数据库安全威胁解决方案概述:传统和机器学习

Yong Wang, Jinsong Xi, Tong Cheng
{"title":"数据库安全威胁解决方案概述:传统和机器学习","authors":"Yong Wang, Jinsong Xi, Tong Cheng","doi":"10.4236/JIS.2021.121002","DOIUrl":null,"url":null,"abstract":"As an information-rich collective, \nthere are always some people who choose to take risks for some ulterior purpose \nand others are committed to finding ways to deal with database security \nthreats. The purpose of database security research is to prevent the database \nfrom being illegally used or destroyed. This paper introduces the main literature \nin the field of database security research in recent years. First of all, we \nclassify these papers, the classification criteria are the influencing \nfactors of database security. Compared with the traditional and machine \nlearning (ML) methods, some explanations of concepts are interspersed to make \nthese methods easier to understand. Secondly, we find that the related research \nhas achieved some gratifying results, but there are also some shortcomings, \nsuch as weak generalization, deviation from reality. Then, possible future work \nin this research is proposed. Finally, we summarize the main contribution.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning\",\"authors\":\"Yong Wang, Jinsong Xi, Tong Cheng\",\"doi\":\"10.4236/JIS.2021.121002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As an information-rich collective, \\nthere are always some people who choose to take risks for some ulterior purpose \\nand others are committed to finding ways to deal with database security \\nthreats. The purpose of database security research is to prevent the database \\nfrom being illegally used or destroyed. This paper introduces the main literature \\nin the field of database security research in recent years. First of all, we \\nclassify these papers, the classification criteria are the influencing \\nfactors of database security. Compared with the traditional and machine \\nlearning (ML) methods, some explanations of concepts are interspersed to make \\nthese methods easier to understand. Secondly, we find that the related research \\nhas achieved some gratifying results, but there are also some shortcomings, \\nsuch as weak generalization, deviation from reality. Then, possible future work \\nin this research is proposed. Finally, we summarize the main contribution.\",\"PeriodicalId\":57259,\"journal\":{\"name\":\"信息安全(英文)\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"信息安全(英文)\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.4236/JIS.2021.121002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"信息安全(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/JIS.2021.121002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

作为一个信息丰富的集体,总有一些人出于不可告人的目的选择冒险,而另一些人则致力于寻找应对数据库安全威胁的方法。数据库安全研究的目的是防止数据库被非法使用或破坏。本文介绍了近年来数据库安全研究领域的主要文献。首先,我们对这些论文进行了分类,分类标准是影响数据库安全的因素。与传统的和机器学习(ML)方法相比,一些概念的解释穿插在其中,使这些方法更容易理解。其次,我们发现相关研究取得了一些可喜的成果,但也存在一些不足,如泛化能力弱、偏离实际等。然后,提出了本研究今后可能开展的工作。最后,我们总结了主要贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning
As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of database security research is to prevent the database from being illegally used or destroyed. This paper introduces the main literature in the field of database security research in recent years. First of all, we classify these papers, the classification criteria are the influencing factors of database security. Compared with the traditional and machine learning (ML) methods, some explanations of concepts are interspersed to make these methods easier to understand. Secondly, we find that the related research has achieved some gratifying results, but there are also some shortcomings, such as weak generalization, deviation from reality. Then, possible future work in this research is proposed. Finally, we summarize the main contribution.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
211
期刊最新文献
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques Research and Practice on High Availability Scheme of Unified Identity Authentication System Based on CAS in Colleges and Universities Learning with Errors Public Key Cryptosystem with Its Security User Station Security Protection Method Based on Random Domain Name Detection and Active Defense Towards a New Model for the Production of Civil Status Records Using Blockchain
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1