刷存在感是什么意思| 试管婴儿是什么| 贫嘴是什么意思| 樱花是什么样子的| 秋天什么水果成熟| 什么是双| 一晚上尿五六次是什么原因| 口腔扁平苔藓吃什么药好得快| 喝牛奶什么时候喝最好| 植物园里有什么植物| 什么菜好消化又养胃| 吻合是什么意思| 什么是植物神经紊乱| 黑乎乎的什么| 什么是心率| 大便发绿色是什么原因| 前什么后什么| 头眩晕看什么科| 最贵的烟是什么牌子| 69年属什么| 哈密瓜苦是什么原因| 小便无力吃什么药| 安五行属性是什么| 摸鱼什么意思| 蛆长什么样子| 粉色象征着什么| 股骨长是指什么| 总胆汁酸高是什么意思| b是什么牌子| 活好的女人有什么表现| 淘宝什么时候有活动| 窦是什么意思| 宝宝肠炎吃什么药| 什么的绿叶| 喜欢穿黑色衣服的女人是什么性格| 越睡越困是什么原因| 送护士女朋友什么礼物| 陈皮是什么水果的皮| 铁饱和度低什么原因| 什么是疣体| 食色性也是什么意思| 脸上长闭口是什么原因导致的| 怀孕什么时候吃鹅蛋最好| 脾脏结节一般是什么病| 高脂血症是什么病| 子宫癌是什么症状| 肥大肾柱是什么意思| 拉肚子吃什么| 相安无事什么意思| 大便臭是什么原因| 貂蝉原名叫什么| 吃什么改善睡眠| 什么叫基因突变| 肝虚吃什么中成药| 升学宴选什么日子好| 热疹用什么药膏最好| 什么的笑| 皮肤黑是什么原因| 甲亢病是什么病| 倾注是什么意思| 什么水果可以美白| 12月16是什么星座| 九头身是什么意思| rps是什么| 过敏是什么样子的| 一路卷风迎大年是什么生肖| 口腔溃疡吃什么水果好| 蜂蜜为什么不会变质| 黑科技是什么| 褪黑素有什么副作用| 红薯什么时候传入中国| 小清新是什么意思啊| 抗链o高是什么原因| 消化不良吃什么水果| 肚子胀气吃什么食物| 三角巾是什么| 梦见别人穿红衣服是什么意思| kub是什么检查| 双肾盂是什么意思| 梦见别人受伤流血是什么预兆| 爆冷是什么意思| 尿道炎症吃什么药好| 蚊子爱咬什么样的人| 什么是理数| 糯米粉可以做什么好吃的| 1985年海中金命缺什么| 头发掉的多是什么原因| 月经推迟什么原因引起的| 乘风破浪是什么意思| 神经过敏是什么意思| 阳离子是什么面料| 养神经吃什么食物最好| 疤痕修复用什么药膏好| 幻灭是什么意思| 沈殿霞为什么地位高| 月经来吃什么好| 心脏缺血吃什么药| 血管堵塞用什么药| 1995是什么年| 丹毒病是什么原因引起的| 骨结核是什么病| 为什么很多人不去庐山| 2005年是什么命| 组织机构代码是什么| 寓言故事有什么特点| 孕前检查挂什么科室| IOM是什么意思| 谦虚的近义词是什么| 1997年属牛是什么命| prn医学上是什么意思| 为什么加油站不能打电话| 屋漏偏逢连夜雨是什么意思| 肛周湿疹用什么药| 专柜是什么意思| 花千骨最后结局是什么| 怀男孩和女孩有什么区别| 错构瘤是什么| 嗓子发炎吃什么水果| 不来事是什么原因| 398是什么意思| 十月二十八是什么星座| 平安果什么时候吃| 观音菩萨是属什么生肖| 膜性肾病什么意思| 马来西亚属于什么国家| wilson是什么意思| 喝茶水对身体有什么好处| louisvuitton什么牌子| 什么是三级片| 七月八号是什么星座| 午餐肉炒什么菜好吃| 一年一片避孕药叫什么| 柏油样便见于什么病| 盆腔炎检查什么项目| 昭觉寺求什么最灵验| 老母鸡煲汤放什么食材补气补血| 阿奇霉素主治什么病| 鬼迷日眼是什么意思| 一九八七年属什么生肖| 五心烦热是什么症状| 丹田是什么意思| 热敷肚子有什么好处| 女性解脲支原体阳性吃什么药| 3月30日什么星座| 老虔婆是什么意思| 高考用什么笔| 为什么长不胖一直很瘦| 寿眉茶属于什么茶| 宝宝益生菌什么时候吃最好| 梦到跟人吵架是什么意思| 太燃了是什么意思| 什么是对食| 金字旁加全字念什么| 两重天什么意思| 清款是什么意思| 吃什么可以祛痘排毒| 7月8号什么星座| 喝椰子汁有什么好处| 腊肉炒什么最好吃| 7月1日是什么日子| 奇门遁甲什么意思| 绞丝旁奇念什么| 3月27号是什么星座| 睡觉趴着睡什么原因| 化疗是什么意思| 唐朝灭亡后是什么朝代| 幕后是什么意思| 睡觉容易惊醒是什么原因| 蜂蜜水什么时候喝好| 一拃长是什么意思| gfr是什么意思| 脸热发红是什么原因| 什么是蝴蝶效应| 什么情况属于诈骗| rpr阴性是什么意思| 同房肚子痛是什么原因| 放血有什么好处| 1993年出生的属什么| 上面一个山下面一个今读什么| ic50是什么意思| 花苞裤不适合什么人穿| tvoc是什么意思| 感冒发烧可以吃什么水果| 阴虚阳亢吃什么中成药| 银耳长在什么地方| 胃溃疡吃什么食物好| 嘴唇薄的男人面相代表什么意味| 龙马精神代表什么生肖| 什么是abo| 1978年属什么生肖| 腰椎退变是什么意思| 办身份证需要什么| 血清铁是什么意思| 膀胱尿潴留是什么意思| 11月10号是什么星座| 绦是什么意思| 不良反应是什么意思| 大便不成形用什么药| 发小是什么意思| 懒散是什么意思| 肝功能四项检查什么| 吃什么对胆囊有好处| 西瓜禁忌和什么一起吃| 断档是什么意思| 花胶是什么鱼的鱼肚| 卢字五行属什么| 火车代表什么生肖| 消化不良反酸吃什么药| 好饭不怕晚什么意思| 小腿酸软无力是什么原因| 做照影是检查什么| 晕车药吃多了有什么副作用| amiri是什么牌子| ofs是什么意思| 凉面配什么菜好吃| cln是什么意思| 什么的阳光| 萤火虫吃什么食物| 办理健康证需要带什么| 组织细胞是什么| 8月23是什么星座的| 何以笙箫默是什么意思| 白介素高说明什么| 老打喷嚏是什么原因| 违心的话是什么意思| 透明的什么| 四九城是什么意思| 21速和24速有什么区别| 头七有什么规矩| 惢是什么意思| 世界上最长的蛇是什么| 孩子贫血吃什么补血最快| 小孩抵抗力差吃什么提高免疫力| 什么猪没有嘴| 梦见自己生病了是什么意思| 为什么十五的月亮十六圆| 月经量少吃什么调理快| 绿豆和什么一起煮好| 小猫来家里有什么预兆| 养胃喝什么| 子衿是什么意思| 逼长什么样| 伤感是什么意思| 今天买什么股票| 什么颜色不显黑| 血虚是什么意思| 济南有什么特产| 土命和什么命最配| 为什么家里会有蚂蚁| 氯化钠是什么| 兔子不吃窝边草是什么意思| 宝五行属什么| 胸部彩超能检查出什么| 肾炎可以吃什么水果| 手足口病有什么危害| 公分的单位是什么| 两个a型血的人生的孩子什么血型| 女人什么时候排卵| 猕猴桃和什么榨汁好喝| 动态心电图能检查出什么病| 周莹是什么电视剧| 康宽杀虫剂能杀什么虫| 印度人信仰什么教| 高中生适合用什么手机| 百度Jump to content

韩国争议中启动“萨德”部署 被批为美日出卖国家利益

From Wikipedia, the free encyclopedia
百度 这就是‘一带一路’的意义。

Database Activity Monitoring (DAM, a.k.a. Enterprise database auditing and Real-time protection[1]) is a database security technology for monitoring and analyzing database activity. DAM may combine data from network-based monitoring and native audit information to provide a comprehensive picture of database activity. The data gathered by DAM is used to analyze and report on database activity, support breach investigations, and alert on anomalies. DAM is typically performed continuously and in real-time.

Database activity monitoring and prevention (DAMP) is an extension to DAM that goes beyond monitoring and alerting to also block unauthorized activities.

DAM helps businesses address regulatory compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley Act (SOX), U.S. government regulations such as NIST 800-53, and EU regulations.

DAM is also an important technology for protecting sensitive databases from external attacks by cybercriminals. According to the 2009 Verizon Business’ Data Breach Investigations Report—based on data analyzed from Verizon Business’ caseload of 90 confirmed breaches involving 285 million compromised records during 2008—75 percent of all breached records came from compromised database servers.

According to Gartner, “DAM provides privileged user and application access monitoring that is independent of native database logging and audit functions. It can function as a compensating control for privileged user separation-of-duties issues by monitoring administrator activity. The technology also improves database security by detecting unusual database read and update activity from the application layer. Database event aggregation, correlation and reporting provide a database audit capability without the need to enable native database audit functions (which become resource-intensive as the level of auditing is increased).”[2]

According to a survey by the Independent Oracle User Group (IOUG), “Most organizations do not have mechanisms in place to prevent database administrators and other privileged database users from reading or tampering with sensitive information in financial, HR, or other business applications. Most are still unable to even detect such breaches or incidents.”

Forrester refers to this category as “database auditing and real-time protection”.[1]

Common use cases for DAM

[edit]

Privileged User Monitoring: Monitoring privileged users (or superusers), such as database administrators (DBAs), systems administrators (or sysadmins), developers, help desk, and outsourced personnel – who typically have unfettered access to corporate databases – is essential for protecting against both external and internal threats. Privileged user monitoring includes auditing all activities and transactions; identifying anomalous activities (such as viewing sensitive data, or creating new accounts with superuser privileges); and reconciling observed activities (such as adding or deleting tables) with authorized change requests.

Since most organizations are already protected at the perimeter level, indeed a major concern lies with the need to monitor and protect from privileged users. There is a high correlation therefore between database security and the need to protect from the insider threat. This is a complex task as most privileged users are capable of using sophisticated techniques to attack the database - stored procedures, triggers, views and obfuscated traffic - attacks that may be difficult to detect using traditional methods.

In addition, since targeted attacks frequently result in attackers gaining privileged user credentials, monitoring of privileged activities is also an effective way to identify compromised systems.

As a result, auditors are now demanding monitoring of privileged users for security best practices as well as a wide range of regulations. Privileged user monitoring helps ensure:

? Data privacy, so that only authorized applications and users are viewing sensitive data. ? Data governance, so that critical database structures and values are not being changed outside of corporate change control procedures.

Application Activity Monitoring: The primary purpose of application activity monitoring is to provide a greater level of end-user accountability and detect fraud (and other abuses of legitimate access) that occurs via enterprise applications, rather than via direct access to the database.

Multi-tier enterprise applications such as Oracle EBS, PeopleSoft, JD Edwards, SAP, Siebel Systems, Business Intelligence, and custom applications built on standard middle-tier servers such as IBM WebSphere and Oracle WebLogic Server mask the identity of end-users at the database transaction level. This is done with an optimization mechanism known as “connection pooling.” Using pooled connections, the application aggregates all user traffic within a few database connections that are identified only by a generic service account name. Application activity monitoring allows organizations to associate specific database transactions with particular application end-users, in order to identify unauthorized or suspicious activities.

End-user accountability is often required for data governance requirements such as the Sarbanes–Oxley Act. New auditor guidance from the Public Company Accounting Oversight Board for SOX compliance has also increased the emphasis on anti-fraud controls.

Cyberattack Protection: SQL injection is a type of attack used to exploit bad coding practices in applications that use relational databases. The attacker uses the application to send a SQL statement that is composed from an application statement concatenated with an additional statement that the attacker introduces.[3]

Many application developers compose SQL statements by concatenating strings and do not use prepared statement; in this case the application is susceptible to a SQL injection attack. The technique transforms an application SQL statement from an innocent SQL call to a malicious call that can cause unauthorized access, deletion of data, or theft of information.[3]

One way that DAM can prevent SQL injection is by monitoring the application activity, generating a baseline of “normal behavior”, and identifying an attack based on a divergence from normal SQL structures and normal sequences. Alternative approaches monitor the memory of the database, where both the database execution plan and the context of the SQL statements are visible, and based on policy can provide granular protection at the object level.

Core features of DAM

[edit]

As defined by Gartner, “DAM tools use several data collection mechanisms (such as server-based agent software and in-line or out-of-band network collectors), aggregate the data in a central location for analysis, and report based on behaviors that violate the security policies and/or signatures or indicate behavioral anomalies. DAM demand is driven primarily by the need for privileged user monitoring to address compliance-related audit findings, and by threat-management requirements to monitor database access. Enterprise DAM requirements are beginning to broaden, extending beyond basic functions, such as the capability to detect malicious activity or inappropriate or unapproved database administrator (DBA) access.” [4]

More advanced DAM functions include:

  • The ability to monitor intra-database attacks and back-doors in real time (such as stored procedures, triggers, views, etc.)
  • A solution which is agnostic to most IT infrastructure variables - such as encryption or network topology
  • Blocking and prevention, without being in-line to the transactions
  • Active discovery of at-risk data
  • Improved visibility into application traffic
  • The ability to offer database activity monitoring in virtualized environments, or even in the cloud, where there is no well-defined or consistent network topology

Some enterprises are also seeking other functions, including:

  • Configuration auditing to comply with audits required by the U.S. Sarbanes–Oxley Act
  • DLP capabilities that address security concerns, as well as the data identification and protection requirements of the Payment Card Industry (PCI) and other data-centric regulatory frameworks
  • Database user rights attestation reporting, required by a broad range of regulations
  • The ability to offer database activity monitoring in virtualized environments, or even in the cloud, where there is no well-defined or consistent network topology
  • Better integration with vulnerability scanning products

Common DAM architectures

[edit]

Interception-based: Most modern DAM systems collect what the database is doing by being able to “see” the communications between the database client and the database server. What DAM systems do is find places where they can view the communication stream and get the requests and responses without requiring participation from the database. Database Security Proxy is a non-intrusive method for DAM. The interception itself can be done also at multiple points such as the database memory (e.g. the SGA), at the network (using a network TAP or a SPAN port if the communication is not encrypted), at the operating system level, or at the level of the database libraries.[3]

If there is unencrypted network traffic, then packet sniffing can be used. The advantage is that no processing is done on the host, however the main disadvantage is that both local traffic and sophisticated intra-database attacks will not be detected. To capture local access some network based vendors deploy a probe that runs on the host. This probe intercepts all local access and can also intercept all networked access in case you do not want to use network gear or in case the database communications are encrypted. However, since the agent does not do all the processing — instead it relays the data to the DAM appliance where all the processing occurs — it may impact network performance with all of the local traffic and real-time session termination may be too slow to interrupt unauthorized queries.

Memory-based: Some DAM systems have a lightweight sensor that attaches to the protected databases and continuously polls the system global area (SGA) to collect SQL statements as they are being performed. A similar architecture was previously used by performance optimization products that also used the SGA and other shared data structures.[3]

In the latest versions of this technology a lightweight sensor runs on the host and attaches to the process at the OS level to inspect private data structures. The advantages of this approach are significant:

  • Complete coverage of all database transactions — the sensor covers traffic coming from the network, from the host, as well as from back-doors (stored procedures, triggers, views)
  • A solution that is agnostic to most IT infrastructure variables - no need to re-architect the network, to open span ports or to worry about key management if the network is encrypted, and this model can also be used to protect databases deployed in virtualized environments or in the cloud

Log-based: Some DAM systems analyze and extract the information from the transaction logs (e.g., the redo logs). These systems use the fact that much of the data is stored within the redo logs and they scrape these logs. Unfortunately, not all of the information that is required is in the redo logs. For example, SELECT statements are not and so these systems will augment the data that they gather from the redo logs with data that they collect from the native audit trails as shown in Figure 3. These systems are a hybrid between a true DAM system (that is fully independent from the DBMS) and a SIEM which relies on data generated by the database. These architectures usually imply more overhead on the database server.[3]

eBPF-based: Some DAM systems use the Linux kernel’s extended Berkeley Packet Filter (eBPF) technology to monitor database activity externally at the operating system level. These systems attach lightweight programs to relevant system calls and network events to capture query operations (such as DDL, DML, and SELECT statements) in real time, without relying on database logs or proxies. Because eBPF operates in the kernel, it provides deep visibility with minimal performance overhead and is harder for attackers to tamper with. However, Java based encrypted sessions and complex wire protocols can limit full inspection, so these systems may be combined with other methods for complete coverage.

Leading Providers

[edit]
  • Imperva [1]
  • IBM Guardium
  • Aurva.io [2]
  • Oracle

References

[edit]
  1. ^ a b "The Forrester Wave: Enterprise Database Auditing And Real-Time Protection, Q4 2007, October 2007, Jonathan Penn, Katie Smillie, Forrester Research". Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  2. ^ Pattern Discovery With Security Monitoring and Fraud Detection Technologies, Mark Nicolett, Avivah Litan, Paul E. Proctor, 2 September 2009, Gartner Inc.[dead link]
  3. ^ a b c d e HOWTO Secure and Audit Oracle 10g and 11g, Ron Ben Natan, Ph.D., CRC Press, 2009
  4. ^ Database Activity Monitoring Market Overview, Jeffrey Wheatman, Mark Nicolett, 3 February 2009, Gartner Inc.
祸不单行是什么意思 突然勃不起来是什么原因造成的 去澳门需要什么证件 红米饭是什么米 什么叫抗氧化
随喜功德是什么意思 减肥可以吃什么肉 上焦有火吃什么中成药 198是什么意思 player是什么意思
股骨头坏死挂什么科 请问支气管炎吃什么药最有效 什么是甲减 就坡下驴什么意思 孕妇建档是什么意思
馥是什么意思 埃及人是什么人种 硬不起来是什么原因 卵巢囊肿是什么意思 十八大什么时候
丁丁是什么hcv9jop1ns7r.cn 辐照食品是什么意思zhongyiyatai.com 一什么不什么四字成语hcv8jop7ns9r.cn 笔记本电脑什么牌子好hcv7jop7ns4r.cn 睡觉被口水呛醒是什么原因hcv8jop5ns9r.cn
阴茎供血不足吃什么药hcv9jop4ns4r.cn 华为什么手机好hcv8jop4ns1r.cn 心猿意马是什么意思hcv8jop1ns3r.cn 荨麻疹吃什么药好hcv9jop0ns2r.cn 兔唇是什么原因造成的hcv8jop1ns3r.cn
心脏不好的人吃什么好hcv9jop7ns1r.cn ch是什么意思hcv8jop8ns2r.cn 顾名思义的顾什么意思hcv9jop3ns1r.cn 绿茶婊什么意思96micro.com 子宫增大是什么原因造成的hcv8jop8ns0r.cn
眼睛有眼屎是什么原因引起的hcv7jop9ns0r.cn 什么是膝关节退行性变hcv8jop6ns7r.cn 星月菩提是什么材质hcv7jop5ns0r.cn 鸡蛋花的花语是什么hcv8jop7ns9r.cn 脸肿挂什么科cj623037.com
百度