Font Size: a A A

Finance Database Operation Behavior Monitoring Trace System Research And Implementation

Posted on:2014-10-10Degree:MasterType:Thesis
Country:ChinaCandidate:Y H ZhouFull Text:PDF
GTID:2268330428466644Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The recent years witnessed a number of security incident relating to the operationmanagement of database in the banks, such as account password disclosure caused bythe divulged internal data of banks, credit card forgery caused by the embezzled creditcard information, the declining competitive force caused by the divulged c onfidentialinternal data of the enterprises and so on. Although a majority of information systemshave already taken some actions to protect the database, only safeguarding is far frombeing enough. Therefore, the problems of how to do accurate positionin g tovulnerability of system attacked, how to restore data, how to obtain the evidence ofattacker’s trace and so on, gradually become the significant research subjects of safedatabase operation.This article studies the trace monitoring strategy and safe ty audit method ofdatabase security, designs and realizes database operating trace based on informationcenter of Hunan Rural Credit Cooperative. The main researches are as follows:First, this article studies the strategy and method of database safety au dit withouttriggering the self-audit function of database and increasing the burden of databaseserver running. Therefore, it can be realized to monitor the trace and do safety auditof the database on the condition of nothing changed in the software fram e of theapplication system.Second, this article studies how to make sure the traces of both suspiciousvisiting and operating actions of the database can be recorded in the process ofmonitoring trace of database. The traceability of abnormal actions can be achieved.Third, this article proposes and designs the early warning model for the specificsuspicious visiting actions. Once such actions occur, it can discover and warn therelative inspectors to exam the system in time.In conclusion, in the process of applying this research result in the monitor and safetyaudit in the large scale database operation of Hunan Rural Credit Cooperative, the systemcan provide users with real-time, efficient, easy to operate, size scalable, extensible,low-cost database security auditing solution without lowering the target databaseperformance and running database self-auditing functions. It can provide practicalreference for similar products research and applications improvement in the future.
Keywords/Search Tags:Metadata, Safety Audit, Data filtering, Monitoring trace
PDF Full Text Request
Related items