Security in database management system using machine learning

被引:0
|
作者
Deepa, M. [1 ]
Dhilipan, J. [1 ]
机构
[1] SRM Inst Sci & Technol, Fac Sci & Humanities, Dept Comp Sci & Applicat, Chennai 600089, Tamil Nadu, India
关键词
database security'; security techniques; database threats; integrity; machine learning; INTRUSION DETECTION;
D O I
10.1504/IJESDF.2024.136024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The term 'database security' refers to the collection of rules, tools, and processes that have been developed to maintain and protect the databases' confidentiality, integrity, and accessibility. The use of machine learning to improve database management security is becoming more common. The fundamental goal of employing machine learning in security is to make the process of malware detection more actionable, scalable, and successful than conventional techniques, which need the participation of humans. This may be accomplished by making the process more automated. The process entails overcoming problems posed by machine learning, which need to be managed in an effective, logical, and theoretical manner. Machine learning algorithm is applied in the critical paths of the tuner. The optimum configuration for the proposed system yields a throughput boost of between 22% and 35% and a latency reduction of around 60%. The method is robust to various attacks.
引用
收藏
页码:124 / 133
页数:11
相关论文
共 50 条
  • [31] Using machine learning to assist with the selection of security controls during security assessment
    Bettaieb, Seifeddine
    Shin, Seung Yeob
    Sabetzadeh, Mehrdad
    Briand, Lionel C.
    Garceau, Michael
    Meyers, Antoine
    EMPIRICAL SOFTWARE ENGINEERING, 2020, 25 (04) : 2550 - 2582
  • [32] Applications in Security and Evasions in Machine Learning: A Survey
    Sagar, Ramani
    Jhaveri, Rutvij
    Borrego, Carlos
    ELECTRONICS, 2020, 9 (01)
  • [33] A Machine Learning Security Framework for Iot Systems
    Bagaa, Miloud
    Taleb, Tarik
    Bernabe, Jorge Bernal
    Skarmeta, Antonio
    IEEE ACCESS, 2020, 8 : 114066 - 114077
  • [34] Feasibility of Supervised Machine Learning for Cloud Security
    Bhamare, Deval
    Salman, Tara
    Samaka, Mohammed
    Erbad, Aiman
    Jain, Raj
    2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2014, : 17 - 21
  • [35] Development of a simulation result management and prediction system using machine learning techniques
    Lee, Ki Yong
    Suh, Young-Kyoon
    Cho, Kum Won
    INTERNATIONAL JOURNAL OF DATA MINING AND BIOINFORMATICS, 2017, 19 (01) : 75 - 96
  • [36] Contractual Employee Management System Using Machine Learning and Robotic Process Automation
    Parchande, Sanket
    Shahane, Aniket
    Dhore, Manikrao
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [37] A Review of Machine Learning Approaches to Power System Security and Stability
    Alimi, Oyeniyi Akeem
    Ouahada, Khmaies
    Abu-Mahfouz, Adnan M.
    IEEE ACCESS, 2020, 8 : 113512 - 113531
  • [38] Construction of a Security Vulnerability Identification System Based on Machine Learning
    Shi, Kebin
    Dai, Yonghui
    Xu, Jing
    JOURNAL OF SENSORS, 2020, 2020
  • [39] Machine Learning for IoT Devices Security Reinforcement
    Ea, Philippe
    Xiang, Jiahui
    Salem, Osman
    Mehaoua, Ahmed
    MACHINE LEARNING FOR NETWORKING, MLN 2023, 2024, 14525 : 1 - 13
  • [40] N - k Static Security Assessment for Power Transmission System Planning Using Machine Learning
    Alvarez, David L.
    Gaha, Mohamed
    Prevost, Jacques
    Cote, Alain
    Abdul-Nour, Georges
    Meango, Toualith Jean-Marc
    ENERGIES, 2024, 17 (02)