CN112597536B - Real-time detection method and device for illegal deletion of database table file - Google Patents

Real-time detection method and device for illegal deletion of database table file Download PDF

Info

Publication number
CN112597536B
CN112597536B CN202011541989.9A CN202011541989A CN112597536B CN 112597536 B CN112597536 B CN 112597536B CN 202011541989 A CN202011541989 A CN 202011541989A CN 112597536 B CN112597536 B CN 112597536B
Authority
CN
China
Prior art keywords
database
deleted
deletion
file
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011541989.9A
Other languages
Chinese (zh)
Other versions
CN112597536A (en
Inventor
王禹
苗健
张鲁敏
卢健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Highgo Base Software Co ltd
Original Assignee
Highgo Base Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Highgo Base Software Co ltd filed Critical Highgo Base Software Co ltd
Priority to CN202011541989.9A priority Critical patent/CN112597536B/en
Publication of CN112597536A publication Critical patent/CN112597536A/en
Application granted granted Critical
Publication of CN112597536B publication Critical patent/CN112597536B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof

Abstract

The invention discloses a real-time detection method and equipment for illegal deletion of a database table file. The real-time detection method for the illegal deletion of the database table file comprises the following steps: initializing a hash table shared by multiple processes; storing the deletion information of each table in the database into a hash table; monitoring a deletion event of a table file corresponding to each table; judging whether the hash table has the deletion information of the table corresponding to the deleted table file, if so, judging that the deletion event is legal deletion; otherwise, judging the deletion event as illegal deletion. By adopting the invention, when the table file of the database is illegally deleted by a user or a non-database program, which table file is illegally deleted can be immediately sensed, so that the safety, the real-time responsiveness and the capability of processing abnormal conditions of the database can be enhanced.

Description

Real-time detection method and device for illegal deletion of database table file
Technical Field
The invention relates to the technical field of database security, in particular to a real-time detection method and equipment for illegal deletion of database table files.
Background
In the related art, when a table file corresponding to a table not currently used in a database is illegally deleted by a user or a non-database program, the database cannot immediately sense that the table file is deleted, an error prompt that the table does not exist or cannot be accessed exists only when the database really accesses the table corresponding to the illegally deleted table file, and meanwhile, an alarm message indicating which table file is illegally deleted cannot be sent in time to notify a database manager, so that a serious safety risk exists.
Disclosure of Invention
The embodiment of the invention provides a real-time detection method and equipment for illegally deleting a database table file, which are used for solving the problem that a user cannot timely know when a table file corresponding to a non-current use table of a database is illegally deleted by the user or a non-database program in the prior art.
The real-time detection method for the illegal deletion of the database table file according to the embodiment of the invention comprises the following steps:
initializing a hash table shared by multiple processes;
storing the deletion information of each table in the database into the hash table;
monitoring a deletion event of a table file corresponding to each table;
judging whether the hash table has the deletion information of the table corresponding to the deleted table file, if so, judging that the deletion event is legal deletion; otherwise, judging the deletion event as illegal deletion.
According to some embodiments of the invention, the method further comprises:
adding disk folders corresponding to all databases in a database system to be monitored into a monitoring queue, wherein the disk files comprise a plurality of table files, and the table files in the disk folders correspond to tables in the corresponding databases;
the storing the deletion information of each table in the database into the hash table includes:
storing the deletion information of all tables in the database system to be monitored into the hash table;
the monitoring of the deletion event of the table file corresponding to each table includes:
and monitoring the deletion event of the table file corresponding to each table in the database system to be monitored.
According to some embodiments of the invention, the method further comprises:
when one database in the databases to be monitored is deleted, removing a disk folder corresponding to the deleted database from the monitoring queue;
and when one database is added into the database to be monitored, adding the disk folder corresponding to the added database into the monitoring queue.
According to some embodiments of the present invention, the storing the deletion information of each table in the database into the hash table includes:
acquiring an SQL statement of a deleted table to acquire the name of the table to be deleted;
and determining a table file corresponding to the table to be deleted based on the name of the table to be deleted, and storing the path of the table file corresponding to the table to be deleted into the hash table.
According to some embodiments of the present invention, the determining whether the hash table has deletion information of a table corresponding to a deleted table file includes:
and acquiring the path of the deleted table file, and judging whether the path of the deleted table file exists in the hash table.
According to some embodiments of the invention, the method further comprises:
and when the deletion event is judged to be illegal deletion, sending alarm information to the user.
The real-time detection equipment for the illegal deletion of the database table file according to the embodiment of the invention comprises the following components:
the process creating unit is used for creating a monitoring process;
the monitoring process is to:
initializing a hash table shared by multiple processes;
adding disk folders corresponding to all databases in a database system to be monitored into a monitoring queue, wherein the disk files comprise a plurality of table files, and the table files in the disk folders correspond to tables in the corresponding databases;
monitoring a deletion event of a table file corresponding to each table in the database system to be monitored;
the deleted information recording unit is used for storing the deleted information of each table in the database system to be monitored into the hash table;
the judging unit is used for judging whether the deleted information of the table corresponding to the deleted table file exists in the hash table or not, and if yes, judging that the deletion event is legal deletion; otherwise, judging the deletion event as illegal deletion.
According to some embodiments of the invention, the monitoring process is further to:
and adding disk folders corresponding to all databases in a database system to be monitored into a monitoring queue, wherein the disk files comprise a plurality of table files, and the table files in the disk folders correspond to tables in the corresponding databases.
According to some embodiments of the invention, the monitoring process is further to:
when one database in the databases to be monitored is deleted, removing a disk folder corresponding to the deleted database from the monitoring queue;
and when one database is added into the database to be monitored, adding the disk folder corresponding to the added database into the monitoring queue.
According to the computer readable storage medium of the embodiment of the invention, the computer readable storage medium stores the implementation program of information transfer, and the program when executed by the processor realizes the steps of the real-time detection method for illegal deletion of the database table file.
By adopting the embodiment of the invention, when the table file of the database is illegally deleted by a user or a non-database program, which table file is illegally deleted can be immediately sensed, so that the safety, the real-time responsiveness and the capability of processing abnormal conditions of the database can be enhanced.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. In the drawings:
FIG. 1 is a flow chart of a real-time detection method for illegal deletion of a database table file in an embodiment of the present invention;
FIG. 2 is a partial flow diagram of a real-time detection method for illegal deletion of a database table file according to an embodiment of the present invention;
FIG. 3 is a partial flow diagram of a real-time detection method for illegal deletion of a database table file according to an embodiment of the present invention;
FIG. 4 is a partial flow chart of a real-time detection method for illegal deletion of a database table file according to an embodiment of the present invention;
FIG. 5 is a schematic flow chart of a part of a real-time detection method for illegal deletion of a database table file in an embodiment of the present invention;
FIG. 6 is a partial flow diagram of a real-time detection method for illegal deletion of a database table file according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
