Utilizing Vector Database Management Systems in Cyber Security

被引:0
|
作者
Taipalus, Toni [1 ]
Grahn, Hilkka [1 ]
Turtiainen, Hannu [1 ]
Costin, Andrei [1 ]
机构
[1] Univ Jyvaskyla, Jyvaskyla, Finland
关键词
Vector Database; Anomaly Detection; Traffic Analysis; Cyber Security; Phishing Detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rising popularity of phenomena such as ubiquitous computing and IoT poses increasingly high demands for data management, and it is not uncommon that database management systems (DBMS) must be capable of reading and writing hundreds of operations per second. Vector DBMSs (VDBMS) are novel products that focus on the management of vector data and can alleviate data management pressures by storing data objects such as logs, system calls, emails, network flow data, and memory dumps in feature vectors that are computationally efficient in both storage and information retrieval. VDMBSs allow efficient nearest neighbour similarity search on complex data objects, which can be used in various cyber security applications such as anomaly, intrusion, malware detection, user behaviour analysis, and network flow analysis. This study describes VDBMSs and some of their use cases in cyber security.
引用
收藏
页码:556 / 561
页数:6
相关论文
共 50 条
  • [41] Cyber-Physical Systems - Security
    Zseby, T.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2018, 135 (03): : 249 - 249
  • [42] Personal Data in Cyber Systems Security
    Ogiela, Marek R.
    Ogiela, Lidia
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, CISIS-2017, 2018, 611 : 174 - 180
  • [43] Security Objectives of Cyber Physical Systems
    Lu, Tianbo
    Zhao, Jinyang
    Zhao, Lingling
    Li, Yang
    Zhang, Xiaoyan
    2014 7TH INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY (SECTECH), 2014, : 30 - 33
  • [44] Security Aspects of Cyber Physical Systems
    Ahmad, Ibtihaj
    Zarrar, Muhammad Kaab
    Saeed, Takreem
    Rehman, Saad
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [45] Proactive Cyber Security Response by Utilizing Passive Monitoring Technologies
    Nakao, Koji
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [46] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [47] Risk Assessment Method for Cyber Security of Cyber Physical Systems
    Wu, Wenbo
    Kang, Rui
    Li, Zi
    PROCEEDINGS OF THE 2015 FIRST INTERNATIONAL CONFERENCE ON RELIABILITY SYSTEMS ENGINEERING 2015 ICRSE, 2015,
  • [49] INFORMATION SECURITY MANAGEMENT SYSTEM AND CYBER SECURITY IN THE CZECH REPUBLIC
    Drastich, Martin
    ZNALOSTI PRO TRZNI PRAXI 2015: ZENY - PODNIKATELKY V MINULOSTI A SOUCASNOSTI, 2015, : 85 - 90
  • [50] Security in the Era of Cyber-Physical Systems of Systems
    Karnouskos, Stamatis
    ERCIM NEWS, 2014, (97): : 44 - 45