CN113886366A - Database operation and maintenance method and device, electronic equipment and readable storage medium - Google Patents

Database operation and maintenance method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN113886366A
CN113886366A CN202111241333.XA CN202111241333A CN113886366A CN 113886366 A CN113886366 A CN 113886366A CN 202111241333 A CN202111241333 A CN 202111241333A CN 113886366 A CN113886366 A CN 113886366A
Authority
CN
China
Prior art keywords
sql
database
maintenance
sql statement
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111241333.XA
Other languages
Chinese (zh)
Inventor
吴万燊
范渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Original Assignee
DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DBAPPSecurity Co Ltd filed Critical DBAPPSecurity Co Ltd
Priority to CN202111241333.XA priority Critical patent/CN113886366A/en
Publication of CN113886366A publication Critical patent/CN113886366A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a database operation and maintenance method, a database operation and maintenance device, electronic equipment and a computer readable storage medium, wherein the method comprises the following steps: if the non-SQL sentences sent by the target client are detected, the non-SQL sentences are sent to a database so that the database can be connected with the target client conveniently; obtaining a legal operation and maintenance SQL statement sent by a target client, and sending the legal operation and maintenance SQL statement to a database so as to carry out operation and maintenance on the database; by sending all the non-SQL statements to the database, the problem that operation and maintenance are affected due to the fact that the client cannot be connected with the database because only legal SQL statements are released by the database security protection function can be prevented. Meanwhile, only the legal operation and maintenance SQL sentences are sent to the database in the follow-up process, so that the data can be prevented from being attacked, and the effect of safety protection is achieved.

Description

Database operation and maintenance method and device, electronic equipment and readable storage medium
Technical Field
The present disclosure relates to the field of database technologies, and in particular, to a database operation and maintenance method, a database operation and maintenance device, an electronic device, and a computer-readable storage medium.
Background
With the rapid development of the internet, various industries increasingly rely on the internet, the demands of servers, applications and network devices inside enterprises are increasing, the corresponding database is more and more important as the main application of data storage, the increase of operation and maintenance personnel is driven by the increase of the services, and the corresponding limit on personnel permission is more and more important.
Currently, in order to improve the security of the database, a database protection function is usually started on the bastion machine. The following conditions exist in the SQL statement of the control database through the fort: most users are connected to the bastion machine by using the client and then connected with the database through the bastion machine, and the bastion machine with the database protection function is opened only passes legal SQL statements, so that the client cannot be connected with the database, the current business cannot carry out conventional operation and maintenance operation, and serious business faults are easily caused.
Therefore, the problem that the bastion machine affects operation and maintenance in the related art is a technical problem to be solved by a person skilled in the art.
Disclosure of Invention
In view of the above, an object of the present application is to provide a database operation and maintenance method, a database operation and maintenance device, an electronic device, and a computer-readable storage medium, which enable a bastion machine not to interfere with operation and maintenance work on a database on the premise of ensuring a security protection effect.
In order to solve the above technical problem, the present application provides a database operation and maintenance method, including:
if the non-SQL sentences sent by the target client are detected, the non-SQL sentences are sent to a database so that the database can be connected with the target client conveniently;
and obtaining a legal operation and maintenance SQL statement sent by the target client, and sending the legal operation and maintenance SQL statement to the database so as to carry out operation and maintenance on the database.
Optionally, the detecting a non-SQL statement sent by a target client includes:
acquiring information sent by the target client;
SQL detection is carried out on the information;
and if the SQL is not detected, determining that the non-SQL statement is detected.
Optionally, the performing SQL detection on the information includes:
calling an SQL feature library and carrying out SQL feature matching on the information;
and if the SQL data is not matched with any SQL feature, determining that the SQL detection is not passed.
Optionally, the obtaining the valid operation and maintenance SQL statement sent by the target client includes:
acquiring an SQL statement sent by the target client;
carrying out matching detection on the SQL statement by using a preset matching rule;
and if the SQL statement passes the matching detection, determining the SQL statement as the legal operation and maintenance SQL statement.
Optionally, the method further comprises:
and acquiring an updating instruction, and updating the preset matching rule according to the updating instruction.
Optionally, if the match detection is failed, the method includes:
if the target preset matching rule that the SQL statement does not match is an interception rule, intercepting the SQL statement;
and if the target preset matching rule that the SQL statement is not matched is an approval rule, reporting the SQL statement to approve.
Optionally, the method further comprises:
if the SQL sentences which are reported and approved are detected to pass the approval, the SQL sentences are sent to the database;
and if the SQL sentence which is reported and approved is not approved, intercepting the SQL sentence.
The application also provides a database operation and maintenance device, including:
the connection module is used for sending the non-SQL sentences to a database if the non-SQL sentences sent by the target client are detected so as to establish connection between the database and the target client;
and the operation and maintenance module is used for acquiring the legal operation and maintenance SQL sentences sent by the target client and sending the legal operation and maintenance SQL sentences to the database so as to carry out operation and maintenance on the database.
The present application further provides an electronic device comprising a memory and a processor, wherein:
the memory is used for storing a computer program;
the processor is used for executing the computer program to realize the database operation and maintenance method.
The present application further provides a computer-readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the database operation and maintenance method described above.
According to the database operation and maintenance method, if the non-SQL sentences sent by the target client are detected, the non-SQL sentences are sent to the database so that the database is connected with the target client conveniently; and obtaining a legal operation and maintenance SQL statement sent by the target client, and sending the legal operation and maintenance SQL statement to the database so as to carry out operation and maintenance on the database.
Therefore, the bastion machine in the method starts the SQL protection function, and when a non-SQL statement is detected, although the non-SQL statement does not meet the requirement of the database protection function on a legal SQL statement, the non-SQL statement is not intercepted, but is directly sent to the database. Since the non-SQL statement cannot cause attack behavior on the database, the security protection failure cannot be caused when the non-SQL statement is released. And the client can establish connection with the database by using the non-SQL statement so as to carry out operation and maintenance on the database. After the connection is established, if a legal operation and maintenance SQL statement sent by the target client is detected, the operation and maintenance SQL statement is forwarded to the database so as to carry out operation and maintenance on the database. By sending all the non-SQL statements to the database, the problem that operation and maintenance are affected due to the fact that the client cannot be connected with the database because only legal SQL statements are released by the database security protection function can be prevented. Meanwhile, only the legal operation and maintenance SQL sentences are sent to the database in the follow-up process, so that the data can be prevented from being attacked, and the effect of safety protection is achieved. Namely, on the premise of ensuring the safety protection effect, the fortress machine does not interfere with the operation and maintenance work of the database.
In addition, the application also provides a database operation and maintenance device, electronic equipment and a computer readable storage medium, and the database operation and maintenance device, the electronic equipment and the computer readable storage medium also have the beneficial effects.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or related technologies of the present application, the drawings needed to be used in the description of the embodiments or related technologies are briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a database operation and maintenance method according to an embodiment of the present disclosure;
fig. 2 is a flowchart of a specific database operation and maintenance method according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a database operation and maintenance device according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flowchart illustrating a database operation and maintenance method according to an embodiment of the present disclosure. The method comprises the following steps:
s101: and if the non-SQL sentences sent by the target client are detected, sending the non-SQL sentences to the database so as to establish connection between the database and the target client.
The various steps in this application are performed by the fort machine. The bastion is a technical means for monitoring and recording the operation behaviors of operation and maintenance personnel on devices such as servers, network devices, security devices, databases and the like in the network by using various technical means in order to ensure that the network and data are not invaded and damaged by external and internal users under a specific network environment, and is generally executed by a specified device, and the execution device is also called the bastion. The bastion machine integrates two main functions of core system operation and safety audit management and control from the functional point of view, and takes over the access of the terminal computer to the network and the server by cutting off the direct access of the terminal computer to the network and the server resources and adopting a protocol agent mode from the technical point of view.