For relational databases, each database has a folder named by a unique number corresponding to the database, and table files corresponding to tables in the database are arranged in the folders. When a table is created using SQL statements, a table file associated with the table is generated under the folder corresponding to the current database on disk. When a table is deleted by using the SQL statement, the related table file on the disk corresponding to the table is deleted.
When the database itself does not perform operations related to deleting the table, but the table file is deleted by the user or other processes, it is called illegal deletion. When a table file corresponding to a currently used table of the database is illegally deleted by a user or other programs, and the database accesses the table, an error that the table file cannot be found or cannot be accessed is reported, but an administrator cannot be notified in real time.
When a table file corresponding to a table not currently used in the database is illegally deleted by a user or other programs, the database cannot immediately perceive that the table file is deleted. Only when the database accesses a table in which the disc table file has been deleted, the database reports an error that the table file cannot be found or cannot be accessed, but cannot notify the administrator in real time.
Based on this, in a first aspect, an embodiment of the present invention provides a real-time detection method for illegally deleting a database table file, as shown in fig. 1, including:
s1, initializing a hash table shared by multiple processes;
s2, storing the deletion information of each table in the database into the hash table;
s3, monitoring a deletion event of the table file corresponding to each table;
s4, judging whether the hash table has the deletion information of the table corresponding to the deleted table file, if so, judging that the deletion event is legal deletion; otherwise, judging the deletion event as illegal deletion.
By adopting the embodiment of the invention, when the table file of the database is illegally deleted by a user or a non-database program, which table file is illegally deleted can be immediately sensed, so that the safety, the real-time responsiveness and the capability of processing abnormal conditions of the database can be enhanced.
On the basis of the above-described embodiment, various modified embodiments are further proposed, and it is to be noted herein that, in order to make the description brief, only the differences from the above-described embodiment are described in the various modified embodiments.
According to some embodiments of the invention, the method further comprises:
adding disk folders corresponding to all databases in a database system to be monitored into a monitoring queue, wherein the disk files comprise a plurality of table files, and the table files in the disk folders correspond to tables in the corresponding databases; for example, each table in the database corresponds to each table file in the corresponding disk folder one to one, that is, the table and the table file are in a one-to-one mapping relationship; in another example, each table in the database corresponds to a plurality of table files in its corresponding disk folder, i.e., the table and the table file are in a one-to-many mapping relationship.
The storing the deletion information of each table in the database into the hash table includes:
storing the deletion information of all tables in the database system to be monitored into the hash table;
the monitoring of the deletion event of the table file corresponding to each table includes:
and monitoring the deletion event of the table file corresponding to each table in the database system to be monitored.
According to some embodiments of the invention, the method further comprises:
when one of the databases to be monitored is deleted, removing a disk folder corresponding to the deleted database from the monitoring queue;
and when one database is added into the database to be monitored, adding the disk folder corresponding to the added database into the monitoring queue.
According to some embodiments of the present invention, the storing the deletion information of each table in the database into the hash table includes:
acquiring an SQL statement of a deleted table to acquire the name of the table to be deleted;
and determining a table file corresponding to the table to be deleted based on the name of the table to be deleted, and storing the path of the table file corresponding to the table to be deleted into the hash table.
According to some embodiments of the present invention, the determining whether the hash table has deletion information of a table corresponding to a deleted table file includes:
and acquiring the path of the deleted table file, and judging whether the path of the deleted table file exists in the hash table.
According to some embodiments of the invention, the method further comprises:
and when the deletion event is judged to be illegal deletion, sending alarm information to the user.
The method for detecting the illegal deletion of the database table file in real time according to the embodiment of the invention is described in detail in a specific embodiment with reference to fig. 2-6. It is to be understood that the following description is illustrative only and is not intended to be in any way limiting. All similar structures and similar variations thereof adopted by the invention are included in the scope of the invention.
According to the real-time detection method for the illegal deletion of the database table file, disclosed by the embodiment of the invention, when the table is deleted from the database, the path of the table file to be deleted is recorded into the multi-process shared hash table. When the database is initialized, starting a monitoring process to monitor file deletion events in folders corresponding to all databases in the database system, and when the file deletion events occur, acquiring a path for deleting files and searching in the multi-process shared hash table. If it can be found, it is a legal deletion of the database itself. If the information can not be found, the information is represented as illegal deletion, and an alarm is given to inform an administrator. Therefore, the table files of the database can be sensed in real time when being illegally deleted, and an alarm is given to an administrator about which table file is deleted.
Specifically, the real-time detection method for the illegal deletion of the database table file in the embodiment of the invention comprises the following steps:
step 1: when a database is initialized, a monitoring process waiting for a file deletion event needs to be created, and the monitoring process carries out the following three operations in sequence: establishing a multi-process shared hash table; adding disk folders corresponding to all databases of the current database system into a monitoring queue; blocking waits for the occurrence of a delete event in a folder monitored in the monitoring queue. The monitor process initialization flow is shown in fig. 2.
Step 2: executing the SQL statement for deleting the table, obtaining the name of the table to be deleted by the SQL statement after the transaction is submitted, and recording the name of the table to be deleted in the multi-process shared hash table created by the monitoring process, as shown in fig. 3.
