CN112437081A - Computer firewall device based on cloud database and use method - Google Patents

Computer firewall device based on cloud database and use method Download PDF

Info

Publication number
CN112437081A
CN112437081A CN202011315784.9A CN202011315784A CN112437081A CN 112437081 A CN112437081 A CN 112437081A CN 202011315784 A CN202011315784 A CN 202011315784A CN 112437081 A CN112437081 A CN 112437081A
Authority
CN
China
Prior art keywords
database
blocking
access
firewall device
device based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011315784.9A
Other languages
Chinese (zh)
Inventor
胥波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Hajia Intelligent Technology Co ltd
Original Assignee
Nanjing Hajia Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Hajia Intelligent Technology Co ltd filed Critical Nanjing Hajia Intelligent Technology Co ltd
Priority to CN202011315784.9A priority Critical patent/CN112437081A/en
Publication of CN112437081A publication Critical patent/CN112437081A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a computer firewall device based on a cloud database and a using method thereof, wherein the computer firewall device comprises the following steps: s1, intelligent identification control of application protocol: the DBA protocol, the operation and maintenance protocol, the hacker access and the application software can be automatically identified, the access of all interfaces of the database is comprehensively monitored, and effective access control is realized; s2, accurate interception: blocking can be performed based on various conditions such as IP addresses, time, operation, keywords, database accounts, statement lengths, column names, table names, line numbers, injection feature libraries and the like, so that accurate access control is realized; s3, preventing APT attack: rapidly verifying and blocking complicated and continuous illegal operations and malicious attack behaviors according to the combination of the access behaviors and the statistical model; s4, built-in AI: an intelligent learning module is arranged in the system, machine intelligent learning is carried out, automatic modeling is carried out, and a blocking rule base is automatically generated to actively defend unknown security threats; s5, bypass blocking.

Description

Computer firewall device based on cloud database and use method
Technical Field
The present invention relates to deployment of computer firewalls, and more particularly, to a computer firewall apparatus based on a cloud database and a method for using the same.
Background
A database firewall is a security device or product that defends against and eliminates database security problems due to application business logic bugs or bugs. The database firewall is generally deployed between an application server and a database server and is completed by adopting a database protocol analysis mode. But this is not the only implementation, you can deploy outside the database, and no protocol resolution can be employed. As can be seen from this definition, the essential goal of a database firewall is to patch a business application to avoid database security impacts due to application business logic bugs or bugs
The database does not handle the reset signal very well and needs to rely on a dead process detection procedure to handle it. Because the processing cannot be guaranteed to be effective, that is, a large number of dead processes may occur in a large number of scenes, a large number of database session resources are consumed, even shared resources are not released, and thus the database is suspended.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides a computer firewall device based on a cloud database and a using method thereof.
In order to achieve the purpose, the invention provides the following technical scheme: a computer firewall device based on a cloud database and a using method thereof comprise the following steps:
s1, intelligent identification control of application protocol: the DBA protocol, the operation and maintenance protocol, the hacker access and the application software can be automatically identified, the access of all interfaces of the database is comprehensively monitored, and effective access control is realized;
s2, accurate interception: blocking can be performed based on various conditions such as IP addresses, time, operation, keywords, database accounts, statement lengths, column names, table names, line numbers, injection feature libraries and the like, so that accurate access control is realized;
s3, preventing APT attack: rapidly verifying and blocking complicated and continuous illegal operations and malicious attack behaviors according to the combination of the access behaviors and the statistical model;
s4, built-in AI: an intelligent learning module is arranged in the system, machine intelligent learning is carried out, automatic modeling is carried out, and a blocking rule base is automatically generated to actively defend unknown security threats;
s5, bypass blocking: the bypass deployment blocking mode is supported, the hidden danger that single-point failure exists in serial deployment and time delay is brought to database access is avoided, and the zero change and zero influence of the existing network structure is avoided.
Preferably, the global audit mode and the firewall mode are switched online without restarting equipment. The firewall mode can block messages violating the rules in real time; and the global audit mode is used for rapidly forwarding the message, and the complete audit record is kept.
Preferably, management and audit are isolated, three rights are separated, log is reserved, mutual supervision is convenient, audit is clear, and rights are clear.
Preferably, various database threat interception such as MySQL, Oracle, MSSQL and the like are supported.
Preferably, various accesses to the database can be automatically identified, and intelligent identification and interception of potential risks such as application, operation and maintenance tools and hacker attacks are achieved.
The invention has the technical effects and advantages that:
1. the method comprises the steps of accurately identifying and intercepting fine granularity based on the matching of various condition type rules, realizing complex attack detection and interception such as APT (android Package) through combination rules and statistical rules, adding attack IP into a blacklist, and realizing real-time blocking of actions such as strange hosts, strange tools, strange account access and strange IP access databases through AI (advanced intelligence) technology; various accesses to the database can be automatically identified, and intelligent identification and interception of potential risks such as application, operation and maintenance tools, hacker attack and the like are realized.
2. Log retrieval: support hundred million level data second level retrieval; processing capacity: the carrier-class data processing capability is high, and the concurrent bearing guarantee is realized; and a high-performance hardware platform and a kernel optimization technology are used, so that the performance requirement under a high-load environment is met.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
A computer firewall device based on a cloud database and a using method thereof comprise the following steps:
s1, intelligent identification control of application protocol: the DBA protocol, the operation and maintenance protocol, the hacker access and the application software can be automatically identified, the access of all interfaces of the database is comprehensively monitored, and effective access control is realized;
s2, accurate interception: blocking can be performed based on various conditions such as IP addresses, time, operation, keywords, database accounts, statement lengths, column names, table names, line numbers, injection feature libraries and the like, so that accurate access control is realized;
s3, preventing APT attack: rapidly verifying and blocking complicated and continuous illegal operations and malicious attack behaviors according to the combination of the access behaviors and the statistical model;
s4, built-in AI: an intelligent learning module is arranged in the system, machine intelligent learning is carried out, automatic modeling is carried out, and a blocking rule base is automatically generated to actively defend unknown security threats;
s5, bypass blocking: the bypass deployment blocking mode is supported, the hidden danger that single-point failure exists in serial deployment and time delay is brought to database access is avoided, and the zero change and zero influence of the existing network structure is avoided.
Preferably, the global audit mode and the firewall mode are switched online without restarting equipment. The firewall mode can block messages violating the rules in real time; and the global audit mode is used for rapidly forwarding the message, and the complete audit record is kept.
Preferably, management and audit are isolated, three rights are separated, log is reserved, mutual supervision is convenient, audit is clear, and rights are clear.
Preferably, various database threat interception such as MySQL, Oracle, MSSQL and the like are supported.
Preferably, various accesses to the database can be automatically identified, and intelligent identification and interception of potential risks such as application, operation and maintenance tools and hacker attacks are achieved.
Example two
A computer firewall device based on a cloud database and a using method thereof comprise the following steps:
s1, under the transparent bridging mode, the IP address is not needed to be set, the original network configuration is affected by zero, and various software and hardware fault condition services are ensured to still run normally through various bypass modes;
s2, the client is logically connected with the address of the firewall device, and the firewall device forwards the flow to the database server; through the proxy access mode, the network topology structure is unchanged;
s3, accurate interception: blocking can be performed based on various conditions such as IP addresses, time, operation, keywords, database accounts, statement lengths, column names, table names, line numbers, injection feature libraries and the like, so that accurate access control is realized;
and S4, rapidly verifying and blocking complicated and continuous illegal operation and malicious attack behaviors according to the combination of the access behaviors and the statistical model.
In summary, the following steps: compared with other firewall technologies, the computer firewall device based on the cloud database and the using method thereof greatly improve the security of the database and meet the performance requirement under a high-load environment.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.

Claims (5)

1. A computer firewall device based on cloud database and its using method are characterized in that: the method comprises the following steps:
s1, intelligent identification control of application protocol: the DBA protocol, the operation and maintenance protocol, the hacker access and the application software can be automatically identified, the access of all interfaces of the database is comprehensively monitored, and effective access control is realized;
s2, accurate interception: blocking can be performed based on various conditions such as IP addresses, time, operation, keywords, database accounts, statement lengths, column names, table names, line numbers, injection feature libraries and the like, so that accurate access control is realized;
s3, preventing APT attack: rapidly verifying and blocking complicated and continuous illegal operations and malicious attack behaviors according to the combination of the access behaviors and the statistical model;
s4, built-in AI: an intelligent learning module is arranged in the system, machine intelligent learning is carried out, automatic modeling is carried out, and a blocking rule base is automatically generated to actively defend unknown security threats;
s5, bypass blocking: the bypass deployment blocking mode is supported, the hidden danger that single-point failure exists in serial deployment and time delay is brought to database access is avoided, and the zero change and zero influence of the existing network structure is avoided.
2. The computer firewall device based on cloud database and the using method thereof according to claim 1, wherein: and the global audit mode and the firewall mode are switched on line without restarting equipment. The firewall mode can block messages violating the rules in real time; and the global audit mode is used for rapidly forwarding the message, and the complete audit record is kept.
3. The computer firewall device based on cloud database and the using method thereof according to claim 1, wherein: management and audit are isolated, three rights are separated, log retention is achieved, mutual supervision is facilitated, audit is clear, and rights are clear.
4. The computer firewall device based on cloud database and the using method thereof according to claim 1, wherein: and various database threat interception such as MySQL, Oracle, MSSQL and the like are supported.
5. The computer firewall device based on cloud database and the using method thereof according to claim 1, wherein: various accesses to the database can be automatically identified, and intelligent identification and interception of potential risks such as application, operation and maintenance tools, hacker attack and the like are realized.
CN202011315784.9A 2020-11-22 2020-11-22 Computer firewall device based on cloud database and use method Pending CN112437081A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011315784.9A CN112437081A (en) 2020-11-22 2020-11-22 Computer firewall device based on cloud database and use method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011315784.9A CN112437081A (en) 2020-11-22 2020-11-22 Computer firewall device based on cloud database and use method

Publications (1)

Publication Number Publication Date
CN112437081A true CN112437081A (en) 2021-03-02

Family

ID=74693432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011315784.9A Pending CN112437081A (en) 2020-11-22 2020-11-22 Computer firewall device based on cloud database and use method

Country Status (1)

Country Link
CN (1) CN112437081A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113783889A (en) * 2021-09-22 2021-12-10 南方电网数字电网研究院有限公司 Firewall control method for linkage access of network layer and application layer and firewall thereof
CN114338087A (en) * 2021-12-03 2022-04-12 成都安恒信息技术有限公司 Directional operation and maintenance auditing method and system based on firewall
CN115865487A (en) * 2022-11-30 2023-03-28 四川启睿克科技有限公司 Abnormal behavior analysis method and device with privacy protection function

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113783889A (en) * 2021-09-22 2021-12-10 南方电网数字电网研究院有限公司 Firewall control method for linkage access of network layer and application layer and firewall thereof
CN114338087A (en) * 2021-12-03 2022-04-12 成都安恒信息技术有限公司 Directional operation and maintenance auditing method and system based on firewall
CN114338087B (en) * 2021-12-03 2024-03-15 成都安恒信息技术有限公司 Directional operation and maintenance auditing method and system based on firewall
CN115865487A (en) * 2022-11-30 2023-03-28 四川启睿克科技有限公司 Abnormal behavior analysis method and device with privacy protection function
CN115865487B (en) * 2022-11-30 2024-06-04 四川启睿克科技有限公司 Abnormal behavior analysis method and device with privacy protection function

Similar Documents

Publication Publication Date Title
CN111784209B (en) Asset visualization and safe operation management system
CN112437081A (en) Computer firewall device based on cloud database and use method
CN106790186B (en) Multi-step attack detection method based on multi-source abnormal event correlation analysis
Tien et al. KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches
Kholidy et al. CIDS: A framework for intrusion detection in cloud systems
CN110099040B (en) Defense method for detecting and intercepting intranet attack source based on mass bait deployment host
CN111193719A (en) Network intrusion protection system
CN105516189B (en) Network security enforcement system and method based on big data platform
CN101873318A (en) Application and data security method aiming at application system on application basis supporting platform
Riccardi et al. A framework for financial botnet analysis
CN112333191A (en) Illegal network asset detection and access blocking method, device, equipment and medium
US20230362131A1 (en) Systems and methods for monitoring and securing networks using a shared buffer
Mishra et al. Analysis of cloud computing vulnerability against DDoS
CN112468464B (en) State machine integrity verification system and method based on service chain
Zammit A machine learning based approach for intrusion prevention using honeypot interaction patterns as training data
CN105025067A (en) Information security technology research platform
Zhao et al. Network security model based on active defense and passive defense hybrid strategy
CN116155559A (en) Privacy calculation-oriented expandable data fine-granularity access control system
Tudosi et al. Design and Implementation of an Automated Dynamic Rule System for Distributed Firewalls.
Meng et al. Research on Active Defense Technology Based on Power System Network Security
Pareta et al. An integrated approach for effective intrusion detection with elasticsearch
US11283823B1 (en) Systems and methods for dynamic zone protection of networks
An et al. Research on Computer Information Security Protection System Based on Big Data Background
Ao Design and deployment of border security in multimedia network
Wu et al. [Retracted] Vulnerability Digging for Software‐Defined Network Controller Using Event Flow Graph Analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210302

WD01 Invention patent application deemed withdrawn after publication