But the traditional database audit system is always only a simple log system without the ability of analyzing the log records.
然而传统的数据库审计系统往往只是一个简单的日志系统,而并不具备对日志进行分析的能力。
For example, if you only needed to audit database connection and system administration event types, you would only specify the VALIDATE and SYSADMIN event types when configuring the facility.
例如,如果只需要审计数据库连接和系统管理事件类型,那么在配置审计功能时应该仅指定VALIDATE和SYSADMIN事件类型。
Due to the large amount of data in the audit log table, a single INSERT statement will usually fail because the data per transaction exceeds the log file size of the database system.
因为审核日志表格里有大量的数据,单独的insert语句通常会失败,这是因为每个事务的数据超过了数据库系统里的日志文件的容量。
When you run queries for very large audit log tables, you can end up with a situation where your database system has to read thousands of pages into the bufferpool to compute the result.
当您在大型审核日志表格中运行查询功能时,您可能会在您的数据库系统不得不向缓冲池读入数千页面以进行计算时而结束。
The probes monitor all database transactions, including those of privileged users, at the operating system kernel level without relying on database audit logs.
探测器在操作系统内核级上监视所有数据库事务,包括特权用户的事务,而不依赖于数据库审计日志。
Writing audit log events is comparable to writing database log records in a database system.
编写审核日志事件可比作在数据库系统中编写数据库日志记录。
However, be aware that the database system has to maintain these indexes and this, particularly for audit logging, slows down the overall performance of process navigation if audit logging is enabled.
但是,应该知道数据库系统必须要维持这些索引,并且该操作,尤其是对于审核的记录来说,在审核记录已启用的情况下会减慢整个系统的性能。
Yet trading systems invariably have application and database system audit tables.
交易系统总会有应用程序审核以及数据库审核表。
To develop a database management system at or above B2 level, we must audit the use of covert storage channels.
开发具有B2安全级及以上的数据库管理系统必须对存储隐通道进行审计。
The reduction model can reduce the amount of audit trails and improve the efficiency of database system effectively.
该模型能够有效降低审计踪迹规模,提高数据库系统效率。
This paper presents a model of database intrusion detection system, which USES data mining on the audit data in database systems to derive user profiles that describe normal behavior of users.
提出了一种数据库入侵检测模型,利用该模型对数据库审计信息进行挖掘,以发现代表合法用户典型行为的用户轮廓。
This paper presents a model of database intrusion detection system, which USES data mining on the audit data in database systems to derive user profiles that describe normal behavior of users.
提出了一种数据库入侵检测模型,利用该模型对数据库审计信息进行挖掘,以发现代表合法用户典型行为的用户轮廓。
应用推荐