And 3, step 3: if the file is deleted in the monitoring queue, the monitoring process is awakened by the file deletion event, and the path of the deleted file is obtained. And searching the path of the deleted file in the multi-process shared hash table, if so, indicating that the file is legal deletion executed by the database, removing the path of the file from the multi-process shared hash table, and then continuously waiting for the occurrence of a deletion event. If not, indicating an illegal delete, an alarm is performed to notify the administrator, and then continues to wait for the occurrence of a delete event, as shown in FIG. 4.
And 4, step 4: when a database is created, acquiring a folder path corresponding to the database, sending a signal to the monitoring process, adding the folder corresponding to the database into a monitoring queue of the monitoring process, and if a file in the folder is deleted, executing the process of step 3, as shown in fig. 5.
And 5: when a database is deleted, a folder path corresponding to the database is acquired, a signal is sent to the monitoring process, the folder corresponding to the database is removed from the monitoring queue of the monitoring process, and the monitoring process does not monitor the folder any more, as shown in fig. 6.
By adopting the embodiment of the invention, the file deletion operation in the monitoring queue folder is monitored by setting a file monitoring process in the database. When the file monitoring process is initialized, the folder corresponding to the current database is added into the monitoring queue. When a database is newly built, a folder corresponding to the database is added into a monitoring queue; when the database is deleted, the folder corresponding to the database is removed from the monitoring queue. The system is also provided with a multi-process shared hash table for recording file paths. When the database system deletes a table, a file path is added to the shared hash table. And after the file monitoring process is awakened by the file deleting event, searching whether the deleted file is in the hash table or not, and if not, alarming to inform an administrator. Therefore, when the database table file is deleted by the non-database process, an alarm can be sent immediately to inform an administrator which file is deleted illegally, and the safety, real-time responsiveness and abnormal condition processing capacity of the database are enhanced.
It should be noted that the above-mentioned embodiments are only preferred embodiments of the present invention, and are not intended to limit the present invention, and those skilled in the art can make various modifications and changes. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
In a second aspect, an embodiment of the present invention further provides a real-time detection apparatus for detecting that a database table file is illegally deleted, including:
the process creating unit is used for creating a monitoring process;
the monitoring process is to:
initializing a hash table shared by multiple processes;
adding disk folders corresponding to all databases in a database system to be monitored into a monitoring queue, wherein the disk files comprise a plurality of table files, and the table files in the disk folders correspond to tables in the corresponding databases;
monitoring a deletion event of a table file corresponding to each table in the database system to be monitored;
the deleted information recording unit is used for storing the deleted information of each table in the database system to be monitored into the hash table;
the judging unit is used for judging whether the deleted information of the table corresponding to the deleted table file exists in the hash table or not, and if so, judging that the deletion event is legal deletion; otherwise, judging the deletion event as illegal deletion.
By adopting the embodiment of the invention, when the table file of the database is illegally deleted by a user or a non-database program, which table file is illegally deleted can be immediately sensed, so that the safety, the real-time responsiveness and the abnormal condition processing capability of the database can be enhanced.
On the basis of the above-described embodiment, various modified embodiments are further proposed, and it is to be noted herein that, in order to make the description brief, only the differences from the above-described embodiment are described in the various modified embodiments.
According to some embodiments of the invention, the monitoring process is further configured to:
and adding disk folders corresponding to all databases in a database system to be monitored into a monitoring queue, wherein the disk files comprise a plurality of table files, and the table files in the disk folders correspond to tables in the corresponding databases.
According to some embodiments of the invention, the monitoring process is further to:
when one of the databases to be monitored is deleted, removing a disk folder corresponding to the deleted database from the monitoring queue;
and when one database is added into the database to be monitored, adding the disk folder corresponding to the added database into the monitoring queue.
According to some embodiments of the present invention, the storing the deletion information of each table in the database into the hash table includes:
storing the deletion information of all tables in the database system to be monitored into the hash table;
the monitoring of the deletion event of the table file corresponding to each table comprises:
and monitoring the deletion event of the table file corresponding to each table in the database system to be monitored.
According to some embodiments of the present invention, the storing the deletion information of each table in the database into the hash table includes:
acquiring an SQL statement of a deleted table to acquire the name of the table to be deleted;
and determining a table file corresponding to the table to be deleted based on the name of the table to be deleted, and storing the path of the table file corresponding to the table to be deleted into the hash table.
According to some embodiments of the present invention, the determining whether the hash table has deletion information of a table corresponding to a deleted table file includes:
and acquiring the path of the deleted table file, and judging whether the path of the deleted table file exists in the hash table.
According to some embodiments of the invention, the method further comprises:
and when the deletion event is judged to be illegal deletion, sending alarm information to the user.
In a third aspect, an embodiment of the present invention further provides a computer-readable storage medium, where an implementation program for information transfer is stored on the computer-readable storage medium, and when the program is executed by a processor, the step of implementing the real-time detection method for illegal deletion of the database table file in the embodiment of the first aspect is implemented.
The computer-readable storage medium of the embodiment includes, but is not limited to: ROM, RAM, magnetic or optical disks, and the like.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized in a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a memory device and executed by a computing device, and in some cases, the steps shown or described may be executed out of order, or separately as individual integrated circuit modules, or multiple modules or steps thereof may be implemented as a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (7)