The target client refers to a client for performing operation and maintenance on the database, and may specifically be any one client. Before the operation and maintenance of the database, the target client needs to establish a connection with the database. It should be noted that even if the target client establishes a connection with the database, the communication still needs to pass through the bastion machine, so that the bastion machine detects the communicated SQL statement. When establishing connection with a database, a target client needs to send certain built-in commands, and the built-in commands are non-SQL statements. In the related art, the bastion machine only passes through the SQL sentences which meet the requirements, but the non-SQL sentences do not necessarily meet the requirements, so the bastion machine can intercept the SQL sentences. The client cannot establish connection with the database, and further cannot operate and maintain the database.
In order to solve the above problem, in the present application, when any non-SQL statement sent by the target client is detected, the non-SQL statement is released. Since the non-SQL statement cannot cause attack behavior on the database, the security protection failure cannot be caused when the non-SQL statement is released. And the target client can establish connection with the database by using the non-SQL statement to provide a basis for subsequent operation and maintenance. The present embodiment does not limit the connection establishment method, and reference may be made to related technologies.
Therefore, it can be understood that the bastion machine acquires the information sent by the target client, and then firstly carries out SQL detection on the information and judges whether the information is an SQL statement or not. And if the SQL is not detected, determining that the non-SQL statement is detected. Specifically, the bastion machine may have an SQL feature library in which SQL features are described. When SQL detection is carried out on the information, an SQL feature library can be called to carry out SQL feature matching on the information. And if the SQL data is not matched with any SQL feature, determining that the SQL detection is not passed. The SQL feature refers to a feature that an SQL statement should have, and specific content of the SQL feature is not limited, for example, the SQL feature may be a format feature or a data type feature.
S102: and obtaining a legal operation and maintenance SQL statement sent by the target client, and sending the legal operation and maintenance SQL statement to the database so as to carry out operation and maintenance on the database.
After the legal operation and maintenance SQL statement for operation and maintenance sent by the target client is obtained, the operation and maintenance SQL statement is legal and does not cause an attack effect, so that the operation and maintenance SQL statement can be sent to a database so as to carry out operation and maintenance on the database. Specifically, it can be understood that before the valid operation and maintenance SQL statement is determined to be obtained, the validity of the SQL statement needs to be determined first. Specifically, the process of obtaining the legal operation and maintenance SQL statement sent by the target client may include:
step 11: and acquiring the SQL sentences sent by the target client.
Step 12: and carrying out matching detection on the SQL statement by using a preset matching rule.
Step 13: and if the SQL statement passes the matching detection, determining the SQL statement as a legal operation and maintenance SQL statement.
In this embodiment, the SQL statements directly obtained from the target client need to be matched and detected according to a preset matching rule. And presetting a matching rule for limiting the legal SQL statement, and if the matching detection is passed, determining that the obtained SQL statement is the legal operation and maintenance SQL statement. The content and the number of the preset matching rules are not limited, and can be set according to requirements. Further, the user can adjust the preset matching rule according to the requirement. In an embodiment, an update instruction may be obtained, and the preset matching rule may be updated according to the update instruction. The update instruction may be used to provide the updated preset matching rule, or may provide an update mode for the current preset matching rule, so as to update the preset matching rule according to the update mode.
Further, if the matching detection fails, the SQL statement needs to be processed according to specific settings, which may specifically include the following steps:
step 21: and if the target preset matching rule of the SQL statement which is not matched is the interception rule, intercepting the SQL statement.
Step 22: and if the target preset matching rule of the unmatched SQL statement is an approval rule, reporting the SQL statement to approve.
The interception rule refers to a rule that the processing mode that the target preset matching rule is not satisfied is to intercept the SQL statement, and the approval rule refers to a rule that the processing mode that the target preset matching rule is not satisfied is to report and approve the SQL statement.
In addition, the SQL statement may be further processed according to the approval result, which may specifically include:
step 31: and if the SQL sentence which is reported and approved is detected to pass the approval, the SQL sentence is sent to the database.
Step 32: and if the SQL sentence which is reported and approved is not approved, intercepting the SQL sentence.
Specifically, the user can manually approve the submitted and approved SQL statement and determine whether the statement passes through. After the approval is completed, a notice of whether the approval is passed or not can be sent to the fortress machine, so that the fortress machine can process the SQL statement according to the approval result.
Referring to fig. 2, fig. 2 is a flowchart illustrating a specific database operation and maintenance method according to an embodiment of the present disclosure. The database client is a client, and can send two statements, one is an SQL statement, the other is a built-in statement, and the built-in statement is a non-SQL statement and is used for establishing connection with the database. The bastion machine comprises a detection module and a control module, wherein the detection module comprises an SQL statement feature library, and after the sent built-in statement is detected, the detection module indicates the control module to release the built-in statement so that the client side can be connected with the database conveniently. After the detection module acquires the SQL statement, the SQL statement is intercepted, released or approved according to preset rules.
By applying the database operation and maintenance method provided by the embodiment of the application, the bastion machine starts the SQL protection function, and when a non-SQL statement is detected, although the non-SQL statement does not meet the requirement of the database protection function on a legal SQL statement, the non-SQL statement is not intercepted, but is directly sent to the database. Since the non-SQL statement cannot cause attack behavior on the database, the security protection failure cannot be caused when the non-SQL statement is released. And the client can establish connection with the database by using the non-SQL statement so as to carry out operation and maintenance on the database. After the connection is established, if a legal operation and maintenance SQL statement sent by the target client is detected, the operation and maintenance SQL statement is forwarded to the database so as to carry out operation and maintenance on the database. By sending all the non-SQL statements to the database, the problem that operation and maintenance are affected due to the fact that the client cannot be connected with the database because only legal SQL statements are released by the database security protection function can be prevented. Meanwhile, only the legal operation and maintenance SQL sentences are sent to the database in the follow-up process, so that the data can be prevented from being attacked, and the effect of safety protection is achieved. Namely, on the premise of ensuring the safety protection effect, the fortress machine does not interfere with the operation and maintenance work of the database.
In the following, the database operation and maintenance device provided in the embodiment of the present application is introduced, and the database operation and maintenance device described below and the database operation and maintenance method described above may be referred to correspondingly.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a database operation and maintenance device according to an embodiment of the present application, including:
the connection module 110 is configured to send a non-SQL statement to the database if the non-SQL statement sent by the target client is detected, so that the database is connected to the target client;
and the operation and maintenance module 120 is configured to obtain a legal operation and maintenance SQL statement sent by the target client, and send the legal operation and maintenance SQL statement to the database, so as to perform operation and maintenance on the database.
Optionally, the connection module 110 includes:
the information acquisition unit is used for acquiring information sent by a target client;
the SQL detection unit is used for carrying out SQL detection on the information;
and the determining unit is used for determining that the non-SQL statement is detected if the SQL detection is not passed.
Optionally, the SQL detecting unit includes:
the characteristic matching subunit is used for calling the SQL characteristic library and carrying out SQL characteristic matching on the information;
and the failed determination subunit is used for determining that the SQL detection is failed if the SQL detection is not matched with any SQL feature.
Optionally, the operation and maintenance module 120 includes:
the SQL obtaining unit is used for obtaining SQL sentences sent by the target client;
the rule detection unit is used for carrying out matching detection on the SQL statement by utilizing a preset matching rule;
and the detection passing unit is used for determining the SQL statement as a legal operation and maintenance SQL statement if the matching detection is passed.
Optionally, the method further comprises:
and the rule updating module is used for acquiring the updating instruction and updating the preset matching rule according to the updating instruction.
Optionally, comprising:
the interception module is used for intercepting the SQL statement if the matching detection is not passed and the target preset matching rule of the SQL statement mismatch is an interception rule;
and the reporting module is used for reporting the SQL statement to be approved if the SQL statement fails the matching detection and the target preset matching rule of the unmatched SQL statement is an approval rule.
Optionally, the method further comprises:
the report forwarding module is used for sending the SQL sentence to the database if the SQL sentence subjected to report approval is examined and approved;
and the report interception module is used for intercepting the SQL sentence if the SQL sentence which is reported and approved is not approved.
In the following, the electronic device provided in the embodiment of the present application is introduced, and the electronic device described below and the database operation and maintenance method described above may be referred to correspondingly.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. Wherein the electronic device 100 may include a processor 101 and a memory 102, and may further include one or more of a multimedia component 103, an information input/information output (I/O) interface 104, and a communication component 105.
The processor 101 is configured to control the overall operation of the electronic device 100, so as to complete all or part of the steps in the database operation and maintenance method; the memory 102 is used to store various types of data to support operation at the electronic device 100, such data may include, for example, instructions for any application or method operating on the electronic device 100, as well as application-related data. The Memory 102 may be implemented by any type or combination of volatile and non-volatile Memory devices, such as one or more of Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic or optical disk.
The multimedia component 103 may include a screen and an audio component. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 102 or transmitted through the communication component 105. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 104 provides an interface between the processor 101 and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 105 is used for wired or wireless communication between the electronic device 100 and other devices. Wireless Communication, such as Wi-Fi, bluetooth, Near Field Communication (NFC), 2G, 3G, or 4G, or a combination of one or more of them, so that the corresponding Communication component 105 may include: Wi-Fi part, Bluetooth part, NFC part.
The electronic Device 100 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic components, and is configured to perform the database operation and maintenance method according to the above embodiments.
The following describes a computer-readable storage medium provided in an embodiment of the present application, and the computer-readable storage medium described below and the database operation and maintenance method described above may be referred to correspondingly.
The present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the database operation and maintenance method described above.
The computer-readable storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
Finally, it should also be noted that, herein, relationships such as first and second, etc., are intended only to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms include, or any other variation is intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that includes a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The principle and the implementation of the present application are explained herein by applying specific examples, and the above description of the embodiments is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A database operation and maintenance method is characterized by comprising the following steps:
if the non-SQL sentences sent by the target client are detected, the non-SQL sentences are sent to a database so that the database can be connected with the target client conveniently;
and obtaining a legal operation and maintenance SQL statement sent by the target client, and sending the legal operation and maintenance SQL statement to the database so as to carry out operation and maintenance on the database.
2. The database operation and maintenance method according to claim 1, wherein the detecting of the non-SQL statement sent by the target client comprises:
acquiring information sent by the target client;
SQL detection is carried out on the information;
and if the SQL is not detected, determining that the non-SQL statement is detected.
3. The database operation and maintenance method according to claim 2, wherein the SQL detection of the information comprises:
calling an SQL feature library and carrying out SQL feature matching on the information;
and if the SQL data is not matched with any SQL feature, determining that the SQL detection is not passed.
4. The database operation and maintenance method according to claim 1, wherein the obtaining of the legal operation and maintenance SQL statement sent by the target client comprises:
acquiring an SQL statement sent by the target client;
carrying out matching detection on the SQL statement by using a preset matching rule;
and if the SQL statement passes the matching detection, determining the SQL statement as the legal operation and maintenance SQL statement.
5. The database operation and maintenance method according to claim 4, further comprising:
and acquiring an updating instruction, and updating the preset matching rule according to the updating instruction.
6. The database operation and maintenance method according to claim 4, wherein if the match detection is failed, the method comprises:
if the target preset matching rule that the SQL statement does not match is an interception rule, intercepting the SQL statement;
and if the target preset matching rule that the SQL statement is not matched is an approval rule, reporting the SQL statement to approve.
7. The database operation and maintenance method according to claim 6, further comprising:
if the SQL sentences which are reported and approved are detected to pass the approval, the SQL sentences are sent to the database;
and if the SQL sentence which is reported and approved is not approved, intercepting the SQL sentence.
8. A database operation and maintenance device, comprising:
the connection module is used for sending the non-SQL sentences to a database if the non-SQL sentences sent by the target client are detected so as to establish connection between the database and the target client;
and the operation and maintenance module is used for acquiring the legal operation and maintenance SQL sentences sent by the target client and sending the legal operation and maintenance SQL sentences to the database so as to carry out operation and maintenance on the database.
9. An electronic device comprising a memory and a processor, wherein:
the memory is used for storing a computer program;
the processor is configured to execute the computer program to implement the database operation and maintenance method according to any one of claims 1 to 7.
10. A computer-readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the database operation and maintenance method according to any one of claims 1 to 7.
CN202111241333.XA 2021-10-25 2021-10-25 Database operation and maintenance method and device, electronic equipment and readable storage medium Pending CN113886366A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111241333.XA CN113886366A (en) 2021-10-25 2021-10-25 Database operation and maintenance method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111241333.XA CN113886366A (en) 2021-10-25 2021-10-25 Database operation and maintenance method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN113886366A true CN113886366A (en) 2022-01-04

Family

ID=79013927

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111241333.XA Pending CN113886366A (en) 2021-10-25 2021-10-25 Database operation and maintenance method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN113886366A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114756530A (en) * 2022-06-15 2022-07-15 北京安华金和科技有限公司 Client information processing method based on bastion machine

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114756530A (en) * 2022-06-15 2022-07-15 北京安华金和科技有限公司 Client information processing method based on bastion machine
CN114756530B (en) * 2022-06-15 2022-08-19 北京安华金和科技有限公司 Client information processing method based on bastion machine

Similar Documents

Publication Publication Date Title
US8990942B2 (en) Methods and systems for API-level intrusion detection
KR101600295B1 (en) System for detecting abnomal behaviors using personalized the whole access period use behavior pattern analsis
US10002174B2 (en) System and method for maintaining device state coherency
US20160014148A1 (en) Web anomaly detection apparatus and method
KR20170082937A (en) System for detecting abnomal behaviors using personalized the whole access period use behavior second analysis
US10152400B2 (en) Method and system for dynamically unblocking customers in critical workflows by pushing community contributed solutions just-in-time when an error is encountered
CN110955395A (en) Risk assessment method and device for printing system and storage medium
CN110798446B (en) Mail batch authorization method and device, computer equipment and storage medium
WO2021031905A1 (en) Data management method, apparatus, device and system and computer-readable storage medium
CN112653618A (en) Gateway registration method and device of micro-service application API endpoint
KR20130066901A (en) Apparatus and method for analyzing malware in data analysis system
CN110764894A (en) Timed task management method, device, equipment and storage medium
CN111510446B (en) Attack detection method and device, electronic equipment and storage medium
CN113886366A (en) Database operation and maintenance method and device, electronic equipment and readable storage medium
CN112579997B (en) User permission configuration method and device, computer equipment and storage medium
CN116627444A (en) System and method for automatically synchronizing responses and conditions on a device
WO2023241366A1 (en) Data processing method and system, and electronic device and computer-readable storage medium
CN111639086A (en) Data reconciliation method, device, equipment and storage medium
US11818134B1 (en) Validating application programming interface (API) requests to infrastructure systems hosted in a cloud computing environment
CN112565269B (en) Method and device for detecting back door flow of server, electronic equipment and storage medium
CN112351009B (en) Network security protection method and device, electronic equipment and readable storage medium
CN113364725B (en) Illegal detection event detection method, device, equipment and readable storage medium
US11113040B2 (en) Systems and methods for orchestration and automated input handling of interactions received via a user interface
CN105792213A (en) Information security check method, and terminal device
CN113010365A (en) System running state monitoring method, system running state detection device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination