###
DOI:
计算机系统应用英文版:2014,23(4):97-101
本文二维码信息
码上扫一扫!
基于网络侦听的数据库审计方法
(1.南京航空航天大学 计算机科学与技术学院, 南京 210016;2.南京德讯科技股份公司, 南京 210012)
DBMS Audit Based on Network Listener
(1.College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China;2.Datcent Technologies Inc, Nanjing, 210016, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 2111次   下载 2969
Received:September 07, 2013    Revised:September 25, 2013
中文摘要: 目前,在我国广泛使用的数据库管理系统中存在着监管失效,内部操作不透明,安全保护手段滞后等问题. 而系统自带的数据库审计服务也存在着审计日志格式繁多难于维护,长期使用审计服务后导致系统性能下降等缺陷. 因此,本文提出一种基于网络侦听技术的数据库审计方法,该方法通过监听分析数据来获取数据库操作指令,不改变现有网络结构,也不影响网络的性能,能够有效的审计监管外部入侵和内部的违规操作,为事后责任认定提供证据,可以有效的克服传统审计技术的不足.
中文关键词: 数据库  审计  网络侦听  协议分析  日志策略
Abstract:At present, widely used DBMS in our country, which has generally exist some problems. Because of regul- atory failure, opaque internal operations, the lag of security measures, We can not guarantee that our database is secure. Although DBMS has provided audit services that also have many problems, such as most DBMS has different audit log format and difficult to maintain, low capability when audit server used long-term. So this paper presents a database audit method based on network monitoring technology. We can use it to collect database operations command by analyzing the monitoring data.It works without changing the existing network structure and effecting network performance, and it can effectively record external invasion or internal irregularities to provide evidence to legal responsibility. This appro- ach overcomes the shortcomings of traditional audit techniques.
文章编号:     中图分类号:    文献标志码:
基金项目:
引用文本:
钱正麟,高航,李曙强.基于网络侦听的数据库审计方法.计算机系统应用,2014,23(4):97-101
QIAN Zheng-Lin,GAO Hang,LI Shu-Qiang.DBMS Audit Based on Network Listener.COMPUTER SYSTEMS APPLICATIONS,2014,23(4):97-101