the existing key name, is added up to the number that is written into of the key name. If there is no the key name in access dictionary, the key name is created in access dictionary, and the number for being written into data is set to one It is secondary.
After the analysis for completing all access request processing, access dictionary just remains each key quilt in Redis database The quantity of access, so as to generate access request analytical statement according to the record of access dictionary, the key name of the report can be by Sequence according to key name or the number for being written into data are ranked up.The access request analytical statement can provide can data maintenance Personnel, to determine whether there is the operation of malice.
The analysis method and device of the database access request of the present embodiment, obtain database access request, and right in real time The access request for the type analyzed is analyzed, and can provide the key name and statistical data of access request in real time, And it can be needed that starting is selected to capture and stop the opportunity capturing according to analysis.And there is the visit pre-established in memory Ask key name and accessed number that dictionary is requested with record access, analysis speed is fast, and the key for directly reflecting database is interviewed The case where asking.The analysis tool provided convenience for database maintenance developer.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any Can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) realize the analysis dress of database access request according to an embodiment of the present invention The some or all functions of some or all components in setting.The present invention is also implemented as described here for executing Method some or all device or device programs (for example, computer program and computer program product).This The program that the realization of sample is of the invention can store on a computer-readable medium, or can have one or more signal Form.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other Form provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.
So far, although those skilled in the art will appreciate that present invention has been shown and described in detail herein multiple shows Example property embodiment still without departing from the spirit and scope of the present invention, still can according to the present disclosure directly Determine or deduce out many other variations or modifications consistent with the principles of the invention.Therefore, the scope of the present invention is understood that and recognizes It is set to and covers all such other variations or modifications.
The present embodiment additionally provides a kind of analysis method of database access request of A1., comprising:
The access request to target database is captured, and determines the action type of the access request captured;
Judge whether the action type is preset action type to be analyzed;And
If so, extracting and recording the corresponding key name of the access request and corresponding access information.
A2. method according to a1, wherein the step of the action type for the access request that the determination captures Include:
Memory is written into the access request captured, and the access request captured is divided in memory Analysis, to determine the action type.
A3. the method according to A2, wherein described to record the corresponding key name of the access request and corresponding access letter The step of breath includes:
The key name extracted and access information, the access word are recorded in the access dictionary pre-established in the memory It is configured to save the access information of key name and the key name in allusion quotation.
A4. method according to a3, wherein the access information includes accessed number, and described described interior It deposits and records the key name extracted in the access dictionary pre-established and access information step includes:
It inquires in the access dictionary with the presence or absence of the key name extracted;
If so, being accumulated once on the accessed number of the key name extracted described in the access dictionary;
If it is not, increasing the key name extracted newly in the access dictionary, and it is accessed number and is initialized as 1.
A5. the method according to any one of A1 to A4, wherein the method also includes:
After receiving the trigger signal for stopping analysis, stop the capture to the access request.
A6. method according to a5, wherein also being wrapped after described the step of stopping to the capture of the access request It includes:
The key name recorded in the access dictionary is ranked up according to the accessed number, and raw according to ranking results At access request analytical statement.
A7. method according to a5, wherein the trigger signal for stopping analysis includes:
The capture reaches the timing trigger signal after preset time to the time of the access request of target database;Or
The capture reaches the counting trigger signal after preset times to the number of the access request of target database.
A8. the method according to any one of A1 to A7, wherein
In the case where the action type is not preset action type to be analyzed, the capture is returned to target data The step of access request in library, to analyze next access request, and the action type includes any of the following It is or a variety of: to read data, write-in data, delete data.
A9. the method according to any one of A1 to A8, wherein described capture to the access request of target database Step utilizes the extraneous catcher being located at outside the target database to execute.
A10. the method according to any one of A1 to A9, wherein
The target database is Redis database.
The present embodiment additionally provides a kind of analytical equipment of database access request of B11., comprising:
Capture module is requested, is configured to: capturing the access request to target database;
Type analysis module is configured to: determining the action type of the access request captured;
Judgment module is configured to: judging whether the action type is preset action type to be analyzed;And
Logging modle is configured to: if the judging result of the judgment module be it is yes, extract and record the access request pair The key name answered and corresponding access information.
B12. the device according to B11, wherein the type analysis module is configured to:
Memory is written into the access request captured, and the access request captured is divided in memory Analysis, to determine the action type.
B13. device according to b12, wherein the logging modle is configured to:
The key name extracted and access information, the access word are recorded in the access dictionary pre-established in the memory It is configured to save the access information of key name and the key name in allusion quotation.
B14. device according to b13, wherein the access information includes accessed number, and the logging modle It is configured to:
It inquires in the access dictionary with the presence or absence of the key name extracted;
If so, being accumulated once on the accessed number of the key name extracted described in the access dictionary;
If it is not, increasing the key name extracted newly in the access dictionary, and it is accessed number and is initialized as 1.
B15. the device according to any one of B11 to B14, further includes:
Analysis terminates module, is configured to after receiving the trigger signal for stopping analysis, stops to the access request It captures.
B16. the device according to B15, further includes:
Report generation module, is configured to: carrying out according to the accessed number to the key name recorded in the access dictionary Sequence, and according to ranking results output access requirement analysis report.
B17. the device according to B15, wherein the trigger signal for stopping analysis includes:
The capture reaches the timing trigger signal after preset time to the time of the access request of target database;Or
The capture reaches the counting trigger signal after preset times to the number of the access request of target database.
B18. the device according to any one of B11 to B17, wherein the request capture module, is configured to:
If the judging result of the judgment module be it is no, return and execute request capture module capture to target database Access request the step of, to analyze next access request, and the action type include any of the following or It is a variety of: to read data, write-in data, delete data.
B19. the device according to any one of B11 to B18, wherein the request capture module is set to positioned at institute It states on the extraneous catcher outside target database, to be asked using positioned at the extraneous catcher capture to the access of target database It asks.
B20. the device according to any one of B11 to B19, wherein
The target database is Redis database.

