CN109063472A - Security of Network Database toxicological operation protective system - Google Patents
Security of Network Database toxicological operation protective system Download PDFInfo
- Publication number
- CN109063472A CN109063472A CN201810535088.5A CN201810535088A CN109063472A CN 109063472 A CN109063472 A CN 109063472A CN 201810535088 A CN201810535088 A CN 201810535088A CN 109063472 A CN109063472 A CN 109063472A
- Authority
- CN
- China
- Prior art keywords
- network
- data
- module
- database
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a kind of Security of Network Database toxicological operation protective systems, it includes that network data library module, Isolation Management module and network are sought help module, network data library module connects Isolation Management module, Isolation Management module connection network is sought help module, and network data library module includes that data transmission, data upload, data downloading, database detects and store automatically data and supervise;Isolation Management module includes amendment data, virus sweep, data infection level identification and data security isolation;Network module of seeking help includes generating off-limit file, network killing virus and providing network to seek help.Inventive network database security toxicological operation protective system to carry out storing data the isolation of virus, can be improved the safety of network data base in this way using independent shielding system.
Description
Technical field
The present invention relates to a kind of network securitys, more particularly to a kind of Security of Network Database toxicological operation protective system.
Background technique
Due to being constantly progressive for computer and network technology, network system has become the Information base of an enterprise or a tissue
Equipment.Network can be used as the tool for linking up connection, gradually replace traditional written assignment, while can also user be helped to pass through net
Network channel gets help.It is necessarily growing day by day for the utilization rate of network system and degree of being dependent on, so needing to develop a kind of net
The toxicological operation protective system of network is safe to help the storage of database.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of Security of Network Database toxicological operation protective systems.
The present invention is to solve above-mentioned technical problem by following technical proposals: a kind of Security of Network Database gas defence system
System comprising network data library module, Isolation Management module and network are sought help module, the network data library module connection isolation
Management module, Isolation Management module connection network are sought help module,
The network data library module includes data transmission, data upload, data are downloaded, database detects and store automatically data
Supervision, the data transmission, data upload, data are downloaded, database detects and stores automatically data supervision and is all mounted on network
In database module;
The Isolation Management module includes correcting data, virus sweep, data infection level identification and data security isolation, described
Amendment data, virus sweep, data infection level identification and data security isolation are all mounted in Isolation Management module;
Network module of seeking help includes generating off-limit file, network killing virus and providing network to seek help, and generations is isolated
It file, network killing virus and network is provided seeks help and be all mounted on network and seek help in module.
Preferably, the database detects automatically is connected with storage data supervision.
Preferably, the data infection level identification is connected with off-limit file is generated.
Preferably, the generation off-limit file seeks help with offer network and is connected.
The positive effect of the present invention is that: inventive network database security toxicological operation protective system, use it is independent every
From the isolation that system to carry out storing data virus, the safety of network data base can be improved in this way.Present networks database
Safe toxicological operation protective system can carry out the detection to isolated data by the channel of network, segregate data by network detection
It can quickly confirm its safety, data base administration person can be helped quickly to be confirmed whether to be poisoned and adopt an effective measure.
Detailed description of the invention
Fig. 1 is system construction drawing of the invention.
Specific embodiment
Present pre-ferred embodiments are provided with reference to the accompanying drawing, in order to explain the technical scheme of the invention in detail.
As shown in Figure 1, network data library module 1, Isolation Management module 2, network are sought help, module 3, data transmit 4, data
Upload 5, data downloading 6, database detects 7, storage data supervision 8, amendment data 9, virus sweep 10, data infection etc. automatically
Grade identification 11, data safety isolation 12 generate off-limit file 13, network killing virus 14, provide network and seek help 15.
A kind of Security of Network Database toxicological operation protective system comprising network data library module 1, Isolation Management module 2 and network
Module of seeking help 3, network data library module 1 connect Isolation Management module 2, and Isolation Management module 2 connects network and seeks help module 3,
Network data library module 1 includes data transmission 4, data upload 5, data downloading 6, database detects 7 and storage number automatically
According to supervision 8, data transmission 4, data upload 5, data downloading 6, database detects 7 automatically and stores data supervision 8 and is all mounted on
In network data library module 1;
Isolation Management module 2 includes correcting data 9, virus sweep 10, data infection level identification 11 and data security isolation 12,
Amendment data 9, virus sweep 10, data infection level identification 11 and data security isolation 12 are all mounted on Isolation Management module 2
It is interior;
Network module 3 of seeking help includes generating off-limit file 13, network killing virus 14 and providing network to seek help 15, generates isolation text
It part 13, network killing virus 14 and network is provided seeks help and 15 be all mounted on network and seek help in module 3.
In this example, database detects 7 automatically and is connected with storage data supervision 8, and system can be automatically to the number of storage
It will do it supervision data according to being detected and being found the problem.
In this example, data infection level identification 11 is connected with off-limit file 13 is generated, to the off-limit file of generation
It is identified.
In this example, it generates off-limit file 13 and offer network seeks help and 15 is connected, off-limit file is submitted to network
It is upper quickly and effectively to be operated.
Inventive network database security toxicological operation protective system comes to carry out virus to storing data using independent shielding system
Isolation, can be improved the safety of network data base in this way.Present networks database security toxicological operation protective system can pass through network
Channel carries out the detection to isolated data, and segregate data can quickly confirm its safety by the detection at network, can
Data base administration person is helped quickly to be confirmed whether to be poisoned and adopt an effective measure.
Particular embodiments described above, the technical issues of to solution of the invention, technical scheme and beneficial effects carry out
It is further described, it should be understood that the above is only a specific embodiment of the present invention, is not limited to
The present invention, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should be included in this
Within the protection scope of invention.
Claims (4)
1. a kind of Security of Network Database toxicological operation protective system, characterized in that it comprises: network data library module, Isolation Management mould
Block and network are sought help module, and the network data library module connects Isolation Management module, and Isolation Management module connection network is sought help
Module,
The network data library module includes data transmission, data upload, data are downloaded, database detects and store automatically data
Supervision, the data transmission, data upload, data are downloaded, database detects and stores automatically data supervision and is all mounted on network
In database module;
The Isolation Management module includes correcting data, virus sweep, data infection level identification and data security isolation, described
Amendment data, virus sweep, data infection level identification and data security isolation are all mounted in Isolation Management module;
Network module of seeking help includes generating off-limit file, network killing virus and providing network to seek help, and generations is isolated
It file, network killing virus and network is provided seeks help and be all mounted on network and seek help in module.
2. Security of Network Database toxicological operation protective system as described in claim 1, which is characterized in that the database is detected and stored up automatically
Deposit data supervision is connected.
3. Security of Network Database toxicological operation protective system as described in claim 1, which is characterized in that data infection level identification and
Off-limit file is generated to be connected.
4. Security of Network Database toxicological operation protective system as described in claim 1, which is characterized in that the generation off-limit file and offer
Network, which is sought help, to be connected.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810535088.5A CN109063472A (en) | 2018-05-30 | 2018-05-30 | Security of Network Database toxicological operation protective system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810535088.5A CN109063472A (en) | 2018-05-30 | 2018-05-30 | Security of Network Database toxicological operation protective system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109063472A true CN109063472A (en) | 2018-12-21 |
Family
ID=64819782
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810535088.5A Pending CN109063472A (en) | 2018-05-30 | 2018-05-30 | Security of Network Database toxicological operation protective system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109063472A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102915359A (en) * | 2012-10-16 | 2013-02-06 | 北京奇虎科技有限公司 | File management method and device |
US9811532B2 (en) * | 2010-05-03 | 2017-11-07 | Panzura, Inc. | Executing a cloud command for a distributed filesystem |
CN107370747A (en) * | 2017-08-14 | 2017-11-21 | 北京奇安信科技有限公司 | A kind of method and device for preventing malicious file from propagating |
-
2018
- 2018-05-30 CN CN201810535088.5A patent/CN109063472A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9811532B2 (en) * | 2010-05-03 | 2017-11-07 | Panzura, Inc. | Executing a cloud command for a distributed filesystem |
CN102915359A (en) * | 2012-10-16 | 2013-02-06 | 北京奇虎科技有限公司 | File management method and device |
CN107370747A (en) * | 2017-08-14 | 2017-11-21 | 北京奇安信科技有限公司 | A kind of method and device for preventing malicious file from propagating |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103646209B (en) | The method and apparatus intercepting bundled software based on cloud security | |
PH12020551369A1 (en) | Customized view of restricted information recorded into a blockchain | |
MY197480A (en) | System and method for information protection | |
CN103473501B (en) | A kind of Malware method for tracing based on cloud security | |
CN104637185A (en) | Offline box opening method of intelligent storage cabinet | |
CN110311913A (en) | Computer Network Security System, application method, equipment and storage medium | |
CN110213207A (en) | A kind of network security defence method and equipment based on log analysis | |
CN105447385B (en) | A kind of applied database honey jar detected at many levels realizes system and method | |
CN105635046A (en) | Database command line filtering and audit blocking method and device | |
CN101261664A (en) | A method for realizing software protection based on the program code stored in the software protection device | |
CN104252443A (en) | Report generation method and device | |
CN107483425A (en) | Composite attack detection method based on attack chain | |
GB201306126D0 (en) | Method, secure device, system and computer program product for security managing access to a file system | |
CN103246848A (en) | Software security protection method and equipment | |
CN105721256B (en) | A kind of Audit data De-weight method of distributed deployment audit platform | |
CN106570400A (en) | System and method for preventing attacks by self-learning in cloud environment | |
CN104780048B (en) | The image file encryption system and method for a kind of lightweight | |
CN103186730A (en) | Method and device for protecting.NET software security | |
CN109063472A (en) | Security of Network Database toxicological operation protective system | |
CN108737094A (en) | A kind of method and relevant device of the detection of domain cipher safety | |
CN108011870B (en) | A kind of remote software online upgrading information automatic identification management method | |
CN109905366A (en) | Terminal device safe verification method, device, readable storage medium storing program for executing and terminal device | |
US20240031407A1 (en) | Honeypot Network Management Based on Probabilistic Detection of Malicious Port Activity | |
CN108363931A (en) | A kind of method and device that isolation area file is restored | |
CN107657181A (en) | A kind of database manipulation blocking-up method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181221 |