Security in database management system using machine learning

被引:0
|
作者
Deepa, M. [1 ]
Dhilipan, J. [1 ]
机构
[1] SRM Inst Sci & Technol, Fac Sci & Humanities, Dept Comp Sci & Applicat, Chennai 600089, Tamil Nadu, India
关键词
database security'; security techniques; database threats; integrity; machine learning; INTRUSION DETECTION;
D O I
10.1504/IJESDF.2024.136024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The term 'database security' refers to the collection of rules, tools, and processes that have been developed to maintain and protect the databases' confidentiality, integrity, and accessibility. The use of machine learning to improve database management security is becoming more common. The fundamental goal of employing machine learning in security is to make the process of malware detection more actionable, scalable, and successful than conventional techniques, which need the participation of humans. This may be accomplished by making the process more automated. The process entails overcoming problems posed by machine learning, which need to be managed in an effective, logical, and theoretical manner. Machine learning algorithm is applied in the critical paths of the tuner. The optimum configuration for the proposed system yields a throughput boost of between 22% and 35% and a latency reduction of around 60%. The method is robust to various attacks.
引用
收藏
页码:124 / 133
页数:11
相关论文
共 50 条
  • [21] Automatic Database Index Tuning Using Machine Learning
    Valavala, Mounicasri
    Alhamdani, Wasim
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 523 - 530
  • [22] An Real Time Cloud Security System and Issues comparison using Machine and Deep Learning
    Srikanth, N.
    Jacob, T. Prem
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 523 - 529
  • [23] Database System Security and Security Evaluation
    Gong Yishan
    Yue Guanghong
    RECENT ACHIEVEMENT ON MERGING SUPPLY CHAIN AND E-COMMERCE IN CHINA, 2009, : 130 - 133
  • [24] Analysis of Security of Split Manufacturing using Machine Learning
    Zhang, Boyu
    Magana, Jonathon Crandall
    Davoodi, Azadeh
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [25] Analysis of Security of Split Manufacturing Using Machine Learning
    Zeng, Wei
    Zhang, Boyu
    Davoodi, Azadeh
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) : 2767 - 2780
  • [26] Improving Network Security Using Machine Learning Techniques
    Akbar, Shaik
    Chandulal, J. A.
    Rao, K. Nageswara
    Kumar, G. Sudheer
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 76 - 80
  • [27] A Comprehensive Analysis of Network Security Attack Classification using Machine Learning Algorithms
    Alqahtani, Abdulaziz Saeed
    Altammami, Osamah A.
    Haq, Mohd Anul
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (04) : 1269 - 1280
  • [28] Security Enhancement in Healthcare Cloud using Machine Learning
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 : 388 - 397
  • [29] Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
    Koay, Abigail M. Y.
    Ko, Ryan K. L.
    Hettema, Hinne
    Radke, Kenneth
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2023, 60 (02) : 377 - 405
  • [30] Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
    Olowononi, Felix O.
    Rawat, Danda B.
    Liu, Chunmei
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (01): : 524 - 552