首页 | 本学科首页   官方微博 | 高级检索  
     

基于网络侦听的数据库审计方法
引用本文:钱正麟,高航,李曙强.基于网络侦听的数据库审计方法[J].计算机系统应用,2014,23(4):97-101.
作者姓名:钱正麟  高航  李曙强
作者单位:南京航空航天大学 计算机科学与技术学院, 南京 210016;南京航空航天大学 计算机科学与技术学院, 南京 210016;南京德讯科技股份公司, 南京 210012
摘    要:目前,在我国广泛使用的数据库管理系统中存在着监管失效,内部操作不透明,安全保护手段滞后等问题. 而系统自带的数据库审计服务也存在着审计日志格式繁多难于维护,长期使用审计服务后导致系统性能下降等缺陷. 因此,本文提出一种基于网络侦听技术的数据库审计方法,该方法通过监听分析数据来获取数据库操作指令,不改变现有网络结构,也不影响网络的性能,能够有效的审计监管外部入侵和内部的违规操作,为事后责任认定提供证据,可以有效的克服传统审计技术的不足.

关 键 词:数据库  审计  网络侦听  协议分析  日志策略
收稿时间:9/7/2013 12:00:00 AM
修稿时间:2013/9/25 0:00:00

DBMS Audit Based on Network Listener
QIAN Zheng-Lin,GAO Hang and LI Shu-Qiang.DBMS Audit Based on Network Listener[J].Computer Systems& Applications,2014,23(4):97-101.
Authors:QIAN Zheng-Lin  GAO Hang and LI Shu-Qiang
Affiliation:College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China;College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China;Datcent Technologies Inc, Nanjing, 210016, China
Abstract:At present, widely used DBMS in our country, which has generally exist some problems. Because of regul- atory failure, opaque internal operations, the lag of security measures, We can not guarantee that our database is secure. Although DBMS has provided audit services that also have many problems, such as most DBMS has different audit log format and difficult to maintain, low capability when audit server used long-term. So this paper presents a database audit method based on network monitoring technology. We can use it to collect database operations command by analyzing the monitoring data.It works without changing the existing network structure and effecting network performance, and it can effectively record external invasion or internal irregularities to provide evidence to legal responsibility. This appro- ach overcomes the shortcomings of traditional audit techniques.
Keywords:database  audit  network intercept  protocol analyse  log policy
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号