期刊文献+

基于网络侦听的数据库审计方法 被引量:7

DBMS Audit Based on Network Listener
下载PDF
导出
摘要 目前,在我国广泛使用的数据库管理系统中存在着监管失效,内部操作不透明,安全保护手段滞后等问题.而系统自带的数据库审计服务也存在着审计日志格式繁多难于维护,长期使用审计服务后导致系统性能下降等缺陷.因此,本文提出一种基于网络侦听技术的数据库审计方法,该方法通过监听分析数据来获取数据库操作指令,不改变现有网络结构,也不影响网络的性能,能够有效的审计监管外部入侵和内部的违规操作,为事后责任认定提供证据,可以有效的克服传统审计技术的不足. At present, widely used DBMS in our country, which has generally exist some problems. Because of regul-atory failure, opaque internal operations, the lag of security measures, We can not guarantee that our database is secure. Although DBMS has provided audit services that also have many problems, such as most DBMS has different audit log format and difficult to maintain, low capability when audit server used long-term. So this paper presents a database audit method based on network monitoring technology. We can use it to collect database operations command by analyzing the monitoring data .It works without changing the existing network structure and effecting network performance, and it can effectively record external invasion or internal irregularities to provide evidence to legal responsibility. This appro-ach overcomes the shortcomings of traditional audit techniques.
出处 《计算机系统应用》 2014年第4期97-101,共5页 Computer Systems & Applications
关键词 数据库 审计 网络侦听 协议分析 日志策略 database audit network intercept protocol analyse log policy
  • 相关文献

参考文献9

  • 1Khanuja HK, Adane DS. Database security threats and challenges in database forensic: A survey. Proc. 2011 International Conference on Advancements in Information Technology. Singapore. IACSIT Press. 2011. 170-175.
  • 2Cong QS, Huang ZM, Hu JB. A collaborative computer auditing system under SOA-based conceptual model. Proc. 2011 4th IEEE International Conference on Computer Science and Information Technology. 2011, 10. 439-443.
  • 3Zhu YQ, Yu H, Li H, Zeng LM. Design of a new web database security model. IEEE Computer Societyeds. Second International Symposium on Electronic Commerce and Securit. ISECS 2009. Washington. Electronic Commerce and Security. 2010,1. 292-295.
  • 4Deng L, Wang LY. Simulatable auditing in micro- databases. Proc. 2011 4th IEEE International Conference on Computer Science and Information Technology. China. Academic Journal Electronic Publishing House. 2011, 6. 364-368.
  • 5沈辉,张龙.基于WinPcap的网络数据监测及分析[J].计算机科学,2012,39(S2):15-18. 被引量:18
  • 6马俊,高建瓴,孙斌,赵振民.WinPcap网络舱听技术的研究与改进.2007通信理论与技术新发展.第十二届全国青年通信学术会议论文集.北京.中国学术期刊网络出版总库.2007.下册.1877-1882.
  • 7郭丽红,吴海涛.TDS协议分析与漏洞检测[J].计算机工程,2009,35(18):127-129. 被引量:3
  • 8殷泰晖,李帅.基于TNS协议的Oracle数据库安全性改进方法[J].合肥工业大学学报(自然科学版),2012,35(2):193-196. 被引量:4
  • 9Forest JJ. Objective analysis of process safety audit data with Microsoft access. Process Safety Progress, 2011, 3(30): 221-231.

二级参考文献13

  • 1徐婷,杨欣荣.数据库安全技术的理论研究[J].科技情报开发与经济,2007,17(4):222-223. 被引量:20
  • 2Stallings W.密码编码学与网络安全[M].刘玉珍.译.北京:电子工业出版社,2001.
  • 3Shmueli E,Waisenberg R, Elovici Y, et al. Designing secure in- dexes for encrypted databases[C]// Proc of the IFIP Conf on Database and Applications Security, LNCS 3654. Heiddberg, Berlin: Springer-Verlag, 2005 : 54- 68.
  • 4Estrind, Tsudik G. Visa scheme for inter-organization net work security[C]//Proc of the 1987 Symposium on Securi- ty and Privacy. New York: IEEE, 1987: 174--183.
  • 5Emekci F, Agrawal D, Abbadi A E, et al. Privacy preser ring query processing using third parties[C]//Barga R S, Zhou X F. Proc of the Int Conf on Data Engineering. Wash- ington: IEEE Computer Society Press, 2006: 27.
  • 6Oracle Corporation. Architecture of Oracle Net Services [Z]. Oraclegi Net Services Administrator's Guide Release 2 (9.2) :Part Number A96580-02.
  • 7Wong R. Oracle Net8 Administrator' s Guide Release 8. 0 [Z]. December, 1997 : A58230-01.
  • 8Mykletun E, NarasimhaM, TsudikG. Authentication and integrity'in outsourceddatabases[J]. ACMTrans on Stor- age,2006,2(2):107--138.
  • 9沈苏彬.一种面向网络基础设施的安全模型及其控制机制[C]//国家重大科学基金研究计划"网络与信息安全"2002年度学术交流论文集.2002:519-526.
  • 10.RFC Index Search Engine[OL][]..

共引文献22

同被引文献46

引证文献7

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部