ML TO MEASURE EFFECTIVENESS OF DATABASE SECURITY

Authors

DOI:

https://doi.org/10.70715/jitcai.2026.v3.i2.049

Keywords:

Artificial Intelligence, Machine Learning

Abstract

Enforcing database security to protect data is crucial in today’s digital world. As modern organizations increasingly rely on cloud infrastructure to run their business operations, database security becomes essential to protect the data of critical assets against malicious actors, while also maintaining compliance and regulatory requirements. This paper explores a machine learning approach to measuring the effectiveness of Database security. It utilizes logs from the AWS RDS service to construct a representative dataset, with key features including query latency ms, user role, access hour, query type, security alert, and top threat type. These features are used to train a model to predict the effectiveness of database security using AWS RDS log patterns. This enables organizations to prevent data breaches, protect sensitive information, and ensure ongoing compliance with relevant regulations.

Downloads

Download data is not yet available.

References

1. A. Babaei, P. M. Kebria, M. Moradi Dalvand, and S. Nahavandi. A review of machine learning-based security in cloud computing. arXiv preprint arXiv:2309.04911, 2023. Available at https://arxiv.org/pdf/2309.04911.

2. A. B. Ige, E. Kupa, and O. Ilori. Best practices in cybersecurity for green building management systems: Protecting sustainable infrastructure from cyber threats. International Journal of Science and Research Archive, 12(1):2960–2977, 2024. DOI: https://doi.org/10.30574/ijsra.2024.12.1.1185

3. A. Fatani, A. Dahou, M. A. Al-Qaness, S. Lu, and M. A. Elaziz. Advanced feature extraction and selection approach using deep learning and aquila optimizer for IoT intrusion detection system. Sensors, 22(1):140, 2021. DOI: https://doi.org/10.3390/s22010140

4. A. U. R. Butt, T. Mahmood, T. Saba, S. O. Bahaj, F. S. Alamri, M. W. Iqbal, and A. R. Khan. An optimized role-based access control using trust mechanism in eHealth cloud environment. IEEE Access, 2023.

5. A. Sallam, E. Bertino, S. R. Hussain, D. Landers, R. M. Lefler, and D. Steiner. DBSAFE—An anomaly detection system to protect databases from exfiltration attempts. IEEE Systems Journal, 11(2):483–493, June 2017. doi:10.1109/JSYST.2015.2487221. DOI: https://doi.org/10.1109/JSYST.2015.2487221

6. C. Thapa and S. Camtepe. Precision health data: Requirements, challenges and existing techniques for data security and privacy. Computers in Biology and Medicine, 129:104130, 2021. DOI: https://doi.org/10.1016/j.compbiomed.2020.104130

7. I. H. Sarker, A. Kayes, and P. Watters. Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage. Journal of Big Data, 6(1):1–28, 2019. DOI: https://doi.org/10.1186/s40537-019-0219-y

8. M. Deepa and J. Dhilipan. Security in database management system using machine learning. International Journal of Electronic Security and Digital Forensics (IJESDF), Inderscience, 2024. doi:10.1504/IJESDF.2024.10057609. Available at https://www.inderscienceonline.com/doi/pdf/10.1504/IJESDF.2024.136024.

9. M. Souppaya and K. Scarfone. Guide to data-centric system threat modeling (Draft NIST Special Publication 800-154). National Institute of Standards and Technology, 2015. Available at https://csrc.nist.gov/files/pubs/sp/800/154/ipd/docs/sp800_154_draft.pdf.

10. Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin. A comprehensive review of cybersecurity vulnerabilities, threats, attacks, and solutions. Electronics, 12(6):1333, 2023. DOI: https://doi.org/10.3390/electronics12061333

11. Software and Information Industry Association (SIIA). Ethical principles for artificial intelligence and data analytics. Pages 1–25, 2017.

12. X. Sun, F. R. Yu, and P. Zhang. A survey on cyber-security of connected and autonomous vehicles (CAVs). IEEE Transactions on Intelligent Transportation Systems, 23(7):6240–6259, 2021. DOI: https://doi.org/10.1109/TITS.2021.3085297

13. Z. Cui, J. Zeng, C. Wu, and S. Zhang. Design and implementation of a new database security model based on hopping mechanism. In Proceedings of the IEEE 9th International Conference on Anti-Counterfeiting, Security, and Identification (ASID), pages 1–5, September 2015. IEEE. doi:10.1109/ICASID.2015.7405649. DOI: https://doi.org/10.1109/ICASID.2015.7405649

14. Z. Zhang, H. Al Hamadi, E. Damiani, C. Y. Yeun, and F. Taher. Explainable artificial intelligence applications in cyber security: State-of-the-art in research. IEEE Access, 10:93104–93139, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3204051

Downloads

Published

03/30/2026

How to Cite

[1]
U. Bhatta, “ML TO MEASURE EFFECTIVENESS OF DATABASE SECURITY”, Journal of IT, Cybersecurity, & AI, vol. 3, no. 2, pp. 1–12, Mar. 2026, doi: 10.70715/jitcai.2026.v3.i2.049.

Share