1. A real-time detection method for illegal deletion of a database table file is characterized by comprising the following steps:
initializing a hash table shared by multiple processes;
storing the deletion information of each table in the database into the hash table;
monitoring a deletion event of a table file corresponding to each table;
judging whether the hash table has the deletion information of the table corresponding to the deleted table file, if so, judging that the deletion event is legal deletion; otherwise, judging the deletion event as illegal deletion, and sending alarm information to the user when judging the deletion event as illegal deletion;
the storing the deletion information of each table in the database into the hash table includes:
acquiring an SQL statement of a deleted table to acquire the name of the table to be deleted;
determining a table file corresponding to the table to be deleted based on the name of the table to be deleted, and storing the path of the table file corresponding to the table to be deleted into the hash table;
the determining whether the hash table has deletion information of a table corresponding to a deleted table file includes:
and acquiring the path of the deleted table file, and judging whether the path of the deleted table file exists in the hash table.
2. The method of claim 1, wherein the method further comprises:
adding disk folders corresponding to all databases in a database system to be monitored into a monitoring queue, wherein the disk files comprise a plurality of table files, and the table files in the disk folders correspond to tables in the corresponding databases;
the storing the deletion information of each table in the database into the hash table includes:
storing the deletion information of all tables in the database system to be monitored into the hash table;
the monitoring of the deletion event of the table file corresponding to each table includes:
and monitoring the deletion event of the table file corresponding to each table in the database system to be monitored.
3. The method of claim 2, wherein the method further comprises:
when one database in the databases to be monitored is deleted, removing a disk folder corresponding to the deleted database from the monitoring queue;
and when one database is added to the database to be monitored, adding the disk folder corresponding to the added database into the monitoring queue.
4. A real-time detection equipment for illegal deletion of database table files is characterized by comprising:
the process creating unit is used for creating a monitoring process;
the monitoring process is to:
initializing a hash table shared by multiple processes;
adding disk folders corresponding to all databases in a database system to be monitored into a monitoring queue, wherein the disk files comprise a plurality of table files, and the table files in the disk folders correspond to tables in the corresponding databases;
monitoring a deletion event of a table file corresponding to each table in the database system to be monitored;
a deleted information recording unit, configured to store deleted information of each table in the database system to be monitored into the hash table;
the judging unit is used for judging whether the deleted information of the table corresponding to the deleted table file exists in the hash table or not, and if yes, judging that the deletion event is legal deletion; otherwise, judging the deletion event as illegal deletion, and sending alarm information to the user when judging the deletion event as illegal deletion;
the storing the deletion information of each table in the database into the hash table includes:
acquiring an SQL statement of a deleted table to acquire the name of the table to be deleted;
determining a table file corresponding to the table to be deleted based on the name of the table to be deleted, and storing the path of the table file corresponding to the table to be deleted into the hash table;
the determining whether the hash table has deletion information of a table corresponding to a deleted table file includes:
and acquiring the path of the deleted table file, and judging whether the path of the deleted table file exists in the hash table.
5. The apparatus of claim 4, wherein the monitoring process is further to:
and adding disk folders corresponding to all databases in a database system to be monitored into a monitoring queue, wherein the disk files comprise a plurality of table files, and the table files in the disk folders correspond to tables in the corresponding databases.
6. The apparatus of claim 5, wherein the monitoring process is further to:
when one database in the databases to be monitored is deleted, removing a disk folder corresponding to the deleted database from the monitoring queue;
and when one database is added into the database to be monitored, adding the disk folder corresponding to the added database into the monitoring queue.
7. A computer-readable storage medium, characterized in that it stores thereon a program for implementing information transfer, which when executed by a processor implements the steps of a method for detecting in real time that a database table file according to any one of claims 1 to 3 is illegally deleted.
CN202011541989.9A 2020-12-23 2020-12-23 Real-time detection method and device for illegal deletion of database table file Active CN112597536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011541989.9A CN112597536B (en) 2020-12-23 2020-12-23 Real-time detection method and device for illegal deletion of database table file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011541989.9A CN112597536B (en) 2020-12-23 2020-12-23 Real-time detection method and device for illegal deletion of database table file

