CN109063472A - Security of Network Database toxicological operation protective system - Google Patents

Security of Network Database toxicological operation protective system Download PDF

Info

Publication number
CN109063472A
CN109063472A CN201810535088.5A CN201810535088A CN109063472A CN 109063472 A CN109063472 A CN 109063472A CN 201810535088 A CN201810535088 A CN 201810535088A CN 109063472 A CN109063472 A CN 109063472A
Authority
CN
China
Prior art keywords
network
data
module
database
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810535088.5A
Other languages
Chinese (zh)
Inventor
蔡仲达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taicang Hong Da Da Da Technology Consulting Co Ltd
Original Assignee
Taicang Hong Da Da Da Technology Consulting Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taicang Hong Da Da Da Technology Consulting Co Ltd filed Critical Taicang Hong Da Da Da Technology Consulting Co Ltd
Priority to CN201810535088.5A priority Critical patent/CN109063472A/en
Publication of CN109063472A publication Critical patent/CN109063472A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of Security of Network Database toxicological operation protective systems, it includes that network data library module, Isolation Management module and network are sought help module, network data library module connects Isolation Management module, Isolation Management module connection network is sought help module, and network data library module includes that data transmission, data upload, data downloading, database detects and store automatically data and supervise;Isolation Management module includes amendment data, virus sweep, data infection level identification and data security isolation;Network module of seeking help includes generating off-limit file, network killing virus and providing network to seek help.Inventive network database security toxicological operation protective system to carry out storing data the isolation of virus, can be improved the safety of network data base in this way using independent shielding system.

Description

Security of Network Database toxicological operation protective system
Technical field
The present invention relates to a kind of network securitys, more particularly to a kind of Security of Network Database toxicological operation protective system.
Background technique
Due to being constantly progressive for computer and network technology, network system has become the Information base of an enterprise or a tissue Equipment.Network can be used as the tool for linking up connection, gradually replace traditional written assignment, while can also user be helped to pass through net Network channel gets help.It is necessarily growing day by day for the utilization rate of network system and degree of being dependent on, so needing to develop a kind of net The toxicological operation protective system of network is safe to help the storage of database.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of Security of Network Database toxicological operation protective systems.
The present invention is to solve above-mentioned technical problem by following technical proposals: a kind of Security of Network Database gas defence system System comprising network data library module, Isolation Management module and network are sought help module, the network data library module connection isolation Management module, Isolation Management module connection network are sought help module,
The network data library module includes data transmission, data upload, data are downloaded, database detects and store automatically data Supervision, the data transmission, data upload, data are downloaded, database detects and stores automatically data supervision and is all mounted on network In database module;
The Isolation Management module includes correcting data, virus sweep, data infection level identification and data security isolation, described Amendment data, virus sweep, data infection level identification and data security isolation are all mounted in Isolation Management module;
Network module of seeking help includes generating off-limit file, network killing virus and providing network to seek help, and generations is isolated It file, network killing virus and network is provided seeks help and be all mounted on network and seek help in module.
Preferably, the database detects automatically is connected with storage data supervision.
Preferably, the data infection level identification is connected with off-limit file is generated.
Preferably, the generation off-limit file seeks help with offer network and is connected.
The positive effect of the present invention is that: inventive network database security toxicological operation protective system, use it is independent every From the isolation that system to carry out storing data virus, the safety of network data base can be improved in this way.Present networks database Safe toxicological operation protective system can carry out the detection to isolated data by the channel of network, segregate data by network detection It can quickly confirm its safety, data base administration person can be helped quickly to be confirmed whether to be poisoned and adopt an effective measure.
Detailed description of the invention
Fig. 1 is system construction drawing of the invention.
Specific embodiment
Present pre-ferred embodiments are provided with reference to the accompanying drawing, in order to explain the technical scheme of the invention in detail.
As shown in Figure 1, network data library module 1, Isolation Management module 2, network are sought help, module 3, data transmit 4, data Upload 5, data downloading 6, database detects 7, storage data supervision 8, amendment data 9, virus sweep 10, data infection etc. automatically Grade identification 11, data safety isolation 12 generate off-limit file 13, network killing virus 14, provide network and seek help 15.
A kind of Security of Network Database toxicological operation protective system comprising network data library module 1, Isolation Management module 2 and network Module of seeking help 3, network data library module 1 connect Isolation Management module 2, and Isolation Management module 2 connects network and seeks help module 3,
Network data library module 1 includes data transmission 4, data upload 5, data downloading 6, database detects 7 and storage number automatically According to supervision 8, data transmission 4, data upload 5, data downloading 6, database detects 7 automatically and stores data supervision 8 and is all mounted on In network data library module 1;
Isolation Management module 2 includes correcting data 9, virus sweep 10, data infection level identification 11 and data security isolation 12, Amendment data 9, virus sweep 10, data infection level identification 11 and data security isolation 12 are all mounted on Isolation Management module 2 It is interior;
Network module 3 of seeking help includes generating off-limit file 13, network killing virus 14 and providing network to seek help 15, generates isolation text It part 13, network killing virus 14 and network is provided seeks help and 15 be all mounted on network and seek help in module 3.
In this example, database detects 7 automatically and is connected with storage data supervision 8, and system can be automatically to the number of storage It will do it supervision data according to being detected and being found the problem.
In this example, data infection level identification 11 is connected with off-limit file 13 is generated, to the off-limit file of generation It is identified.
In this example, it generates off-limit file 13 and offer network seeks help and 15 is connected, off-limit file is submitted to network It is upper quickly and effectively to be operated.
Inventive network database security toxicological operation protective system comes to carry out virus to storing data using independent shielding system Isolation, can be improved the safety of network data base in this way.Present networks database security toxicological operation protective system can pass through network Channel carries out the detection to isolated data, and segregate data can quickly confirm its safety by the detection at network, can Data base administration person is helped quickly to be confirmed whether to be poisoned and adopt an effective measure.
Particular embodiments described above, the technical issues of to solution of the invention, technical scheme and beneficial effects carry out It is further described, it should be understood that the above is only a specific embodiment of the present invention, is not limited to The present invention, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should be included in this Within the protection scope of invention.

Claims (4)

1. a kind of Security of Network Database toxicological operation protective system, characterized in that it comprises: network data library module, Isolation Management mould Block and network are sought help module, and the network data library module connects Isolation Management module, and Isolation Management module connection network is sought help Module,
The network data library module includes data transmission, data upload, data are downloaded, database detects and store automatically data Supervision, the data transmission, data upload, data are downloaded, database detects and stores automatically data supervision and is all mounted on network In database module;
The Isolation Management module includes correcting data, virus sweep, data infection level identification and data security isolation, described Amendment data, virus sweep, data infection level identification and data security isolation are all mounted in Isolation Management module;
Network module of seeking help includes generating off-limit file, network killing virus and providing network to seek help, and generations is isolated It file, network killing virus and network is provided seeks help and be all mounted on network and seek help in module.
2. Security of Network Database toxicological operation protective system as described in claim 1, which is characterized in that the database is detected and stored up automatically Deposit data supervision is connected.
3. Security of Network Database toxicological operation protective system as described in claim 1, which is characterized in that data infection level identification and Off-limit file is generated to be connected.
4. Security of Network Database toxicological operation protective system as described in claim 1, which is characterized in that the generation off-limit file and offer Network, which is sought help, to be connected.
CN201810535088.5A 2018-05-30 2018-05-30 Security of Network Database toxicological operation protective system Pending CN109063472A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810535088.5A CN109063472A (en) 2018-05-30 2018-05-30 Security of Network Database toxicological operation protective system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810535088.5A CN109063472A (en) 2018-05-30 2018-05-30 Security of Network Database toxicological operation protective system

Publications (1)

Publication Number Publication Date
CN109063472A true CN109063472A (en) 2018-12-21

Family

ID=64819782

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810535088.5A Pending CN109063472A (en) 2018-05-30 2018-05-30 Security of Network Database toxicological operation protective system

Country Status (1)

Country Link
CN (1) CN109063472A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102915359A (en) * 2012-10-16 2013-02-06 北京奇虎科技有限公司 File management method and device
US9811532B2 (en) * 2010-05-03 2017-11-07 Panzura, Inc. Executing a cloud command for a distributed filesystem
CN107370747A (en) * 2017-08-14 2017-11-21 北京奇安信科技有限公司 A kind of method and device for preventing malicious file from propagating

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9811532B2 (en) * 2010-05-03 2017-11-07 Panzura, Inc. Executing a cloud command for a distributed filesystem
CN102915359A (en) * 2012-10-16 2013-02-06 北京奇虎科技有限公司 File management method and device
CN107370747A (en) * 2017-08-14 2017-11-21 北京奇安信科技有限公司 A kind of method and device for preventing malicious file from propagating

Similar Documents

Publication Publication Date Title
CN103646209B (en) The method and apparatus intercepting bundled software based on cloud security
PH12020551369A1 (en) Customized view of restricted information recorded into a blockchain
MY197480A (en) System and method for information protection
CN103473501B (en) A kind of Malware method for tracing based on cloud security
CN104637185A (en) Offline box opening method of intelligent storage cabinet
CN110311913A (en) Computer Network Security System, application method, equipment and storage medium
CN110213207A (en) A kind of network security defence method and equipment based on log analysis
CN105447385B (en) A kind of applied database honey jar detected at many levels realizes system and method
CN105635046A (en) Database command line filtering and audit blocking method and device
CN101261664A (en) A method for realizing software protection based on the program code stored in the software protection device
CN104252443A (en) Report generation method and device
CN107483425A (en) Composite attack detection method based on attack chain
GB201306126D0 (en) Method, secure device, system and computer program product for security managing access to a file system
CN103246848A (en) Software security protection method and equipment
CN105721256B (en) A kind of Audit data De-weight method of distributed deployment audit platform
CN106570400A (en) System and method for preventing attacks by self-learning in cloud environment
CN104780048B (en) The image file encryption system and method for a kind of lightweight
CN103186730A (en) Method and device for protecting.NET software security
CN109063472A (en) Security of Network Database toxicological operation protective system
CN108737094A (en) A kind of method and relevant device of the detection of domain cipher safety
CN108011870B (en) A kind of remote software online upgrading information automatic identification management method
CN109905366A (en) Terminal device safe verification method, device, readable storage medium storing program for executing and terminal device
US20240031407A1 (en) Honeypot Network Management Based on Probabilistic Detection of Malicious Port Activity
CN108363931A (en) A kind of method and device that isolation area file is restored
CN107657181A (en) A kind of database manipulation blocking-up method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181221