CN115618342B - Method, device, equipment and storage medium for identifying tool name of access database - Google Patents
Method, device, equipment and storage medium for identifying tool name of access database Download PDFInfo
- Publication number
- CN115618342B CN115618342B CN202211629981.7A CN202211629981A CN115618342B CN 115618342 B CN115618342 B CN 115618342B CN 202211629981 A CN202211629981 A CN 202211629981A CN 115618342 B CN115618342 B CN 115618342B
- Authority
- CN
- China
- Prior art keywords
- session
- information
- database
- tool name
- accessing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000013507 mapping Methods 0.000 claims abstract description 60
- 238000000605 extraction Methods 0.000 claims description 5
- 230000000694 effects Effects 0.000 abstract description 6
- 238000004891 communication Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 239000002699 waste material Substances 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a method, a device, equipment and a storage medium for identifying a tool name for accessing a database, and belongs to the technical field of database auditing. The identification method for the tool name of the access database comprises the following steps: acquiring session message information for accessing a database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the method and the device, when no tool name information exists in the message, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information and matching the characteristic information with the preset tool name mapping information.
Description
Technical Field
The invention relates to the technical field of database auditing, in particular to a method, a device, equipment and a storage medium for identifying a tool name for accessing a database.
Background
The key to obtain the main body information of the database operation behavior is whether the database audit, the database firewall, the database operation and maintenance gateway and the like can be comprehensively and accurately audited. Common subject information includes database account, source IP, source port, source MAC, access tool name, etc. The strange access tools can be easily found by accessing the tool names, and a safety manager can perform accurate strategy control according to the tool names. However, in the process of using data, the accessed client tools are various, and the access modes make the extraction of tool names difficult.
The existing main way for extracting and accessing the tool name is to send the information such as the tool name to a database server through the relevant information of the user login message. For some database client tools and programs, in the process of initiating connection for authentication, tool name information does not necessarily exist in a communication message, and at this time, an extraction mode is invalid.
Therefore, when the tool name cannot be extracted from the connection database request message, how to obtain the tool name for accessing the database is a problem to be solved at present.
Disclosure of Invention
The application mainly aims to provide a method, a device, equipment and a storage medium for identifying a tool name for accessing a database, and aims to solve the problem of how to obtain the tool name for accessing the database when the tool name cannot be extracted from a request message for connecting the database.
In order to achieve the above object, the present application provides identification of tool names of an access database, where the identification method of tool names of the access database includes the following steps:
acquiring session message information for accessing a database;
extracting session characteristic information from the session message information;
and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
Optionally, the preset tool name mapping information includes a preset tool name mapping table, and the step of matching the extracted session feature information with the preset tool name mapping information to obtain a tool name for accessing the database includes:
matching the SQL features in the session feature information with the preset tool name mapping table;
and if the matching is successful, obtaining the tool name for accessing the database.
Optionally, the step of matching the extracted session feature information with a preset tool name mapping table to obtain a tool name for accessing the database includes:
judging whether the session message information is valid or not according to the session state and the session information in the session characteristic information;
if yes, executing the following steps: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database.
Optionally, the preset tool name mapping information further includes a feature library, and after the step of matching the SQL feature in the session feature information with the preset tool name mapping table, the method further includes:
and if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, matching the binary feature in the session feature information with a preset feature library to obtain the tool name for accessing the database.
Optionally, the step of obtaining the session packet information of the access database includes:
and when the access tool establishes a session with the database, acquiring the session message information of the access database.
Optionally, the step of extracting session feature information from the session packet information includes:
and extracting SQL characteristics, binary characteristics, session state and session information from the session message information.
Optionally, the step of matching the extracted session feature information with preset tool name mapping information to obtain a tool name for accessing the database further includes:
and caching the tool name, the session information and the session state for accessing the database.
The application embodiment further provides an identification device for accessing the database tool name, and the identification device for accessing the database tool name includes:
the acquisition module is used for acquiring the session message information for accessing the database;
the extraction module is used for extracting the session characteristic information from the session message information;
and the matching module is used for matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
The implementation case of the present application further provides a terminal device, where the terminal device includes a memory, a processor, and an identification program for accessing the database tool name, which is stored in the memory and can be run on the processor, and the identification program for accessing the database tool name is executed by the processor to implement the step of the identification method for accessing the database tool name.
The embodiment of the application also provides a storage medium, wherein the storage medium is stored with an identification program for accessing the database tool name, and the identification program for accessing the database tool name is executed by a processor to realize the steps of the identification method for accessing the database tool name.
The application provides a method, a device, equipment and a storage medium for identifying a tool name of an access database. Obtaining the session message information of an access database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the method and the device, when no tool name information exists in the message, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information and matching the characteristic information with the preset tool name mapping information.
Drawings
Fig. 1 is a schematic view of a functional module of a terminal device to which an identification apparatus for accessing a database tool name belongs;
FIG. 2 is a schematic flow chart diagram illustrating a first exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 3 is a flowchart illustrating a second exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 4 is a flowchart illustrating a third exemplary embodiment of a method for identifying tool names for accessing a database according to the present application;
FIG. 5 is a flowchart illustrating a fourth exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 6 is a schematic flow chart diagram illustrating a fifth exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 7 is a flowchart illustrating a sixth exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 8 is a flowchart of a seventh exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
fig. 9 is a flowchart illustrating an eighth exemplary embodiment of the identification method for accessing a database tool name according to the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The main solution of the embodiment of the application is to obtain the session message information of the access database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the scheme, when the message is acquired without tool name information, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information and matching the characteristic information with the preset tool name mapping information.
Specifically, referring to fig. 1, fig. 1 is a schematic diagram of functional modules of a terminal device to which an identification apparatus for a database tool name of the present application belongs. The identification device for the tool name of the database is a device which is based on terminal equipment and can conveniently obtain the tool name for accessing the database by extracting characteristic information to match with preset tool name mapping information when no tool name information is obtained in a message, and the device can be borne on the terminal equipment in a hardware or software mode.
In this embodiment, the terminal device to which the database tool name recognition apparatus belongs at least includes an output module 110, a processor 120, a memory 130, and a communication module 140.
The memory 130 stores an operating system and an identification program of a database tool name, and the identification device of the database tool name can acquire the session message information for accessing the database; extracting session characteristic information from the session message information; matching the extracted session characteristic information with preset tool name mapping information to obtain information such as tool names for accessing the database and storing the information in the memory 130; the output module 110 may be a display screen or the like. The communication module 140 may include a WIFI module, a mobile communication module, a bluetooth module, and the like, and communicates with an external device or a server through the communication module 140.
Wherein the identification program of the database tool name in the memory 130, when executed by the processor, implements the steps of:
acquiring session message information for accessing a database;
extracting session characteristic information from the session message information;
and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
Further, the preset tool name mapping information includes a preset tool name mapping table, and when executed by the processor, the database tool name recognition program in the memory 130 further implements the following steps:
matching the SQL features in the session feature information with the preset tool name mapping table;
and if the matching is successful, obtaining the tool name for accessing the database.
Further, the identification procedure of the database tool name in the memory 130 when executed by the processor further realizes the following steps:
judging whether the session message information is effective or not according to the session state and the session information in the session characteristic information;
if yes, executing the following steps: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
and if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, matching the binary feature in the session feature information with a preset feature library to obtain the tool name for accessing the database.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
and when the access tool establishes a session with the database, acquiring the session message information of the access database.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
and extracting SQL characteristics, binary characteristics, session state and session information from the session message information.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
and caching the tool name, the session information and the session state for accessing the database.
Based on the above terminal device architecture but not limited to the above architecture, embodiments of the method of the present application are provided.
Referring to fig. 2, fig. 2 is a flowchart illustrating a first exemplary embodiment of a method for identifying a tool name of a database. The identification method of the database tool name comprises the following steps:
step S110, obtaining the conversation message information of the access database;
specifically, after the database is connected with the client access tool through a TCP/IP protocol, three-way handshake connection is completed, and the connected message information is acquired at the client or the database or a third terminal independent of the database and the client.
Step S120, extracting session characteristic information from the session message information;
specifically, in step S110, the message of the SQL execution statement sent by the client to the server after the request connection is successful is obtained, and information such as the IP address, the source port, the destination port, the executed SQL statement or the binary feature of the client and the database may be extracted from the message.
And step S130, matching the extracted session characteristic information with preset tool name mapping information to obtain a tool name for accessing the database.
Specifically, the extracted information such as the executed SQL statement or binary feature of the client and the database is matched with the preset tool name mapping information, and which kind of information matching is mainly determined according to the actual situation, there are two tool name mapping information tables, one is through the preset feature library matched with the binary information, and the other is the SQL statement and tool name mapping table.
According to the scheme, the embodiment specifically obtains the session message information of the access database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the scheme, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information to be matched with the preset tool name mapping information when no tool name information exists in the message.
Further, referring to fig. 3, fig. 3 is a flowchart illustrating a second exemplary embodiment of the method for identifying a tool name for accessing a database, where the preset tool name mapping information includes a preset tool name mapping table, and the step of matching the extracted session feature information with the preset tool name mapping information to obtain the tool name for accessing the database includes:
step S1301, SQL features in the session feature information are matched with the preset tool name mapping table;
specifically, the SQL features of different client access tools are different, and the corresponding tool name is determined by extracting the features and matching the features with a preset tool name mapping table, where the tool name mapping table stores the mapping between the tool name and the SQL features, and the tool name of the common access database and the mapping between the tool name and the corresponding SQL features.
Step S1302, if the matching is successful, the tool name for accessing the database is obtained.
According to the scheme, the SQL feature in the session feature information is matched with the preset tool name mapping table; and if the matching is successful, obtaining the tool name for accessing the database. Based on the scheme, the effect of conveniently obtaining the tool name for accessing the database when the information without the tool name in the message is obtained is achieved.
Further, referring to fig. 4, fig. 4 is a flowchart illustrating a third exemplary embodiment of the method for identifying a tool name for accessing a database, where the step of matching the extracted session feature information with a preset tool name mapping table to obtain a tool name for accessing the database includes:
step 1300, judging whether the session message information is valid according to the session state and the session information in the session feature information.
Specifically, the session characteristic information includes at least a session state and session information, the session state is a connection state of TCP/IP, it can be ensured that the acquired tool name is valid by judging whether the state is valid, otherwise, the session is invalid, and the acquisition of the tool name is invalid, thereby avoiding resource waste; the session information mainly includes whether the IP addresses and ports of the client tool and the database end are valid or not, and whether the sending and receiving objects of the acquired session information message are correct or not.
In step S1306, if valid, the method performs the steps of: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database.
According to the scheme, whether the session message information is valid is judged specifically according to the session state and the session information in the session feature information; if yes, executing the following steps: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database. Based on the scheme, by judging whether the session state and the session information in the session characteristic information are effective or not, meaningless acquisition of session message information is avoided, and resource waste is avoided.
Further, referring to fig. 5, fig. 5 is a schematic flowchart of a fourth exemplary embodiment of the method for identifying a tool name for accessing a database, where the preset tool name mapping information further includes a feature library, and the step of matching the SQL feature in the session feature information with the preset tool name mapping table further includes:
step S1303, if the matching between the SQL features in the session feature information and the preset tool name mapping table fails, matching the binary features in the session feature information with a preset feature library to obtain the tool name for accessing the database.
Specifically, when the matching of the session feature information and a preset tool name mapping table fails, matching is performed through a binary feature and a preset feature library, the binary feature is a binary system of tool-related information during login, and a mapping relation between the binary feature during login request and a corresponding tool name for accessing a database is stored in the feature library, so that tool name mapping information is determined.
In this embodiment, by using the above scheme, specifically, if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, the binary feature in the session feature information is matched with a preset feature library, so as to obtain the tool name for accessing the database. Based on the scheme, the binary characteristics which are extracted from the message during login and are related to the request tool are matched with the characteristic library, so that the effect of conveniently obtaining the tool name for accessing the database is achieved.
Further, referring to fig. 6, fig. 6 is a flowchart illustrating a fifth exemplary embodiment of the method for identifying the tool name of the access database, where the step of obtaining the session message information of the access database includes:
step S1101, when the access tool establishes a session with the database, acquiring session message information of the access database.
Specifically, by obtaining the session message information when the access tool establishes a session with the database, binary information related to the access tool, IP addresses and ports of the access tool and the database, and SQL characteristic information can be extracted.
By the above scheme, in the embodiment, specifically, when the access tool establishes a session with the database, the session message information for accessing the database is acquired. Based on the scheme, the session message information when the access tool establishes the session with the database is obtained, the relevant information about the login of the access tool can be obtained, and the purpose of obtaining more information about the access tool from the session message is achieved.
Further, referring to fig. 7, fig. 7 is a flowchart illustrating a sixth exemplary embodiment of the identification method for accessing a database tool name, where the step of extracting the session feature information from the session message information includes:
step S1201, extracting SQL characteristics, binary characteristics, session state, and session information from the session packet information.
Specifically, the SQL characteristics of different client access tools are different, the session state is the TCP/IP connection state, it can be ensured that the obtained tool name is valid by determining whether the state is valid, the session information mainly includes the IP addresses and ports of the client tool and the database, and the binary characteristic is the binary information carried when logging in by using the access database tool.
In this embodiment, by using the above scheme, the SQL feature, the session state, and the session information are specifically extracted from the session message information. Data support is provided for judging whether the session message information is effective and matching tool name mapping information subsequently through the acquired information.
Further, referring to fig. 8, fig. 8 is a flowchart illustrating a seventh exemplary embodiment of the method for identifying a tool name for accessing a database, where the step of matching the extracted session feature information with preset tool name mapping information to obtain a tool name for accessing the database further includes:
step S1305, caching the tool name, the session information, and the session state for accessing the database.
According to the scheme, the tool name of the session message information sending tool can be quickly identified by caching the tool name, the session information and the session state of the access database.
Further, referring to fig. 9, fig. 9 is a schematic flowchart of an eighth exemplary embodiment of a method for identifying a tool name of an access database, where the specific steps of the flowchart are as follows:
first, a session connection between the access tool and the database is established, starting as shown in fig. 9.
After three-way handshake with a database server, SQL and characteristics are extracted, namely session message information is obtained, and binary characteristic information including but not limited to SQL characteristics and tool login, session information, session state and the like are extracted;
matching the extracted information with session information, a tool name mapping table, an intermediate state and the like in sequence, and judging whether the information is consistent with the session information, the tool name mapping table, the intermediate state and the like;
if the matching is successful, the tool name of the current visit is obtained;
if the matching fails, matching the binary characteristic with the characteristic library, and recording the intermediate state to obtain the tool name of the current visit;
and caching the binding information of the session information and the tool name.
In addition, an embodiment of the present application further provides an identification apparatus for accessing a database tool name, where the identification apparatus for accessing a database tool name includes:
the acquisition module is used for acquiring the session message information for accessing the database;
the extraction module is used for extracting session characteristic information from the session message information;
and the matching module is used for matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
In addition, the embodiment of the present application further provides a terminal device, where the terminal device includes a memory, a processor, and an identification program of an access database tool name that is stored in the memory and is executable on the processor, and the identification program of the access database tool name implements the step of the identification method of the access database tool name when executed by the processor.
Since the identification program for accessing the database tool name is executed by the processor, all technical solutions of all the foregoing embodiments are adopted, so that at least all the beneficial effects brought by all the technical solutions of all the foregoing embodiments are achieved, and no further description is given here.
In addition, an embodiment of the present application further provides a readable storage medium, where the storage medium stores an identification program of an access database tool name, and the identification program of the access database tool name, when executed by a processor, implements the steps of the identification method of the access database tool name.
Since the identification program for accessing the database tool name is executed by the processor, all technical solutions of all the foregoing embodiments are adopted, so that at least all the beneficial effects brought by all the technical solutions of all the foregoing embodiments are achieved, and no further description is given here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application or portions contributing to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (such as a ROM/RAM, a magnetic disk, and an optical disk) as above, and includes several instructions to enable a terminal device (which may be a mobile phone, a computer, a server, a controlled terminal, or a network device) to execute the method of each embodiment of the present application.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.