Publications (2)

Publication Number Publication Date
CN112597536A CN112597536A (en) 2021-04-02
CN112597536B true CN112597536B (en) 2023-01-24

Family

ID=75200448

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011541989.9A Active CN112597536B (en) 2020-12-23 2020-12-23 Real-time detection method and device for illegal deletion of database table file

Country Status (1)

Country Link
CN (1) CN112597536B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104133641A (en) * 2014-07-24 2014-11-05 深圳市同洲电子股份有限公司 External storage equipment file deleting method and device
CN104978151A (en) * 2015-06-19 2015-10-14 浪潮电子信息产业股份有限公司 Application awareness based data reconstruction method in repeated data deletion and storage system
CN107153707A (en) * 2017-05-12 2017-09-12 华中科技大学 A kind of Hash table construction method and system for nonvolatile memory
CN107479942A (en) * 2016-06-08 2017-12-15 深圳市深信服电子科技有限公司 The client operating system of virtual machine starts method and device
CN109150642A (en) * 2017-06-16 2019-01-04 腾讯科技(深圳)有限公司 Application memory error-detecting method, detection device and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102754394B (en) * 2010-08-19 2015-07-22 华为技术有限公司 Method for hash table storage, method for hash table lookup, and devices thereof
CN102708201B (en) * 2012-05-17 2014-11-26 北京工业大学 Mass data collection method based on RFID (Radio Frequency Identification Devices) reader-writer
CN105243340B (en) * 2015-11-18 2018-12-07 浪潮(北京)电子信息产业有限公司 It is a kind of to prevent the method and system that data are accidentally deleted in HBase
CN105930739B (en) * 2016-04-14 2019-07-23 珠海豹趣科技有限公司 A kind of method and terminal for preventing file deleted
CN107967322B (en) * 2017-11-23 2021-09-21 努比亚技术有限公司 File classification display method, mobile terminal and computer readable storage medium
CN111427847B (en) * 2020-04-03 2023-04-11 中山大学 Indexing and querying method and system for user-defined metadata

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104133641A (en) * 2014-07-24 2014-11-05 深圳市同洲电子股份有限公司 External storage equipment file deleting method and device
CN104978151A (en) * 2015-06-19 2015-10-14 浪潮电子信息产业股份有限公司 Application awareness based data reconstruction method in repeated data deletion and storage system
CN107479942A (en) * 2016-06-08 2017-12-15 深圳市深信服电子科技有限公司 The client operating system of virtual machine starts method and device
CN107153707A (en) * 2017-05-12 2017-09-12 华中科技大学 A kind of Hash table construction method and system for nonvolatile memory
CN109150642A (en) * 2017-06-16 2019-01-04 腾讯科技(深圳)有限公司 Application memory error-detecting method, detection device and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
最简单的哈希表删除元素;zzxian;《CSDN》;20101125;全文 *

Also Published As

Publication number Publication date
CN112597536A (en) 2021-04-02

Similar Documents

Publication Publication Date Title
US6434616B2 (en) Method for monitoring abnormal behavior in a computer system
JP6048038B2 (en) Information processing apparatus, program, and information processing method
US8621282B1 (en) Crash data handling
US8601121B2 (en) Tracking changes to data within various data repositories
US9274876B2 (en) Diagnostic data set component
JP4722944B2 (en) System, method and software for distributed loading of databases
US9251184B2 (en) Processing of destructive schema changes in database management systems
JP2016533564A (en) An event model that correlates the state of system components
JP6996812B2 (en) How to process data blocks in a distributed database, programs, and devices
CN109299064B (en) Database monitoring method and terminal equipment
US11169896B2 (en) Information processing system
US20210176315A1 (en) Cross Storage Protocol Access Response for Object Data Stores
CN111221890B (en) Automatic monitoring and early warning method and device for universal index class
CN112182604A (en) File detection system and method
US20070294584A1 (en) Detection and isolation of data items causing computer process crashes
CN112597536B (en) Real-time detection method and device for illegal deletion of database table file
JP6978662B2 (en) Output program, information processing device, and output method
KR20180054389A (en) Client device and back-up method based on cloud, recording medium for performing the method
US8745001B1 (en) Automated remediation of corrupted and tempered files
CN114186278A (en) Database abnormal operation identification method and device and electronic equipment
CN113485872A (en) Fault processing method and device and distributed storage system
CN114640529B (en) Attack protection method, apparatus, device, storage medium and computer program product
US20160364813A1 (en) System for creating a linkage family tree including non-requested entities and detecting changes to the tree via an intelligent change detection system
RU2700185C1 (en) Method for detecting hidden software in a computing system operating under a posix-compatible operating system
CN112346662A (en) Disk cleaning method, device and system based on disk analysis and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant