Security test tool
First Claim
1. A test tool comprising:
- a hardware processor;
a connection engine implemented by the hardware processor and configured to connect to a first non-relational database, a second non-relational database, and a server, the first non-relational database is flushed periodically;
a transformation engine implemented by the hardware processor and configured to;
receive a first message from the first non-relational database, the first message comprises a name of a first column of a table in the first non-relational database, a type of the first column, and a first plurality of values stored in the first column, a value of the first plurality of values indicating whether a network intrusion is detected;
receive a second message from the second non-relational database, the second message comprises a name of a second column of a table in the second non-relational database, a type of the second column, and a second plurality of values stored in the second column; and
transform the second message into a JavaScript Object Notation message;
a validation engine implemented by the hardware processor and configured to;
compare the first message with a server log stored on the server;
determine, based on the comparison of the first message with the server log, that the server log includes a value that does not match any of the first plurality of values stored in the first column;
compare the JavaScript Object Notation message with the server log;
determine, based on the comparison of the JavaScript Object Notation message with the server log, that the JavaScript Object Notation message includes an error;
in response to the determination that the server log includes a value that does not match any of the first plurality of values stored in the first column and the determination that the JavaScript Object Notation message includes the error, determine that a security tool is malfunctioning;
a messaging engine implemented by the hardware processor and configured to communicate a message indicating that the server log includes a value that does not match any of the first plurality of values stored in the first column and that the second message contains the error, wherein a remedial action is performed in response to the message to repair the malfunctioning security tool.
1 Assignment
0 Petitions
Accused Products
Abstract
A test tool includes a connection engine, a transformation engine, a validation engine, and a messaging engine. The connection engine connects to a first non-relational database, a second non-relational database, and a server. The transformation engine receives first and second messages from the first and second non-relational databases and transforms the second message into a JavaScript Object Notation message. The validation engine compares the first message with a server log stored on the server to determine whether information in the first message matches information in the server log and compares the JavaScript Object Notation message with the server log to determine whether information in the second message matches information in the server log. The messaging engine communicates a message indicating that information in the first message and the second message match information in the server log.
-
Citations
9 Claims
-
1. A test tool comprising:
-
a hardware processor; a connection engine implemented by the hardware processor and configured to connect to a first non-relational database, a second non-relational database, and a server, the first non-relational database is flushed periodically; a transformation engine implemented by the hardware processor and configured to; receive a first message from the first non-relational database, the first message comprises a name of a first column of a table in the first non-relational database, a type of the first column, and a first plurality of values stored in the first column, a value of the first plurality of values indicating whether a network intrusion is detected; receive a second message from the second non-relational database, the second message comprises a name of a second column of a table in the second non-relational database, a type of the second column, and a second plurality of values stored in the second column; and transform the second message into a JavaScript Object Notation message; a validation engine implemented by the hardware processor and configured to; compare the first message with a server log stored on the server; determine, based on the comparison of the first message with the server log, that the server log includes a value that does not match any of the first plurality of values stored in the first column; compare the JavaScript Object Notation message with the server log; determine, based on the comparison of the JavaScript Object Notation message with the server log, that the JavaScript Object Notation message includes an error; in response to the determination that the server log includes a value that does not match any of the first plurality of values stored in the first column and the determination that the JavaScript Object Notation message includes the error, determine that a security tool is malfunctioning; a messaging engine implemented by the hardware processor and configured to communicate a message indicating that the server log includes a value that does not match any of the first plurality of values stored in the first column and that the second message contains the error, wherein a remedial action is performed in response to the message to repair the malfunctioning security tool. - View Dependent Claims (2, 3)
-
-
4. A method comprising:
-
connecting, by a hardware processor, to a first non-relational database, a second non-relational database, and a server, the first non-relational database is flushed periodically; receiving, by a hardware processor, a first message from the first non-relational database, the first message comprises a name of a first column of a table in the first non-relational database, a type of the first column, and a first plurality of values stored in the first column, a value of the first plurality of values indicating whether a network intrusion is detected; receiving, by a hardware processor, a second message from the second non-relational database, the second message comprises a name of a second column of a table in the second non-relational database, a type of the second column, and a second plurality of values stored in the second column; transforming, by a hardware processor, the second message into a JavaScript Object Notation message; comparing, by a hardware processor, the first message with a server log stored on the server; determining, based on the comparison of the first message with the server log, that the server log includes a value that does not match any of the first plurality of values stored in the first column; comparing, by a hardware processor, the JavaScript Object Notation message with the server log; determining, based on the comparison of the JavaScript Object Notation message with the server log, that the JavaScript Object Notation message includes an error; in response to the determination that the server log includes a value that does not match any of the first plurality of values stored in the first column and the determination that the JavaScript Object Notation message includes the error, determining that a security tool is malfunctioning; communicating, by a hardware processor, a message indicating that the server log includes a value that does not match any of the first plurality of values stored in the first column and that the second message contains the error, wherein a remedial action is performed in response to the message to repair the malfunctioning security tool. - View Dependent Claims (5, 6)
-
-
7. A system comprising:
-
a first non-relational database that is flushed periodically; a second non-relational database; a server; a security tool; and a test tool comprising a hardware processor configured to implement; a transformation engine configured to; receive a first message from the first non-relational database, the first message comprises a name of a first column of a table in the first non-relational database, a type of the first column, and a first plurality of values stored in the first column, a value of the first plurality of values indicating whether a network intrusion is detected; receive a second message from the second non-relational database, the second message comprises a name of a second column of a table in the second non-relational database, a type of the second column, and a second plurality of values stored in the second column; and transform the second message into a JavaScript Object Notation message; a validation engine configured to; compare the first message with a server log stored on the server; determine, based on the comparison of the first message with the server log, that the server log includes a value that does not match any of the first plurality of values stored in the first column; compare the second JavaScript Object Notation message with the server log; determine, based on the comparison of the JavaScript Object Notation message with the server log, that the JavaScript Object Notation message includes an error; in response to the determination that the server log includes a value that does not match any of the first plurality of values stored in the first column and the determination that the JavaScript Object Notation message includes the error, determine that a security tool is malfunctioning; a messaging engine configured to communicate a message indicating that the server log includes a value that does not match any of the first plurality of values stored in the first column and that the second message contains the error, wherein a remedial action is performed in response to the message to repair the malfunctioning security tool. - View Dependent Claims (8, 9)
-
Specification