Claims (4)
1. An identification method for accessing a database tool name is characterized by comprising the following steps:
when the access tool establishes a session with the database, acquiring session message information of the access database;
extracting session characteristic information from the session message information, wherein the session characteristic information comprises SQL characteristics, binary characteristics, session states and session information;
judging whether the session message information is effective or not according to the session state and the session information in the session characteristic information;
if the session feature information is valid, matching the SQL feature in the session feature information with a preset tool name mapping table;
if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, matching the binary feature in the session feature information with a preset feature library to obtain a tool name for accessing the database;
if the matching is successful, obtaining the tool name for accessing the database;
and caching the tool name, the session information and the session state for accessing the database.
2. An apparatus for identifying a name of an access database tool, the apparatus comprising:
the acquisition module is used for acquiring the session message information of the access database when the access tool establishes a session with the database;
the extraction module is used for extracting session characteristic information from the session message information, wherein the session characteristic information comprises SQL (structured query language) characteristics, binary characteristics, a session state and session information;
the judging module is used for judging whether the session message information is effective or not according to the session state and the session information in the session characteristic information;
the matching module is used for matching the SQL characteristics in the session characteristic information with a preset tool name mapping table if the SQL characteristics are effective; if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, matching the binary feature in the session feature information with a preset feature library to obtain a tool name for accessing the database; if the matching is successful, obtaining a tool name for accessing the database;
and the cache module is used for caching the tool name for accessing the database, the session information and the session state.
3. A terminal device, characterized in that the terminal device comprises a memory, a processor and an identification program of an access database tool name stored on the memory and operable on the processor, the identification program of the access database tool name realizing the steps of the identification method of the access database tool name according to any one of claim 1 when executed by the processor.
4. A storage medium having stored thereon an identification program of an access database tool name, the identification program of the access database tool name realizing the steps of the identification method of the access database tool name according to any one of claim 1 when executed by a processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211629981.7A CN115618342B (en) | 2022-12-19 | 2022-12-19 | Method, device, equipment and storage medium for identifying tool name of access database |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211629981.7A CN115618342B (en) | 2022-12-19 | 2022-12-19 | Method, device, equipment and storage medium for identifying tool name of access database |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115618342A CN115618342A (en) | 2023-01-17 |
CN115618342B true CN115618342B (en) | 2023-03-28 |
Family
ID=84879687
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211629981.7A Active CN115618342B (en) | 2022-12-19 | 2022-12-19 | Method, device, equipment and storage medium for identifying tool name of access database |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115618342B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008077285A (en) * | 2006-09-20 | 2008-04-03 | Hitachi Information Systems Ltd | Sql management system and sql management method and program |
JP2009211588A (en) * | 2008-03-06 | 2009-09-17 | Nec Corp | Analysis information sampling device of database access delay, analysis information sampling method, and program |
GB0914797D0 (en) * | 2008-10-06 | 2009-09-30 | Ibm | Method and system for identifying applications in a database system |
CN103902565A (en) * | 2012-12-26 | 2014-07-02 | 阿里巴巴集团控股有限公司 | Method and device for determining data access relation |
CN108573156A (en) * | 2018-04-25 | 2018-09-25 | 杭州闪捷信息科技股份有限公司 | A method of the database risk detection based on SQL sequences |
