Mitigation of injection security attacks against non-relational databases
First Claim
1. A computer-implemented method, comprising:
- integrating a database driver layer with a security layer;
setting a trigger associated with the security layer to implement a learning phase of the security layer;
in response to enabling the trigger, receiving a plurality of queries and query parameters associated with the respective queries;
for each query of at least a subset of the plurality of queries, identifying a previously-stored security pattern from a plurality of security patterns based on the query and the associated one or more query parameters;
resetting the trigger associated with the security layer to implement an execution of the security patterns;
in response to resetting the trigger, receiving an additional query and one or more additional query parameters associated with the additional query;
identifying a particular security pattern from the plurality of security patterns that is associated with the additional query and the additional one or more query parameters; and
determining that at least one of the additional query parameters does not match a corresponding query parameter of the particular security pattern.
1 Assignment
0 Petitions
Accused Products
Abstract
For mitigation of injection security attacks against non-relational databases, a database driver layer is integrated with a security layer. A trigger associated with the security layer is set to implement a learning phase of the security layer. In response to enabling the trigger, queries and query parameters associated with the respective queries are received. For the queries, a previously-stored security pattern is identified based on the query and the associated query parameters. The trigger associated with the security layer is reset to implement an execution of the security patterns. In response to resetting the trigger, an additional query and additional query parameters associated with the additional query is received. A particular security pattern is identified that is associated with the additional query and the additional query parameters. At least one of the additional query parameters is determined to not match a corresponding query parameter of the particular security pattern.
17 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
integrating a database driver layer with a security layer; setting a trigger associated with the security layer to implement a learning phase of the security layer; in response to enabling the trigger, receiving a plurality of queries and query parameters associated with the respective queries; for each query of at least a subset of the plurality of queries, identifying a previously-stored security pattern from a plurality of security patterns based on the query and the associated one or more query parameters; resetting the trigger associated with the security layer to implement an execution of the security patterns; in response to resetting the trigger, receiving an additional query and one or more additional query parameters associated with the additional query; identifying a particular security pattern from the plurality of security patterns that is associated with the additional query and the additional one or more query parameters; and determining that at least one of the additional query parameters does not match a corresponding query parameter of the particular security pattern. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising:
-
integrating a database driver layer with a security layer; setting a trigger associated with the security layer to implement a learning phase of the security layer; in response to enabling the trigger, receiving a plurality of queries and query parameters associated with the respective queries; for each query of at least a subset of the plurality of queries, identifying a previously-stored security pattern from a plurality of security patterns based on the query and the associated one or more query parameters; resetting the trigger associated with the security layer to implement an execution of the security patterns; in response to resetting the trigger, receiving an additional query and one or more additional query parameters associated with the additional query; identifying a particular security pattern from the plurality of security patterns that is associated with the additional query and the additional one or more query parameters; and determining that at least one of the additional query parameters does not match a corresponding query parameter of the particular security pattern. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-implemented system, comprising:
-
one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising; integrating a database driver layer with a security layer; setting a trigger associated with the security layer to implement a learning phase of the security layer; in response to enabling the trigger, receiving a plurality of queries and query parameters associated with the respective queries; for each query of at least a subset of the plurality of queries, identifying a previously-stored security pattern from a plurality of security patterns based on the query and the associated one or more query parameters; resetting the trigger associated with the security layer to implement an execution of the security patterns; in response to resetting the trigger, receiving an additional query and one or more additional query parameters associated with the additional query; identifying a particular security pattern from the plurality of security patterns that is associated with the additional query and the additional one or more query parameters; and determining that at least one of the additional query parameters does not match a corresponding query parameter of the particular security pattern. - View Dependent Claims (20)
-
Specification