Database security solutions for Int家都ernet industry
Industry pain points and needs

In June this year, AC fun barrage vid器公eo network (commonly known as sta關如tion a) announced that the website was黃很 attacked by hackers, and near書著ly 10 million user data were leaked,嗎下 including user ID, user nickna兵謝me, encrypted stored password and分朋 other information. According to the an數拍nouncement on user data leakage cau光兵sed by hacker attack on AC fun publishe人店d on the official website of statio也多n a, station a upgraded the user acco人錢unt system on July 7, 2017. How也計ever, if the user has not logge她森d in to the website after this time, o高河r the password encryption strength is n對一ot enough, the account will still be子水 at risk of disclosure.


In recent years, data leakage incident道森s have emerged one after another. From有睡 the disclosure of Yahoo's 3 billion 坐頻users' information in 2017, the theft o跳店f Uber's 57 million user accounts,小下 to the disclosure of employee informat音哥ion of the U.S. Department of homeland 放木security at the beginning of the木紙 new year in 2018, it can be de慢花scribed as wave after wave. This tim窗兒e, even the second world can not 山嗎be spared. Looking at these data 司車leakage events, most of them poin老睡t to a highly confrontational field in事技 Information Security: Web applicati森友on security and database security behin是嗎d it.



In May this year, Verizon just release自對d the 2018 data leakage invest明火igation report, which is also the 11上視th data leakage investigation report裡空 continuously released by Veriz雜空on. In this year's report, the Veri到睡zon team analyzed a total of 5地通3000 incidents and 2216 confirmed da慢你ta leakage incidents, and analy你房zed in detail the common attack met又城hods in data leakage incidents.謝信 The report points out that in these l中費eaks, most attacks point to web app什中lications: for example, in the infor花輛mation industry, 45 of the 49 leaks wer到海e achieved through attacks on We謝藍b applications, accounting for動線 more than 90%. It can be seen that 土姐web application security has been 玩腦the forefront of data leakage eve低制nts. A large number of penetration inj在聽ection, detection, database collis媽上ion and information theft occur be跳紙tween web servers and databases. The 資門Internet of mutual funds, social商學 networking, games and entertainment 金舊travel has been involved in every cor但通ner of our daily life. For these頻問 enterprises, the registered user dat們大a, as the core information asset of人光 the website owner, involves the 厭拿substantive business of the website and飛舊 related information systems. On亮視ce leaked, it will not only cause費到 losses in economic interests, Ther跳兒e will also be a huge crisis of cond視得emnation and trust.



First of all, the application of data看讀base is very complex and difficult t北國o master. Many database administrato舊中rs are busy managing complex systems資呢 and neglect the inspection of security的聽 risks and improper configuration,低子 such as the control of database離美 access rights, shared accounts, a遠聽ccess with privileged accounts SA遠少 and system, and command execution. 要區This is because the traditiona學子l security system largely igno見也res the topic of database security那妹, and database administrators us雪做ually do not take security as th弟水eir primary task.


Secondly, the increasing importance of 子玩data has also led to attacks on the da場見tabase by some illegal personn算廠el. Attackers usually attack the美亮m through SQL injection, apt and 地什other attack methods. These vulnerabili南空ties often do not exist at the datab東農ase level. On the middleware, traditio鄉一nal WAF and data cleaning have their ow少拿n limitations in dealing with 人妹such flexible attack methods, Ca現廠n't be 100% safe.



Our programme

At present, the mainstream relati如睡onal databases in the world, such 師用as Oracle, Sybase, Microsoft SQL serv雜身er and IBM DB2 / Informix, have the 窗謝following characteristics: user acco東些unt and password, verification syst開下em, priority model and special per錢制mission of control database, built-in 醫讀commands (stored procedures, trigge學爸rs, etc.), unique script and programmin錢站g language (e.g. PL / SQL, transa快都ction SQL, OEMC, etc.) , middleware,作離 network protocol, powerful dat一聽abase management utilities and develo好個pment tools. Security measures in the 妹著database field usually include:懂相 identity identification and aut自樂hentication, independent access control南中 and mandatory access control, 輛玩secure transmission, system audit,但校 database storage encryption, e分姐tc. only by integrating all aspec她說ts of security can a highly secur唱都e system be ensured.



Palladium next generation database applicati城很on security defense system (ngdap) I問報t is a new generation of data protec歌生tion system developed by Hangzhou個計 Palladium Network Technology Co., Ltd. ngdap司銀 collects, analyzes and identifies the路女 data flow accessing the database計物. It monitors the operation st看車atus of the database in real ti美下me, records a variety of database acc店大ess behaviors, finds abnormal acc快件ess to the database and blocks 照國it in time.



Network firewall



The database network firewall is ma件機inly based on the control of networ地術k behavior and is realized base舞放d on TCP quintuple. It carries out poli小們cy control according to the sourc商他e address, target address, source po文動rt, target port and transport l和音ayer protocol in the quintuple.



Access firewall



Solidify access access rules t明人hrough self-learning of white list在海 (automatically learn the five el問市ements of database access behavior街低 - access source address exception, 暗會access source host name exceptio聽飛n, access source user name exception, 畫物access tool name exception, login a書民ccount name exception, solidify securit體愛y rules) , the unmatched database acce鄉姐ss behavior will carry out real-time購議 early warning and block the ses舊資sion. Without affecting the perfor答紙mance and modifying the database, 器河it will continuously track all databas著喝e operations to identify unauthoriz件間ed or suspicious activities and blo金房ck them in time, so as to avoid network物和 attacks on the database and fu門雪ndamentally solve the threat of malicio年個us access to the database.



Behavior firewall



It can accurately track the us畫懂er's SQL statement commands, control t好師he source, target database, targe間黑t table and specified behavior, a購日nd prevent high-risk illegal ope拿會rations and misoperations.


Service firewall


In the learning phase, it will rec就睡ord, analyze and count the query亮多 requests sent by all applications, 嗎上and automatically add them to t影店he white list. Users can confirm an朋微d adjust the contents of the white li到機st. After switching to the acti校東ve defense mode, the database firewal討司l will first standardize the request d村拍ata, and then send the processe兒你d data to the pattern matching engin房低e to match the white name Compa自厭re the data in the order. If it ma問南tches the relevant rules, it is consid學是ered a legal request, and the dat我我a will be passed to the real database 訊從for query and finally returned to t家身he application; if it does not match t亮員he relevant rules, it will give an alar技數m or block the response to com森近pletely solve SQL injection, apt 慢化and other attacks.



Customer Benefits

1. Identify unauthorized or susp爸頻icious activities by continuously 用討tracking all database operations wit相問hout affecting performance and民日 modifying the database, and b站在lock them in time to avoid network at美靜tacks on the database;


2. Improve the user's convenie都微nce of database security management, 習數and also improve the user's risk contr區動ol and compliance ability;


3. Ensure the security and integrit就就y of enterprise business system da購場ta;


4. Set up a defense line around the d男森atabase, so as to "resist the ene黑快my outside the country" and suppo照森rt the "umbrella" for enterprise土城 business security.


Classic cases
  • 鬥魚科技
  • 一嗨租車(chē)
  • 途家網
  • 連連支付
  • 東方有線
Copyright © 2019 All Rights Reserv上紙ed Designed
Hangzhou pldsec Network Technolog玩日y Co