CN110413638A (en) * | 2019-08-27 | 2019-11-05 | 中信百信银行股份有限公司 | A kind of SQL detection device and method |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8555288B2 (en) * | 2006-05-17 | 2013-10-08 | Teradata Us, Inc. | Managing database utilities to improve throughput and concurrency |
CN101505276B (en) * | 2009-03-23 | 2011-06-01 | 杭州华三通信技术有限公司 | Network application flow recognition method and apparatus and network application flow management apparatus |
US9582500B2 (en) * | 2013-03-15 | 2017-02-28 | Oracle International Corporation | Run-time SQL language translation |
CN104660636B (en) * | 2013-11-20 | 2018-06-26 | 华为技术有限公司 | Point-to-point application identifying processing method and apparatus |
CN104184723B (en) * | 2014-07-28 | 2018-05-29 | 华为技术有限公司 | A kind of method for identifying application program, device and the network equipment |
GB201517732D0 (en) * | 2015-10-07 | 2015-11-18 | Ibm | Processing sql statement in alternating modes |
CN106970939B (en) * | 2017-02-14 | 2019-09-03 | 深圳昂楷科技有限公司 | A kind of database audit method and its system |
CN107590259A (en) * | 2017-09-21 | 2018-01-16 | 浪潮软件股份有限公司 | The dissemination method and device of a kind of data, services |
CN111182072A (en) * | 2019-12-31 | 2020-05-19 | 奇安信科技集团股份有限公司 | Application identification method and device of session request and computer equipment |
CN113420007B (en) * | 2021-03-31 | 2023-09-26 | 阿里巴巴新加坡控股有限公司 | Audit processing method and device for database access and electronic equipment |
CN115481106A (en) * | 2022-09-13 | 2022-12-16 | 北京天融信网络安全技术有限公司 | MongoDB database-based analysis method, device, equipment and medium |
-
2022
- 2022-12-19 CN CN202211629981.7A patent/CN115618342B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008077285A (en) * | 2006-09-20 | 2008-04-03 | Hitachi Information Systems Ltd | Sql management system and sql management method and program |
JP2009211588A (en) * | 2008-03-06 | 2009-09-17 | Nec Corp | Analysis information sampling device of database access delay, analysis information sampling method, and program |
GB0914797D0 (en) * | 2008-10-06 | 2009-09-30 | Ibm | Method and system for identifying applications in a database system |
CN103902565A (en) * | 2012-12-26 | 2014-07-02 | 阿里巴巴集团控股有限公司 | Method and device for determining data access relation |
CN108573156A (en) * | 2018-04-25 | 2018-09-25 | 杭州闪捷信息科技股份有限公司 | A method of the database risk detection based on SQL sequences |
CN110413638A (en) * | 2019-08-27 | 2019-11-05 | 中信百信银行股份有限公司 | A kind of SQL detection device and method |
Also Published As
Publication number | Publication date |
---|---|
CN115618342A (en) | 2023-01-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI478564B (en) | Method, computer-readable storage medium, and apparatus for secure resource name resolution | |
TWI475863B (en) | Secure resource name resolution using a cache | |
US8965958B2 (en) | File fetch from a remote client device | |
US10743183B2 (en) | Method and device for realizing wireless access point connection authentication | |
CN110808897A (en) | Proxy access method, user equipment, storage medium, device and system | |
CN101383746A (en) | Access control method and system for wireless network | |
CN111049844B (en) | Internet access behavior management method, device, equipment and storage medium based on Socks agents | |
CN110795174A (en) | Application program interface calling method, device, equipment and readable storage medium | |
CN104702575A (en) | Account management method, management platform and account management system | |
CN114338597B (en) | Network access method and device | |
CN106856575B (en) | Automatic configuration method of IPTV terminal, server and IPTV system | |
CN115618342B (en) | Method, device, equipment and storage medium for identifying tool name of access database | |
CN113709187A (en) | Multi-server data request method, device, equipment and storage medium | |
CN107592299B (en) | Proxy internet access identification method, computer device and computer readable storage medium | |
CN113626789A (en) | User operation request processing method and device and electronic equipment | |
US7386617B2 (en) | Method, system and program product for managing multiple network application versions | |
CN116546062A (en) | Cloud mobile phone control method and device, cloud server and storage medium | |
CN107018140B (en) | Authority control method and system | |
JP2002520722A (en) | Chip card organization system for use as a server in an Internet-type network | |
CN114006724B (en) | Method and system for discovering and authenticating encryption DNS resolver | |
CN115695400A (en) | Method and terminal for interaction between Web page and local application | |
JP2007226343A (en) | Presence system, presence presentation method, and program | |
CN113645079A (en) | Internet of things terminal networking method, device, equipment and storage medium | |
CN110855782B (en) | Service calling system, method, electronic equipment and readable storage medium | |
CN108768987B (en) | Data interaction method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |