The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning
Open Access
- 1 January 2021
- journal article
- research article
- Published by Scientific Research Publishing, Inc. in Journal of Information Security
- Vol. 12 (01), 34-55
- https://doi.org/10.4236/jis.2021.121002
Abstract
As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of database security research is to prevent the database from being illegally used or destroyed. This paper introduces the main literature in the field of database security research in recent years. First of all, we classify these papers, the classification criteria are the influencing factors of database security. Compared with the traditional and machine learning (ML) methods, some explanations of concepts are interspersed to make these methods easier to understand. Secondly, we find that the related research has achieved some gratifying results, but there are also some shortcomings, such as weak generalization, deviation from reality. Then, possible future work in this research is proposed. Finally, we summarize the main contribution.Keywords
This publication has 36 references indexed in Scilit:
- Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMMFuture Generation Computer Systems, 2018
- A Hybrid System of Deep Learning and Learning Classifier System for Database Intrusion DetectionLecture Notes in Computer Science, 2017
- A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Cost and Communication Efficient Auditing over Public CloudPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Comparison of biometric identification methodsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Evaluation of in-memory storage engine for machine learning analysis of security eventsConcurrency and Computation: Practice and Experience, 2016
- Active Defence Using an Operational Technology HoneypotPublished by Institution of Engineering and Technology (IET) ,2016
- An Abnormal Connection Detection System based on network flow analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- STT-MRAM-Based Strong PUF ArchitecturePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Nano Meets Security: Exploring Nanoelectronic Devices for Security ApplicationsProceedings of the IEEE, 2015