Security in database management system using machine learning

被引:0
|
作者
Deepa, M. [1 ]
Dhilipan, J. [1 ]
机构
[1] SRM Inst Sci & Technol, Fac Sci & Humanities, Dept Comp Sci & Applicat, Chennai 600089, Tamil Nadu, India
关键词
database security'; security techniques; database threats; integrity; machine learning; INTRUSION DETECTION;
D O I
10.1504/IJESDF.2024.136024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The term 'database security' refers to the collection of rules, tools, and processes that have been developed to maintain and protect the databases' confidentiality, integrity, and accessibility. The use of machine learning to improve database management security is becoming more common. The fundamental goal of employing machine learning in security is to make the process of malware detection more actionable, scalable, and successful than conventional techniques, which need the participation of humans. This may be accomplished by making the process more automated. The process entails overcoming problems posed by machine learning, which need to be managed in an effective, logical, and theoretical manner. Machine learning algorithm is applied in the critical paths of the tuner. The optimum configuration for the proposed system yields a throughput boost of between 22% and 35% and a latency reduction of around 60%. The method is robust to various attacks.
引用
收藏
页码:124 / 133
页数:11
相关论文
共 50 条
  • [41] The security of machine learning
    Marco Barreno
    Blaine Nelson
    Anthony D. Joseph
    J. D. Tygar
    [J]. Machine Learning, 2010, 81 : 121 - 148
  • [42] Security Enhancement in Healthcare Cloud using Machine Learning
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 : 388 - 397
  • [43] Strengthening Mobile Network Security Using Machine Learning
    Van Thuan Do
    Engelstad, Paal
    Feng, Boning
    Thanh Van Do
    [J]. MOBILE WEB AND INTELLIGENT INFORMATION SYSTEMS, (MOBIWIS 2016), 2016, 9847 : 173 - 183
  • [44] Physical Security Assessment Using Temporal Machine Learning
    Galiardi, Meghan A.
    Verzi, Stephen J.
    Birch, Gabriel C.
    Stubbs, Jaclynn J.
    Woo, Bryana L.
    Kouhestani, Camron G.
    [J]. 2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2018, : 100 - 104
  • [45] Analysis of Security of Split Manufacturing Using Machine Learning
    Zeng, Wei
    Zhang, Boyu
    Davoodi, Azadeh
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) : 2767 - 2780
  • [46] Security Tools' API Recommendation Using Machine Learning
    Sworna, Zarrin Tasnim
    Sreekumar, Anjitha
    Islam, Chadni
    Babar, Muhammad Ali
    [J]. PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023, 2023, : 27 - 38
  • [47] Analysis of Security of Split Manufacturing using Machine Learning
    Zhang, Boyu
    Magana, Jonathon Crandall
    Davoodi, Azadeh
    [J]. 2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [48] Improving Network Security Using Machine Learning Techniques
    Akbar, Shaik
    Chandulal, J. A.
    Rao, K. Nageswara
    Kumar, G. Sudheer
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 76 - 80
  • [49] Classification of mathematical test questions using machine learning on datasets of learning management system questions
    Kim, Gun Il
    Kim, Sungtae
    Jang, Beakcheol
    [J]. PLOS ONE, 2023, 18 (10):
  • [50] Using machine learning to assist with the selection of security controls during security assessment
    Seifeddine Bettaieb
    Seung Yeob Shin
    Mehrdad Sabetzadeh
    Lionel C. Briand
    Michael Garceau
    Antoine Meyers
    [J]. Empirical Software Engineering, 2020, 25 : 2550 - 2582