Claims (10)

1. a kind of analysis method of database access request, comprising:
The access request to target database is captured, and determines the action type of the access request captured;
Judge whether the action type is preset action type to be analyzed;And
If so, extracting and recording the corresponding key name of the access request and corresponding access information.
2. according to the method described in claim 1, wherein, the step of the action type for the access request that the determination captures Suddenly include:
Memory is written into the access request captured, and the access request captured is analyzed in memory, To determine the action type.
3. described to record the corresponding key name of the access request and corresponding access according to the method described in claim 2, wherein The step of information includes:
The key name extracted and access information are recorded in the access dictionary pre-established in the memory, in the access dictionary It is configured to save the access information of key name and the key name.
4. according to the method described in claim 3, wherein, the access information includes accessed number, and described described The key name extracted is recorded in the access dictionary pre-established in memory and access information step includes:
It inquires in the access dictionary with the presence or absence of the key name extracted;
If so, being accumulated once on the accessed number of the key name extracted described in the access dictionary;
If it is not, increasing the key name extracted newly in the access dictionary, and it is accessed number and is initialized as 1.
5. method according to claim 1 to 4, wherein the method also includes:
After receiving the trigger signal for stopping analysis, stop the capture to the access request.
6. according to the method described in claim 5, wherein after described the step of stopping to the capture of the access request also Include:
The key name recorded in the access dictionary is ranked up according to the accessed number, and generates and visits according to ranking results Ask requirement analysis report.
7. according to the method described in claim 5, wherein the trigger signal for stopping analysis includes:
The capture reaches the timing trigger signal after preset time to the time of the access request of target database;Or
The capture reaches the counting trigger signal after preset times to the number of the access request of target database.
8. method according to any one of claim 1 to 7, wherein
In the case where the action type is not preset action type to be analyzed, the capture is returned to target database The step of access request, to analyze next access request, and the action type includes any of the following or more Kind: it reads data, write-in data, delete data.
9. a kind of analytical equipment of database access request, comprising:
Capture module is requested, is configured to: capturing the access request to target database;
Type analysis module is configured to: determining the action type of the access request captured;
Judgment module is configured to: judging whether the action type is preset action type to be analyzed;And
Logging modle is configured to: if the judging result of the judgment module be it is yes, extract and to record the access request corresponding Key name and corresponding access information.
10. device according to claim 9, wherein the type analysis module is configured to:
Memory is written into the access request captured, and the access request captured is analyzed in memory, To determine the action type.
CN201811614090.8A 2015-05-29 2015-05-29 The analysis method and device of database access request Pending CN109766327A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811614090.8A CN109766327A (en) 2015-05-29 2015-05-29 The analysis method and device of database access request

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811614090.8A CN109766327A (en) 2015-05-29 2015-05-29 The analysis method and device of database access request
CN201510290595.3A CN104933105B (en) 2015-05-29 2015-05-29 The analysis method and device of database access request

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510290595.3A Division CN104933105B (en) 2015-05-29 2015-05-29 The analysis method and device of database access request

Publications (1)

Publication Number Publication Date
CN109766327A true CN109766327A (en) 2019-05-17

Family

ID=54120273

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201510290595.3A Active CN104933105B (en) 2015-05-29 2015-05-29 The analysis method and device of database access request
CN201811614090.8A Pending CN109766327A (en) 2015-05-29 2015-05-29 The analysis method and device of database access request

