CN115618342B - Method, device, equipment and storage medium for identifying tool name of access database - Google Patents

Method, device, equipment and storage medium for identifying tool name of access database Download PDF

Info

Publication number
CN115618342B
CN115618342B CN202211629981.7A CN202211629981A CN115618342B CN 115618342 B CN115618342 B CN 115618342B CN 202211629981 A CN202211629981 A CN 202211629981A CN 115618342 B CN115618342 B CN 115618342B
Authority
CN
China
Prior art keywords
session
information
database
tool name
accessing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211629981.7A
Other languages
Chinese (zh)
Other versions
CN115618342A (en
Inventor
刘永波
官文兵
陈燕帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ankki Technology Co ltd
Original Assignee
Shenzhen Ankki Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ankki Technology Co ltd filed Critical Shenzhen Ankki Technology Co ltd
Priority to CN202211629981.7A priority Critical patent/CN115618342B/en
Publication of CN115618342A publication Critical patent/CN115618342A/en
Application granted granted Critical
Publication of CN115618342B publication Critical patent/CN115618342B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a method, a device, equipment and a storage medium for identifying a tool name for accessing a database, and belongs to the technical field of database auditing. The identification method for the tool name of the access database comprises the following steps: acquiring session message information for accessing a database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the method and the device, when no tool name information exists in the message, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information and matching the characteristic information with the preset tool name mapping information.

Description

Method, device, equipment and storage medium for identifying tool name of access database
Technical Field
The invention relates to the technical field of database auditing, in particular to a method, a device, equipment and a storage medium for identifying a tool name for accessing a database.
Background
The key to obtain the main body information of the database operation behavior is whether the database audit, the database firewall, the database operation and maintenance gateway and the like can be comprehensively and accurately audited. Common subject information includes database account, source IP, source port, source MAC, access tool name, etc. The strange access tools can be easily found by accessing the tool names, and a safety manager can perform accurate strategy control according to the tool names. However, in the process of using data, the accessed client tools are various, and the access modes make the extraction of tool names difficult.
The existing main way for extracting and accessing the tool name is to send the information such as the tool name to a database server through the relevant information of the user login message. For some database client tools and programs, in the process of initiating connection for authentication, tool name information does not necessarily exist in a communication message, and at this time, an extraction mode is invalid.
Therefore, when the tool name cannot be extracted from the connection database request message, how to obtain the tool name for accessing the database is a problem to be solved at present.
Disclosure of Invention
The application mainly aims to provide a method, a device, equipment and a storage medium for identifying a tool name for accessing a database, and aims to solve the problem of how to obtain the tool name for accessing the database when the tool name cannot be extracted from a request message for connecting the database.
In order to achieve the above object, the present application provides identification of tool names of an access database, where the identification method of tool names of the access database includes the following steps:
acquiring session message information for accessing a database;
extracting session characteristic information from the session message information;
and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
Optionally, the preset tool name mapping information includes a preset tool name mapping table, and the step of matching the extracted session feature information with the preset tool name mapping information to obtain a tool name for accessing the database includes:
matching the SQL features in the session feature information with the preset tool name mapping table;
and if the matching is successful, obtaining the tool name for accessing the database.
Optionally, the step of matching the extracted session feature information with a preset tool name mapping table to obtain a tool name for accessing the database includes:
judging whether the session message information is valid or not according to the session state and the session information in the session characteristic information;
if yes, executing the following steps: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database.
Optionally, the preset tool name mapping information further includes a feature library, and after the step of matching the SQL feature in the session feature information with the preset tool name mapping table, the method further includes:
and if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, matching the binary feature in the session feature information with a preset feature library to obtain the tool name for accessing the database.
Optionally, the step of obtaining the session packet information of the access database includes:
and when the access tool establishes a session with the database, acquiring the session message information of the access database.
Optionally, the step of extracting session feature information from the session packet information includes:
and extracting SQL characteristics, binary characteristics, session state and session information from the session message information.
Optionally, the step of matching the extracted session feature information with preset tool name mapping information to obtain a tool name for accessing the database further includes:
and caching the tool name, the session information and the session state for accessing the database.
The application embodiment further provides an identification device for accessing the database tool name, and the identification device for accessing the database tool name includes:
the acquisition module is used for acquiring the session message information for accessing the database;
the extraction module is used for extracting the session characteristic information from the session message information;
and the matching module is used for matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
The implementation case of the present application further provides a terminal device, where the terminal device includes a memory, a processor, and an identification program for accessing the database tool name, which is stored in the memory and can be run on the processor, and the identification program for accessing the database tool name is executed by the processor to implement the step of the identification method for accessing the database tool name.
The embodiment of the application also provides a storage medium, wherein the storage medium is stored with an identification program for accessing the database tool name, and the identification program for accessing the database tool name is executed by a processor to realize the steps of the identification method for accessing the database tool name.
The application provides a method, a device, equipment and a storage medium for identifying a tool name of an access database. Obtaining the session message information of an access database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the method and the device, when no tool name information exists in the message, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information and matching the characteristic information with the preset tool name mapping information.
Drawings
Fig. 1 is a schematic view of a functional module of a terminal device to which an identification apparatus for accessing a database tool name belongs;
FIG. 2 is a schematic flow chart diagram illustrating a first exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 3 is a flowchart illustrating a second exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 4 is a flowchart illustrating a third exemplary embodiment of a method for identifying tool names for accessing a database according to the present application;
FIG. 5 is a flowchart illustrating a fourth exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 6 is a schematic flow chart diagram illustrating a fifth exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 7 is a flowchart illustrating a sixth exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
FIG. 8 is a flowchart of a seventh exemplary embodiment of a method for identifying names of tools accessing a database according to the present application;
fig. 9 is a flowchart illustrating an eighth exemplary embodiment of the identification method for accessing a database tool name according to the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The main solution of the embodiment of the application is to obtain the session message information of the access database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the scheme, when the message is acquired without tool name information, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information and matching the characteristic information with the preset tool name mapping information.
Specifically, referring to fig. 1, fig. 1 is a schematic diagram of functional modules of a terminal device to which an identification apparatus for a database tool name of the present application belongs. The identification device for the tool name of the database is a device which is based on terminal equipment and can conveniently obtain the tool name for accessing the database by extracting characteristic information to match with preset tool name mapping information when no tool name information is obtained in a message, and the device can be borne on the terminal equipment in a hardware or software mode.
In this embodiment, the terminal device to which the database tool name recognition apparatus belongs at least includes an output module 110, a processor 120, a memory 130, and a communication module 140.
The memory 130 stores an operating system and an identification program of a database tool name, and the identification device of the database tool name can acquire the session message information for accessing the database; extracting session characteristic information from the session message information; matching the extracted session characteristic information with preset tool name mapping information to obtain information such as tool names for accessing the database and storing the information in the memory 130; the output module 110 may be a display screen or the like. The communication module 140 may include a WIFI module, a mobile communication module, a bluetooth module, and the like, and communicates with an external device or a server through the communication module 140.
Wherein the identification program of the database tool name in the memory 130, when executed by the processor, implements the steps of:
acquiring session message information for accessing a database;
extracting session characteristic information from the session message information;
and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
Further, the preset tool name mapping information includes a preset tool name mapping table, and when executed by the processor, the database tool name recognition program in the memory 130 further implements the following steps:
matching the SQL features in the session feature information with the preset tool name mapping table;
and if the matching is successful, obtaining the tool name for accessing the database.
Further, the identification procedure of the database tool name in the memory 130 when executed by the processor further realizes the following steps:
judging whether the session message information is effective or not according to the session state and the session information in the session characteristic information;
if yes, executing the following steps: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
and if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, matching the binary feature in the session feature information with a preset feature library to obtain the tool name for accessing the database.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
and when the access tool establishes a session with the database, acquiring the session message information of the access database.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
and extracting SQL characteristics, binary characteristics, session state and session information from the session message information.
Further, the identification program of the database tool name in the memory 130, when executed by the processor, further implements the steps of:
and caching the tool name, the session information and the session state for accessing the database.
Based on the above terminal device architecture but not limited to the above architecture, embodiments of the method of the present application are provided.
Referring to fig. 2, fig. 2 is a flowchart illustrating a first exemplary embodiment of a method for identifying a tool name of a database. The identification method of the database tool name comprises the following steps:
step S110, obtaining the conversation message information of the access database;
specifically, after the database is connected with the client access tool through a TCP/IP protocol, three-way handshake connection is completed, and the connected message information is acquired at the client or the database or a third terminal independent of the database and the client.
Step S120, extracting session characteristic information from the session message information;
specifically, in step S110, the message of the SQL execution statement sent by the client to the server after the request connection is successful is obtained, and information such as the IP address, the source port, the destination port, the executed SQL statement or the binary feature of the client and the database may be extracted from the message.
And step S130, matching the extracted session characteristic information with preset tool name mapping information to obtain a tool name for accessing the database.
Specifically, the extracted information such as the executed SQL statement or binary feature of the client and the database is matched with the preset tool name mapping information, and which kind of information matching is mainly determined according to the actual situation, there are two tool name mapping information tables, one is through the preset feature library matched with the binary information, and the other is the SQL statement and tool name mapping table.
According to the scheme, the embodiment specifically obtains the session message information of the access database; extracting session characteristic information from the session message information; and matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database. Based on the scheme, the effect of conveniently accessing the tool name of the database is achieved by extracting the characteristic information to be matched with the preset tool name mapping information when no tool name information exists in the message.
Further, referring to fig. 3, fig. 3 is a flowchart illustrating a second exemplary embodiment of the method for identifying a tool name for accessing a database, where the preset tool name mapping information includes a preset tool name mapping table, and the step of matching the extracted session feature information with the preset tool name mapping information to obtain the tool name for accessing the database includes:
step S1301, SQL features in the session feature information are matched with the preset tool name mapping table;
specifically, the SQL features of different client access tools are different, and the corresponding tool name is determined by extracting the features and matching the features with a preset tool name mapping table, where the tool name mapping table stores the mapping between the tool name and the SQL features, and the tool name of the common access database and the mapping between the tool name and the corresponding SQL features.
Step S1302, if the matching is successful, the tool name for accessing the database is obtained.
According to the scheme, the SQL feature in the session feature information is matched with the preset tool name mapping table; and if the matching is successful, obtaining the tool name for accessing the database. Based on the scheme, the effect of conveniently obtaining the tool name for accessing the database when the information without the tool name in the message is obtained is achieved.
Further, referring to fig. 4, fig. 4 is a flowchart illustrating a third exemplary embodiment of the method for identifying a tool name for accessing a database, where the step of matching the extracted session feature information with a preset tool name mapping table to obtain a tool name for accessing the database includes:
step 1300, judging whether the session message information is valid according to the session state and the session information in the session feature information.
Specifically, the session characteristic information includes at least a session state and session information, the session state is a connection state of TCP/IP, it can be ensured that the acquired tool name is valid by judging whether the state is valid, otherwise, the session is invalid, and the acquisition of the tool name is invalid, thereby avoiding resource waste; the session information mainly includes whether the IP addresses and ports of the client tool and the database end are valid or not, and whether the sending and receiving objects of the acquired session information message are correct or not.
In step S1306, if valid, the method performs the steps of: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database.
According to the scheme, whether the session message information is valid is judged specifically according to the session state and the session information in the session feature information; if yes, executing the following steps: and matching the extracted session characteristic information with a preset tool name mapping table to obtain the tool name for accessing the database. Based on the scheme, by judging whether the session state and the session information in the session characteristic information are effective or not, meaningless acquisition of session message information is avoided, and resource waste is avoided.
Further, referring to fig. 5, fig. 5 is a schematic flowchart of a fourth exemplary embodiment of the method for identifying a tool name for accessing a database, where the preset tool name mapping information further includes a feature library, and the step of matching the SQL feature in the session feature information with the preset tool name mapping table further includes:
step S1303, if the matching between the SQL features in the session feature information and the preset tool name mapping table fails, matching the binary features in the session feature information with a preset feature library to obtain the tool name for accessing the database.
Specifically, when the matching of the session feature information and a preset tool name mapping table fails, matching is performed through a binary feature and a preset feature library, the binary feature is a binary system of tool-related information during login, and a mapping relation between the binary feature during login request and a corresponding tool name for accessing a database is stored in the feature library, so that tool name mapping information is determined.
In this embodiment, by using the above scheme, specifically, if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, the binary feature in the session feature information is matched with a preset feature library, so as to obtain the tool name for accessing the database. Based on the scheme, the binary characteristics which are extracted from the message during login and are related to the request tool are matched with the characteristic library, so that the effect of conveniently obtaining the tool name for accessing the database is achieved.
Further, referring to fig. 6, fig. 6 is a flowchart illustrating a fifth exemplary embodiment of the method for identifying the tool name of the access database, where the step of obtaining the session message information of the access database includes:
step S1101, when the access tool establishes a session with the database, acquiring session message information of the access database.
Specifically, by obtaining the session message information when the access tool establishes a session with the database, binary information related to the access tool, IP addresses and ports of the access tool and the database, and SQL characteristic information can be extracted.
By the above scheme, in the embodiment, specifically, when the access tool establishes a session with the database, the session message information for accessing the database is acquired. Based on the scheme, the session message information when the access tool establishes the session with the database is obtained, the relevant information about the login of the access tool can be obtained, and the purpose of obtaining more information about the access tool from the session message is achieved.
Further, referring to fig. 7, fig. 7 is a flowchart illustrating a sixth exemplary embodiment of the identification method for accessing a database tool name, where the step of extracting the session feature information from the session message information includes:
step S1201, extracting SQL characteristics, binary characteristics, session state, and session information from the session packet information.
Specifically, the SQL characteristics of different client access tools are different, the session state is the TCP/IP connection state, it can be ensured that the obtained tool name is valid by determining whether the state is valid, the session information mainly includes the IP addresses and ports of the client tool and the database, and the binary characteristic is the binary information carried when logging in by using the access database tool.
In this embodiment, by using the above scheme, the SQL feature, the session state, and the session information are specifically extracted from the session message information. Data support is provided for judging whether the session message information is effective and matching tool name mapping information subsequently through the acquired information.
Further, referring to fig. 8, fig. 8 is a flowchart illustrating a seventh exemplary embodiment of the method for identifying a tool name for accessing a database, where the step of matching the extracted session feature information with preset tool name mapping information to obtain a tool name for accessing the database further includes:
step S1305, caching the tool name, the session information, and the session state for accessing the database.
According to the scheme, the tool name of the session message information sending tool can be quickly identified by caching the tool name, the session information and the session state of the access database.
Further, referring to fig. 9, fig. 9 is a schematic flowchart of an eighth exemplary embodiment of a method for identifying a tool name of an access database, where the specific steps of the flowchart are as follows:
first, a session connection between the access tool and the database is established, starting as shown in fig. 9.
After three-way handshake with a database server, SQL and characteristics are extracted, namely session message information is obtained, and binary characteristic information including but not limited to SQL characteristics and tool login, session information, session state and the like are extracted;
matching the extracted information with session information, a tool name mapping table, an intermediate state and the like in sequence, and judging whether the information is consistent with the session information, the tool name mapping table, the intermediate state and the like;
if the matching is successful, the tool name of the current visit is obtained;
if the matching fails, matching the binary characteristic with the characteristic library, and recording the intermediate state to obtain the tool name of the current visit;
and caching the binding information of the session information and the tool name.
In addition, an embodiment of the present application further provides an identification apparatus for accessing a database tool name, where the identification apparatus for accessing a database tool name includes:
the acquisition module is used for acquiring the session message information for accessing the database;
the extraction module is used for extracting session characteristic information from the session message information;
and the matching module is used for matching the extracted session characteristic information with preset tool name mapping information to obtain the tool name for accessing the database.
In addition, the embodiment of the present application further provides a terminal device, where the terminal device includes a memory, a processor, and an identification program of an access database tool name that is stored in the memory and is executable on the processor, and the identification program of the access database tool name implements the step of the identification method of the access database tool name when executed by the processor.
Since the identification program for accessing the database tool name is executed by the processor, all technical solutions of all the foregoing embodiments are adopted, so that at least all the beneficial effects brought by all the technical solutions of all the foregoing embodiments are achieved, and no further description is given here.
In addition, an embodiment of the present application further provides a readable storage medium, where the storage medium stores an identification program of an access database tool name, and the identification program of the access database tool name, when executed by a processor, implements the steps of the identification method of the access database tool name.
Since the identification program for accessing the database tool name is executed by the processor, all technical solutions of all the foregoing embodiments are adopted, so that at least all the beneficial effects brought by all the technical solutions of all the foregoing embodiments are achieved, and no further description is given here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application or portions contributing to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (such as a ROM/RAM, a magnetic disk, and an optical disk) as above, and includes several instructions to enable a terminal device (which may be a mobile phone, a computer, a server, a controlled terminal, or a network device) to execute the method of each embodiment of the present application.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (4)

1. An identification method for accessing a database tool name is characterized by comprising the following steps:
when the access tool establishes a session with the database, acquiring session message information of the access database;
extracting session characteristic information from the session message information, wherein the session characteristic information comprises SQL characteristics, binary characteristics, session states and session information;
judging whether the session message information is effective or not according to the session state and the session information in the session characteristic information;
if the session feature information is valid, matching the SQL feature in the session feature information with a preset tool name mapping table;
if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, matching the binary feature in the session feature information with a preset feature library to obtain a tool name for accessing the database;
if the matching is successful, obtaining the tool name for accessing the database;
and caching the tool name, the session information and the session state for accessing the database.
2. An apparatus for identifying a name of an access database tool, the apparatus comprising:
the acquisition module is used for acquiring the session message information of the access database when the access tool establishes a session with the database;
the extraction module is used for extracting session characteristic information from the session message information, wherein the session characteristic information comprises SQL (structured query language) characteristics, binary characteristics, a session state and session information;
the judging module is used for judging whether the session message information is effective or not according to the session state and the session information in the session characteristic information;
the matching module is used for matching the SQL characteristics in the session characteristic information with a preset tool name mapping table if the SQL characteristics are effective; if the SQL feature in the session feature information fails to be matched with the preset tool name mapping table, matching the binary feature in the session feature information with a preset feature library to obtain a tool name for accessing the database; if the matching is successful, obtaining a tool name for accessing the database;
and the cache module is used for caching the tool name for accessing the database, the session information and the session state.
3. A terminal device, characterized in that the terminal device comprises a memory, a processor and an identification program of an access database tool name stored on the memory and operable on the processor, the identification program of the access database tool name realizing the steps of the identification method of the access database tool name according to any one of claim 1 when executed by the processor.
4. A storage medium having stored thereon an identification program of an access database tool name, the identification program of the access database tool name realizing the steps of the identification method of the access database tool name according to any one of claim 1 when executed by a processor.
CN202211629981.7A 2022-12-19 2022-12-19 Method, device, equipment and storage medium for identifying tool name of access database Active CN115618342B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211629981.7A CN115618342B (en) 2022-12-19 2022-12-19 Method, device, equipment and storage medium for identifying tool name of access database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211629981.7A CN115618342B (en) 2022-12-19 2022-12-19 Method, device, equipment and storage medium for identifying tool name of access database

