CN116089390A - Database security audit method - Google Patents

Database security audit method Download PDF

Info

Publication number
CN116089390A
CN116089390A CN202310068565.2A CN202310068565A CN116089390A CN 116089390 A CN116089390 A CN 116089390A CN 202310068565 A CN202310068565 A CN 202310068565A CN 116089390 A CN116089390 A CN 116089390A
Authority
CN
China
Prior art keywords
database
audit
information
audited
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202310068565.2A
Other languages
Chinese (zh)
Inventor
廉明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changshi Shuan Technology Co ltd
Original Assignee
Changshi Shuan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changshi Shuan Technology Co ltd filed Critical Changshi Shuan Technology Co ltd
Priority to CN202310068565.2A priority Critical patent/CN116089390A/en
Publication of CN116089390A publication Critical patent/CN116089390A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/211Schema design and management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to database audit, in particular to a database security audit method, which is used for receiving a database audit request and extracting database information to be audited from the database audit request; acquiring a database log of a database to be audited according to the information of the database to be audited, and receiving a database audit rule configured by an audit user; matching the database log with a database audit rule, and obtaining a first database audit result based on the matching result; extracting a plurality of operation user information from a database log, and screening the operation user information to obtain target user information; performing rationality judgment on the operation characteristics of the target user, and obtaining a second database audit result based on the judgment result; synthesizing the first database audit result and the second database audit result, and analyzing to obtain a database security audit result; the technical scheme provided by the invention can effectively overcome the defect that the auditing result has errors due to the fact that only the database log of the database to be audited is analyzed.

Description

Database security audit method
Technical Field
The invention relates to database audit, in particular to a database security audit method.
Background
The development of the Internet brings about mass growth of various data, is used as a database technology of a data storage basis, directly relates to data security, and also influences various decision bases. The development of technology brings positive effects, and threatens the database, such as misuse of resources, leakage of enterprise confidential information, hacking and the like, which all put higher demands on the security audit of the database.
Database audit, DBAudio for short, can record database activities on a network in real time, conduct compliance management of fine-grained audit on database operation, alarm risk behaviors suffered by the database, block attack behaviors and the like. The method helps the user to generate a compliance report after the fact through recording and analyzing the behavior of accessing the database by the user, trace the source of the accident, strengthen the network behavior recording of the internal and external databases and improve the safety of the data asset.
However, the existing database security audit generally only analyzes the database log of the database to be audited, which easily causes errors in the database security audit result.
Disclosure of Invention
(one) solving the technical problems
Aiming at the defects existing in the prior art, the invention provides a database security audit method, which can effectively overcome the defect that the audit result has errors due to the fact that only the database log of the database to be audited is analyzed in the prior art.
(II) technical scheme
In order to achieve the above purpose, the invention is realized by the following technical scheme:
a database security audit method comprising the steps of:
s1, receiving a database audit request, and extracting database information to be audited from the database audit request;
s2, acquiring a database log of the database to be audited according to the information of the database to be audited, and receiving a database audit rule configured by an audit user;
s3, matching the database log with a database audit rule, and obtaining a first database audit result based on a matching result;
s4, extracting a plurality of operation user information from the database log, and screening the operation user information to obtain target user information;
s5, rationality judgment is carried out on the operation characteristics of the target user, and a second database audit result is obtained based on the judgment result;
s6, integrating the first database audit result and the second database audit result, and analyzing to obtain a database security audit result.
Preferably, in S2, obtaining a database log of the database to be audited according to the information of the database to be audited includes:
and calling a preset monitoring program, monitoring the database to be audited by using the preset monitoring program according to the information of the database to be audited, and generating a database log of the database to be audited according to the monitoring information.
Preferably, in S2, obtaining a database log of the database to be audited according to the information of the database to be audited includes:
determining a database to be audited according to the information of the database to be audited, receiving database logs of the database to be audited sent by each distributed log data acquisition agent, putting the received database logs into a designated queue, and acquiring the database logs of the database to be audited from the designated queue.
Preferably, in S3, the matching between the database log and the database audit rule, and obtaining a first database audit result based on the matching result includes:
periodically matching sentences in the database log with database audit rules, and obtaining a first database audit result based on the matching result;
the database audit rule comprises audit states and corresponding audit state activation identifiers.
Preferably, the periodically matching the statement in the database log with the database audit rule, and obtaining the first database audit result based on the matching result includes:
determining an audit state activation identifier in a database audit rule, and periodically matching sentences in a database log with the audit state activation identifier;
if the statement in the database log has the audit state activation identification, outputting a first database audit result of the risk of the database content to be audited; otherwise, outputting a first database auditing result that the database content to be audited does not have risk.
Preferably, in S4, extracting a plurality of operation user information from the database log, and filtering the operation user information to obtain target user information, including:
extracting a plurality of operation user information from a database log, and determining validity characteristics corresponding to the operation user based on the operation user information;
and screening the operation user information according to the legality characteristics to obtain target user information.
Preferably, in S5, performing rationality judgment on the operation feature of the target user, and obtaining a second database audit result based on the judgment result, including:
and acquiring corresponding operation behavior reference information according to the target user information, performing rationality judgment on the operation characteristics of the target user by utilizing the operation behavior reference information, and acquiring a second database audit result based on the judgment result.
Preferably, the obtaining the corresponding operation behavior reference information according to the target user information includes:
acquiring historical user information containing operation user information and corresponding historical operation information, generating vector information by the historical user information and the historical operation information, and acquiring weight information and bias matrix information of the historical user information and the historical operation information;
generating operation behavior reference information according to the vector information, the weight information and the bias matrix information of the historical user information and the historical operation information, and storing the operation behavior reference information into an operation behavior database;
and acquiring corresponding operation behavior reference information from the operation behavior database according to the target user information.
Preferably, the performing rationality judgment on the operation feature of the target user by using the operation behavior reference information, and obtaining the second database audit result based on the judgment result includes:
acquiring corresponding reasonable operation behaviors from the operation behavior reference information according to the target user information, and judging the rationality of the operation characteristics of the target user by utilizing the reasonable operation behaviors;
if the operation characteristics of the target user which do not accord with the reasonable operation behaviors exist, outputting a second database auditing result that the database user to be audited has risks; otherwise, outputting a second database auditing result that the database user to be audited does not have risk.
(III) beneficial effects
Compared with the prior art, the database security audit method provided by the invention has the following beneficial effects:
1) Receiving a database audit request, extracting database information to be audited from the database audit request, acquiring a database log of the database to be audited according to the database information to be audited, receiving a database audit rule configured by an audit user, matching the database log with the database audit rule, acquiring a first database audit result based on the matching result, and effectively performing security audit on the database log by configuring the database audit rule to acquire the first database audit result about the database content;
2) Extracting a plurality of operation user information from a database log, screening the operation user information to obtain target user information, performing rationality judgment on the operation characteristics of the target user, obtaining a second database audit result based on the judgment result, and performing rationality judgment on the operation characteristics of the target user to effectively perform security audit on the operation user to obtain the second database audit result related to the database user;
3) And integrating the first database audit result and the second database audit result, and fully considering the database content and the security audit condition of the database user, so that the database security audit result obtained by final analysis is more accurate and comprehensive.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is evident that the drawings in the following description are only some embodiments of the present invention and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is a schematic flow chart of the present invention;
FIG. 2 is a flow chart of obtaining a first database audit result based on a matching result of a database log and a database audit rule in the present invention;
fig. 3 is a schematic flow chart of obtaining a second database audit result based on a rationality judgment result of an operation feature of a target user in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It will be apparent that the described embodiments are some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
A database security audit method is shown in fig. 1 and 2, (1) a database audit request is received, and database information to be audited is extracted from the database audit request.
(2) And acquiring a database log of the database to be audited according to the information of the database to be audited, and receiving a database audit rule configured by an audit user.
1) Obtaining a database log of the database to be audited according to the information of the database to be audited, comprising:
and calling a preset monitoring program, monitoring the database to be audited by using the preset monitoring program according to the information of the database to be audited, and generating a database log of the database to be audited according to the monitoring information.
2) Obtaining a database log of the database to be audited according to the information of the database to be audited, comprising:
determining a database to be audited according to the information of the database to be audited, receiving database logs of the database to be audited sent by each distributed log data acquisition agent, putting the received database logs into a designated queue, and acquiring the database logs of the database to be audited from the designated queue.
(3) Matching the database log with the database audit rule, and obtaining a first database audit result based on the matching result, wherein the method specifically comprises the following steps:
periodically matching sentences in the database log with database audit rules, and obtaining a first database audit result based on the matching result;
the database audit rule comprises audit states and corresponding audit state activation identifiers.
Periodically matching sentences in the database log with database audit rules, and obtaining a first database audit result based on the matching result, wherein the periodically matching the sentences with the database audit rules comprises the following steps:
determining an audit state activation identifier in a database audit rule, and periodically matching sentences in a database log with the audit state activation identifier;
if the statement in the database log has the audit state activation identification, outputting a first database audit result of the risk of the database content to be audited; otherwise, outputting a first database auditing result that the database content to be audited does not have risk.
According to the technical scheme, the database audit request is received, the database information to be audited is extracted from the database audit request, the database log of the database to be audited is obtained according to the database information to be audited, the database log is matched with the database audit rule configured by the audit user, a first database audit result is obtained based on the matching result, and effective security audit can be carried out on the database log by configuring the database audit rule, so that the first database audit result about the database content is obtained.
As shown in fig. 1 and 3, (4) extracting a plurality of operation user information from a database log, and filtering the operation user information to obtain target user information, which specifically includes:
extracting a plurality of operation user information from a database log, and determining validity characteristics corresponding to the operation user based on the operation user information;
and screening the operation user information according to the legality characteristics to obtain target user information.
(5) Performing rationality judgment on the operation characteristics of the target user, and obtaining a second database audit result based on the judgment result, wherein the method specifically comprises the following steps:
and acquiring corresponding operation behavior reference information according to the target user information, performing rationality judgment on the operation characteristics of the target user by utilizing the operation behavior reference information, and acquiring a second database audit result based on the judgment result.
1) Acquiring corresponding operation behavior reference information according to target user information, including:
acquiring historical user information containing operation user information and corresponding historical operation information, generating vector information by the historical user information and the historical operation information, and acquiring weight information and bias matrix information of the historical user information and the historical operation information;
generating operation behavior reference information according to the vector information, the weight information and the bias matrix information of the historical user information and the historical operation information, and storing the operation behavior reference information into an operation behavior database;
and acquiring corresponding operation behavior reference information from the operation behavior database according to the target user information.
2) Performing rationality judgment on the operation characteristics of the target user by using the operation behavior reference information, and obtaining a second database audit result based on the judgment result, wherein the method comprises the following steps:
acquiring corresponding reasonable operation behaviors from the operation behavior reference information according to the target user information, and judging the rationality of the operation characteristics of the target user by utilizing the reasonable operation behaviors;
if the operation characteristics of the target user which do not accord with the reasonable operation behaviors exist, outputting a second database auditing result that the database user to be audited has risks; otherwise, outputting a second database auditing result that the database user to be audited does not have risk.
According to the technical scheme, the plurality of operation user information is extracted from the database log, the operation user information is screened to obtain the target user information, the rationality judgment is carried out on the operation characteristics of the target user, the second database audit result is obtained based on the judgment result, and the effective security audit can be carried out on the operation user by carrying out the rationality judgment on the operation characteristics of the target user, so that the second database audit result about the database user is obtained.
(6) And integrating the first database audit result and the second database audit result, and analyzing to obtain a database security audit result.
According to the technical scheme, the first database audit result and the second database audit result are synthesized, and the database content and the safety audit condition of the database user are fully considered, so that the database safety audit result obtained by final analysis is more accurate and comprehensive.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (9)

1. A database security audit method is characterized in that: the method comprises the following steps:
s1, receiving a database audit request, and extracting database information to be audited from the database audit request;
s2, acquiring a database log of the database to be audited according to the information of the database to be audited, and receiving a database audit rule configured by an audit user;
s3, matching the database log with a database audit rule, and obtaining a first database audit result based on a matching result;
s4, extracting a plurality of operation user information from the database log, and screening the operation user information to obtain target user information;
s5, rationality judgment is carried out on the operation characteristics of the target user, and a second database audit result is obtained based on the judgment result;
s6, integrating the first database audit result and the second database audit result, and analyzing to obtain a database security audit result.
2. The database security auditing method of claim 1, wherein: s2, obtaining a database log of the database to be audited according to the information of the database to be audited, including:
and calling a preset monitoring program, monitoring the database to be audited by using the preset monitoring program according to the information of the database to be audited, and generating a database log of the database to be audited according to the monitoring information.
3. The database security auditing method of claim 1, wherein: s2, obtaining a database log of the database to be audited according to the information of the database to be audited, including:
determining a database to be audited according to the information of the database to be audited, receiving database logs of the database to be audited sent by each distributed log data acquisition agent, putting the received database logs into a designated queue, and acquiring the database logs of the database to be audited from the designated queue.
4. The database security auditing method of claim 1, wherein: and S3, matching the database log with the database audit rule, and obtaining a first database audit result based on the matching result, wherein the method comprises the following steps:
periodically matching sentences in the database log with database audit rules, and obtaining a first database audit result based on the matching result;
the database audit rule comprises audit states and corresponding audit state activation identifiers.
5. The database security auditing method of claim 4, wherein: the periodically matching is performed on the sentences in the database log and the database audit rules, and a first database audit result is obtained based on the matching result, including:
determining an audit state activation identifier in a database audit rule, and periodically matching sentences in a database log with the audit state activation identifier;
if the statement in the database log has the audit state activation identification, outputting a first database audit result of the risk of the database content to be audited; otherwise, outputting a first database auditing result that the database content to be audited does not have risk.
6. The database security auditing method of claim 1, wherein: s4, extracting a plurality of operation user information from a database log, screening the operation user information to obtain target user information, wherein the method comprises the following steps:
extracting a plurality of operation user information from a database log, and determining validity characteristics corresponding to the operation user based on the operation user information;
and screening the operation user information according to the legality characteristics to obtain target user information.
7. The database security auditing method of claim 6, wherein: and S5, performing rationality judgment on the operation characteristics of the target user, and obtaining a second database audit result based on the judgment result, wherein the method comprises the following steps:
and acquiring corresponding operation behavior reference information according to the target user information, performing rationality judgment on the operation characteristics of the target user by utilizing the operation behavior reference information, and acquiring a second database audit result based on the judgment result.
8. The database security auditing method of claim 7, wherein: the obtaining corresponding operation behavior reference information according to the target user information includes:
acquiring historical user information containing operation user information and corresponding historical operation information, generating vector information by the historical user information and the historical operation information, and acquiring weight information and bias matrix information of the historical user information and the historical operation information;
generating operation behavior reference information according to the vector information, the weight information and the bias matrix information of the historical user information and the historical operation information, and storing the operation behavior reference information into an operation behavior database;
and acquiring corresponding operation behavior reference information from the operation behavior database according to the target user information.
9. The database security auditing method of claim 8, wherein: the method for judging rationality of the operation characteristics of the target user by using the operation behavior reference information, and obtaining the second database audit result based on the judgment result comprises the following steps:
acquiring corresponding reasonable operation behaviors from the operation behavior reference information according to the target user information, and judging the rationality of the operation characteristics of the target user by utilizing the reasonable operation behaviors;
if the operation characteristics of the target user which do not accord with the reasonable operation behaviors exist, outputting a second database auditing result that the database user to be audited has risks; otherwise, outputting a second database auditing result that the database user to be audited does not have risk.
CN202310068565.2A 2023-02-06 2023-02-06 Database security audit method Withdrawn CN116089390A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310068565.2A CN116089390A (en) 2023-02-06 2023-02-06 Database security audit method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310068565.2A CN116089390A (en) 2023-02-06 2023-02-06 Database security audit method

Publications (1)

Publication Number Publication Date
CN116089390A true CN116089390A (en) 2023-05-09

Family

ID=86206047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310068565.2A Withdrawn CN116089390A (en) 2023-02-06 2023-02-06 Database security audit method

Country Status (1)

Country Link
CN (1) CN116089390A (en)

Similar Documents

Publication Publication Date Title
CN111859400B (en) Risk assessment method, risk assessment device, computer system and medium
CN116861446A (en) Data security assessment method and system
CN111915316B (en) Method and device for monitoring suspicious transactions, computer equipment and storage medium
CN109902747B (en) Identity recognition method, device, equipment and computer readable storage medium
CN116846619A (en) Automatic network security risk assessment method, system and readable storage medium
CN117421761A (en) Database data information security monitoring method
CN113709170A (en) Asset safe operation system, method and device
CN114091042A (en) Risk early warning method
CN112734177A (en) Wind control system and method for intelligent shunting automatic decision
CN114785710A (en) Method and system for evaluating service capability of industrial internet identification analysis secondary node
CN117670023A (en) Customer service center call platform data security risk assessment method based on artificial intelligence
CN115499840A (en) Security assessment system and method for mobile internet
CN112445785B (en) Account blasting detection method and related device
CN117691733A (en) Assessment method and device for information security protection of power distribution automation system
CN116089390A (en) Database security audit method
CN111885088A (en) Log monitoring method and device based on block chain
CN113067835B (en) Integrated self-adaptive collapse index processing system
CN114022114B (en) Data management system and method based on telecommunication industry
CN115795475A (en) Method and device for determining software system risk and electronic equipment
CN113691552A (en) Threat intelligence effectiveness evaluation method, device, system and computer storage medium
CN114493858A (en) Illegal fund transfer suspicious transaction monitoring method and related components
CN113791980A (en) Test case conversion analysis method, device, equipment and storage medium
CN111934949A (en) Safety test system based on database injection test
CN118350004B (en) Vulnerability scanning method and system based on load library
CN115914005B (en) Data auditing system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20230509