{"title":"数据库安全威胁解决方案概述:传统和机器学习","authors":"Yong Wang, Jinsong Xi, Tong Cheng","doi":"10.4236/JIS.2021.121002","DOIUrl":null,"url":null,"abstract":"As an information-rich collective, \nthere are always some people who choose to take risks for some ulterior purpose \nand others are committed to finding ways to deal with database security \nthreats. The purpose of database security research is to prevent the database \nfrom being illegally used or destroyed. This paper introduces the main literature \nin the field of database security research in recent years. First of all, we \nclassify these papers, the classification criteria are the influencing \nfactors of database security. Compared with the traditional and machine \nlearning (ML) methods, some explanations of concepts are interspersed to make \nthese methods easier to understand. Secondly, we find that the related research \nhas achieved some gratifying results, but there are also some shortcomings, \nsuch as weak generalization, deviation from reality. Then, possible future work \nin this research is proposed. Finally, we summarize the main contribution.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning\",\"authors\":\"Yong Wang, Jinsong Xi, Tong Cheng\",\"doi\":\"10.4236/JIS.2021.121002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As an information-rich collective, \\nthere are always some people who choose to take risks for some ulterior purpose \\nand others are committed to finding ways to deal with database security \\nthreats. The purpose of database security research is to prevent the database \\nfrom being illegally used or destroyed. This paper introduces the main literature \\nin the field of database security research in recent years. First of all, we \\nclassify these papers, the classification criteria are the influencing \\nfactors of database security. Compared with the traditional and machine \\nlearning (ML) methods, some explanations of concepts are interspersed to make \\nthese methods easier to understand. Secondly, we find that the related research \\nhas achieved some gratifying results, but there are also some shortcomings, \\nsuch as weak generalization, deviation from reality. Then, possible future work \\nin this research is proposed. Finally, we summarize the main contribution.\",\"PeriodicalId\":57259,\"journal\":{\"name\":\"信息安全(英文)\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"信息安全(英文)\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.4236/JIS.2021.121002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"信息安全(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/JIS.2021.121002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning
As an information-rich collective,
there are always some people who choose to take risks for some ulterior purpose
and others are committed to finding ways to deal with database security
threats. The purpose of database security research is to prevent the database
from being illegally used or destroyed. This paper introduces the main literature
in the field of database security research in recent years. First of all, we
classify these papers, the classification criteria are the influencing
factors of database security. Compared with the traditional and machine
learning (ML) methods, some explanations of concepts are interspersed to make
these methods easier to understand. Secondly, we find that the related research
has achieved some gratifying results, but there are also some shortcomings,
such as weak generalization, deviation from reality. Then, possible future work
in this research is proposed. Finally, we summarize the main contribution.