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201510290595.3A Active CN104933105B (en) 2015-05-29 2015-05-29 The analysis method and device of database access request

Country Status (1)

Country Link
CN (2) CN104933105B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106921536B (en) * 2015-12-25 2020-02-07 北京奇虎科技有限公司 Data processing method and device based on client version information
CN106547664A (en) * 2016-11-04 2017-03-29 北京车智赢软件有限公司 C# version Redis system monitoring instruments
CN108540533B (en) * 2018-03-14 2021-01-22 聚好看科技股份有限公司 Request answering method and device
CN108681588A (en) * 2018-05-14 2018-10-19 北京明朝万达科技股份有限公司 A kind of interface accesses real-time statistical method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4037214A (en) * 1976-04-30 1977-07-19 International Business Machines Corporation Key register controlled accessing system
CN102057359A (en) * 2009-04-10 2011-05-11 松下电器产业株式会社 Cache memory device, cache memory control method, program, and integrated circuit
CN102148870A (en) * 2011-03-07 2011-08-10 浪潮(北京)电子信息产业有限公司 Cloud storage system and implementation method thereof
CN103780692A (en) * 2014-01-13 2014-05-07 中国科学院计算技术研究所 Data access method and system for key value storage
CN104361035A (en) * 2014-10-27 2015-02-18 深信服网络科技(深圳)有限公司 Method and device for detecting database tampering behavior

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020062223A1 (en) * 2000-11-21 2002-05-23 Netiq Corporation System and method for adding network traffic data to a database of network traffic data
CN103345518B (en) * 2013-07-11 2016-08-10 清华大学 Self-adapting data memory management method based on data block and system
CN104090938A (en) * 2014-06-26 2014-10-08 广州金山网络科技有限公司 Method and device for submitting data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4037214A (en) * 1976-04-30 1977-07-19 International Business Machines Corporation Key register controlled accessing system
CN102057359A (en) * 2009-04-10 2011-05-11 松下电器产业株式会社 Cache memory device, cache memory control method, program, and integrated circuit
CN102148870A (en) * 2011-03-07 2011-08-10 浪潮(北京)电子信息产业有限公司 Cloud storage system and implementation method thereof
CN103780692A (en) * 2014-01-13 2014-05-07 中国科学院计算技术研究所 Data access method and system for key value storage
CN104361035A (en) * 2014-10-27 2015-02-18 深信服网络科技(深圳)有限公司 Method and device for detecting database tampering behavior

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
胡伟雄: "《电子商务安全技术》", 30 June 2011, 华中师范大学出版社 *

Also Published As

Publication number Publication date
CN104933105B (en) 2019-02-12
CN104933105A (en) 2015-09-23

Similar Documents

Publication Publication Date Title
CN105553769B (en) A kind of data acquisition and analysis system and method
CN106610892B (en) Memory leak detection method and device
WO2016008398A1 (en) Program performance test method and device
CN104933105B (en) The analysis method and device of database access request
CN105426310B (en) A kind of method and apparatus for the performance for detecting target process
CN107066390A (en) A kind of Dram leakage detection method and system
CN109491860A (en) Method for detecting abnormality, terminal device and the medium of application program
CN111522728A (en) Method for generating automatic test case, electronic device and readable storage medium
CN107003931B (en) Decoupling test validation from test execution
CN105893230A (en) Method and device for detecting IOPS performance of hard disks
CN113342685A (en) Precise test method and device, computer equipment and storage medium
CN104679884B (en) Data analysing method, device and the system of database
WO2019221806A1 (en) Automatic database query load assessment and adaptive handling
CN104866597B (en) The analysis method and device of database access request
CN109542341B (en) Read-write IO monitoring method, device, terminal and computer readable storage medium
CN104933096B (en) Abnormal key recognition methods, device and the data system of database
US20120124428A1 (en) Method and system for testing software on programmable devices
CN107451038B (en) Hardware event acquisition method, processor and computing system
CN108469997A (en) A kind of automatic identifying method of the self-defined heap manager function based on behavioral characteristics
CN112965845A (en) Delay analysis method, electronic device, and storage medium
CN107330031A (en) A kind of method of data storage, device and electronic equipment
US9201771B2 (en) Method for evaluating a production rule for a memory management analysis
CN116244133A (en) Hard disk test management method, system, terminal and storage medium
US8935200B2 (en) Dynamic database dump
US9251023B2 (en) Implementing automated memory address recording in constrained random test generation for verification of processor hardware designs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190517

RJ01 Rejection of invention patent application after publication