Font Size: a A A

The Research And Implementation Of The Parse Of The TNS Protocol Based On Database Audit System

Posted on:2016-03-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z WangFull Text:PDF
GTID:2308330470972049Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of computer networks, database security is becoming more and more important. The database itself has a safe mechanism to ensure the integrity of user data, correctness, but no one system will always be safe. Attacker or unauthorized users always want to operate the database in a non-formal way, so it is significant to record a variety of operations that users do in the database.This paper proposes a new audit system to record user’s actions, which is based on the formula bypass monitoring access to the network by setting policies for a variety of database systems security audit. The advantage is that the former does not affect the communication between the client and the database server, and database problems also affect less than database auditing systems. The database audit system supports a variety of mainstream database audit, the State Grid Corporation has now entered the test phase.In this paper, Oracle database communication protocol TNS (Transparent Network Substrate Potocol) as an example to introduce the audit system, the first to study TNS protocol analysis by using WireShark capture tool for studying the structure of TNS packet, test the uncertain programming fields and to study the source code provided by Oracle to finalize the analysis of TNS. In this paper, in the framework agreement to outline for TNS, which it presented the network level position, and then design a framework based on network flow model audit system. Then complete database auditing system programming work, the results will get displayed. TNS protocol parsing makes Oracle database security audit enter a new stage. The protocol on the three-tier network model, will have its own communication mechanism. There is little existing data that carrries out a detailed analysis, so this task is completed analysis of the security audit database system to make a certain contribution.
Keywords/Search Tags:Database Audit, TNS Protocol, Oracle Database, Databas Security
PDF Full Text Request
Related items