ML TO MEASURE EFFECTIVENESS OF DATABASE SECURITY
DOI:
https://doi.org/10.70715/jitcai.2026.v3.i2.049Keywords:
Artificial Intelligence, Machine LearningAbstract
Enforcing database security to protect data is crucial in today’s digital world. As modern organizations increasingly rely on cloud infrastructure to run their business operations, database security becomes essential to protect the data of critical assets against malicious actors, while also maintaining compliance and regulatory requirements. This paper explores a machine learning approach to measuring the effectiveness of Database security. It utilizes logs from the AWS RDS service to construct a representative dataset, with key features including query latency ms, user role, access hour, query type, security alert, and top threat type. These features are used to train a model to predict the effectiveness of database security using AWS RDS log patterns. This enables organizations to prevent data breaches, protect sensitive information, and ensure ongoing compliance with relevant regulations.
Downloads
References
1. A. Babaei, P. M. Kebria, M. Moradi Dalvand, and S. Nahavandi. A review of machine learning-based security in cloud computing. arXiv preprint arXiv:2309.04911, 2023. Available at https://arxiv.org/pdf/2309.04911.
2. A. B. Ige, E. Kupa, and O. Ilori. Best practices in cybersecurity for green building management systems: Protecting sustainable infrastructure from cyber threats. International Journal of Science and Research Archive, 12(1):2960–2977, 2024. DOI: https://doi.org/10.30574/ijsra.2024.12.1.1185
3. A. Fatani, A. Dahou, M. A. Al-Qaness, S. Lu, and M. A. Elaziz. Advanced feature extraction and selection approach using deep learning and aquila optimizer for IoT intrusion detection system. Sensors, 22(1):140, 2021. DOI: https://doi.org/10.3390/s22010140
4. A. U. R. Butt, T. Mahmood, T. Saba, S. O. Bahaj, F. S. Alamri, M. W. Iqbal, and A. R. Khan. An optimized role-based access control using trust mechanism in eHealth cloud environment. IEEE Access, 2023.
5. A. Sallam, E. Bertino, S. R. Hussain, D. Landers, R. M. Lefler, and D. Steiner. DBSAFE—An anomaly detection system to protect databases from exfiltration attempts. IEEE Systems Journal, 11(2):483–493, June 2017. doi:10.1109/JSYST.2015.2487221. DOI: https://doi.org/10.1109/JSYST.2015.2487221
6. C. Thapa and S. Camtepe. Precision health data: Requirements, challenges and existing techniques for data security and privacy. Computers in Biology and Medicine, 129:104130, 2021. DOI: https://doi.org/10.1016/j.compbiomed.2020.104130
7. I. H. Sarker, A. Kayes, and P. Watters. Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage. Journal of Big Data, 6(1):1–28, 2019. DOI: https://doi.org/10.1186/s40537-019-0219-y
8. M. Deepa and J. Dhilipan. Security in database management system using machine learning. International Journal of Electronic Security and Digital Forensics (IJESDF), Inderscience, 2024. doi:10.1504/IJESDF.2024.10057609. Available at https://www.inderscienceonline.com/doi/pdf/10.1504/IJESDF.2024.136024.
9. M. Souppaya and K. Scarfone. Guide to data-centric system threat modeling (Draft NIST Special Publication 800-154). National Institute of Standards and Technology, 2015. Available at https://csrc.nist.gov/files/pubs/sp/800/154/ipd/docs/sp800_154_draft.pdf.
10. Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin. A comprehensive review of cybersecurity vulnerabilities, threats, attacks, and solutions. Electronics, 12(6):1333, 2023. DOI: https://doi.org/10.3390/electronics12061333
11. Software and Information Industry Association (SIIA). Ethical principles for artificial intelligence and data analytics. Pages 1–25, 2017.
12. X. Sun, F. R. Yu, and P. Zhang. A survey on cyber-security of connected and autonomous vehicles (CAVs). IEEE Transactions on Intelligent Transportation Systems, 23(7):6240–6259, 2021. DOI: https://doi.org/10.1109/TITS.2021.3085297
13. Z. Cui, J. Zeng, C. Wu, and S. Zhang. Design and implementation of a new database security model based on hopping mechanism. In Proceedings of the IEEE 9th International Conference on Anti-Counterfeiting, Security, and Identification (ASID), pages 1–5, September 2015. IEEE. doi:10.1109/ICASID.2015.7405649. DOI: https://doi.org/10.1109/ICASID.2015.7405649
14. Z. Zhang, H. Al Hamadi, E. Damiani, C. Y. Yeun, and F. Taher. Explainable artificial intelligence applications in cyber security: State-of-the-art in research. IEEE Access, 10:93104–93139, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3204051
Downloads
Published
Issue
Section
Categories
License
Copyright (c) 2026 Upakar Bhatta (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.