Publications (2)

Publication Number Publication Date
CN115618342A CN115618342A (en) 2023-01-17
CN115618342B true CN115618342B (en) 2023-03-28

Family

ID=84879687

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211629981.7A Active CN115618342B (en) 2022-12-19 2022-12-19 Method, device, equipment and storage medium for identifying tool name of access database

Country Status (1)

Country Link
CN (1) CN115618342B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008077285A (en) * 2006-09-20 2008-04-03 Hitachi Information Systems Ltd Sql management system and sql management method and program
JP2009211588A (en) * 2008-03-06 2009-09-17 Nec Corp Analysis information sampling device of database access delay, analysis information sampling method, and program
GB0914797D0 (en) * 2008-10-06 2009-09-30 Ibm Method and system for identifying applications in a database system
CN103902565A (en) * 2012-12-26 2014-07-02 阿里巴巴集团控股有限公司 Method and device for determining data access relation
CN108573156A (en) * 2018-04-25 2018-09-25 杭州闪捷信息科技股份有限公司 A method of the database risk detection based on SQL sequences
CN110413638A (en) * 2019-08-27 2019-11-05 中信百信银行股份有限公司 A kind of SQL detection device and method

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8555288B2 (en) * 2006-05-17 2013-10-08 Teradata Us, Inc. Managing database utilities to improve throughput and concurrency
CN101505276B (en) * 2009-03-23 2011-06-01 杭州华三通信技术有限公司 Network application flow recognition method and apparatus and network application flow management apparatus
US9582500B2 (en) * 2013-03-15 2017-02-28 Oracle International Corporation Run-time SQL language translation
CN104660636B (en) * 2013-11-20 2018-06-26 华为技术有限公司 Point-to-point application identifying processing method and apparatus
CN104184723B (en) * 2014-07-28 2018-05-29 华为技术有限公司 A kind of method for identifying application program, device and the network equipment
GB201517732D0 (en) * 2015-10-07 2015-11-18 Ibm Processing sql statement in alternating modes
CN106970939B (en) * 2017-02-14 2019-09-03 深圳昂楷科技有限公司 A kind of database audit method and its system
CN107590259A (en) * 2017-09-21 2018-01-16 浪潮软件股份有限公司 The dissemination method and device of a kind of data, services
CN111182072A (en) * 2019-12-31 2020-05-19 奇安信科技集团股份有限公司 Application identification method and device of session request and computer equipment
CN113420007B (en) * 2021-03-31 2023-09-26 阿里巴巴新加坡控股有限公司 Audit processing method and device for database access and electronic equipment
CN115481106A (en) * 2022-09-13 2022-12-16 北京天融信网络安全技术有限公司 MongoDB database-based analysis method, device, equipment and medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008077285A (en) * 2006-09-20 2008-04-03 Hitachi Information Systems Ltd Sql management system and sql management method and program
JP2009211588A (en) * 2008-03-06 2009-09-17 Nec Corp Analysis information sampling device of database access delay, analysis information sampling method, and program
GB0914797D0 (en) * 2008-10-06 2009-09-30 Ibm Method and system for identifying applications in a database system
CN103902565A (en) * 2012-12-26 2014-07-02 阿里巴巴集团控股有限公司 Method and device for determining data access relation
CN108573156A (en) * 2018-04-25 2018-09-25 杭州闪捷信息科技股份有限公司 A method of the database risk detection based on SQL sequences
CN110413638A (en) * 2019-08-27 2019-11-05 中信百信银行股份有限公司 A kind of SQL detection device and method

Also Published As

Publication number Publication date
CN115618342A (en) 2023-01-17

Similar Documents

Publication Publication Date Title
TWI478564B (en) Method, computer-readable storage medium, and apparatus for secure resource name resolution
TWI475863B (en) Secure resource name resolution using a cache
US8965958B2 (en) File fetch from a remote client device
US10743183B2 (en) Method and device for realizing wireless access point connection authentication
CN110808897A (en) Proxy access method, user equipment, storage medium, device and system
CN101383746A (en) Access control method and system for wireless network
CN111049844B (en) Internet access behavior management method, device, equipment and storage medium based on Socks agents
CN110795174A (en) Application program interface calling method, device, equipment and readable storage medium
CN104702575A (en) Account management method, management platform and account management system
CN114338597B (en) Network access method and device
CN106856575B (en) Automatic configuration method of IPTV terminal, server and IPTV system
CN115618342B (en) Method, device, equipment and storage medium for identifying tool name of access database
CN113709187A (en) Multi-server data request method, device, equipment and storage medium
CN107592299B (en) Proxy internet access identification method, computer device and computer readable storage medium
CN113626789A (en) User operation request processing method and device and electronic equipment
US7386617B2 (en) Method, system and program product for managing multiple network application versions
CN116546062A (en) Cloud mobile phone control method and device, cloud server and storage medium
CN107018140B (en) Authority control method and system
JP2002520722A (en) Chip card organization system for use as a server in an Internet-type network
CN114006724B (en) Method and system for discovering and authenticating encryption DNS resolver
CN115695400A (en) Method and terminal for interaction between Web page and local application
JP2007226343A (en) Presence system, presence presentation method, and program
CN113645079A (en) Internet of things terminal networking method, device, equipment and storage medium
CN110855782B (en) Service calling system, method, electronic equipment and readable storage medium
CN108768987B (en) Data interaction method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant