数据库安全威胁解决方案概述:传统和机器学习

Yong Wang, Jinsong Xi, Tong Cheng
{"title":"数据库安全威胁解决方案概述:传统和机器学习","authors":"Yong Wang, Jinsong Xi, Tong Cheng","doi":"10.4236/JIS.2021.121002","DOIUrl":null,"url":null,"abstract":"As an information-rich collective, \nthere are always some people who choose to take risks for some ulterior purpose \nand others are committed to finding ways to deal with database security \nthreats. The purpose of database security research is to prevent the database \nfrom being illegally used or destroyed. This paper introduces the main literature \nin the field of database security research in recent years. First of all, we \nclassify these papers, the classification criteria are the influencing \nfactors of database security. Compared with the traditional and machine \nlearning (ML) methods, some explanations of concepts are interspersed to make \nthese methods easier to understand. Secondly, we find that the related research \nhas achieved some gratifying results, but there are also some shortcomings, \nsuch as weak generalization, deviation from reality. Then, possible future work \nin this research is proposed. Finally, we summarize the main contribution.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning\",\"authors\":\"Yong Wang, Jinsong Xi, Tong Cheng\",\"doi\":\"10.4236/JIS.2021.121002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As an information-rich collective, \\nthere are always some people who choose to take risks for some ulterior purpose \\nand others are committed to finding ways to deal with database security \\nthreats. The purpose of database security research is to prevent the database \\nfrom being illegally used or destroyed. This paper introduces the main literature \\nin the field of database security research in recent years. First of all, we \\nclassify these papers, the classification criteria are the influencing \\nfactors of database security. Compared with the traditional and machine \\nlearning (ML) methods, some explanations of concepts are interspersed to make \\nthese methods easier to understand. Secondly, we find that the related research \\nhas achieved some gratifying results, but there are also some shortcomings, \\nsuch as weak generalization, deviation from reality. Then, possible future work \\nin this research is proposed. Finally, we summarize the main contribution.\",\"PeriodicalId\":57259,\"journal\":{\"name\":\"信息安全(英文)\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"信息安全(英文)\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.4236/JIS.2021.121002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"信息安全(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/JIS.2021.121002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

作为一个信息丰富的集体,总有一些人出于不可告人的目的选择冒险,而另一些人则致力于寻找应对数据库安全威胁的方法。数据库安全研究的目的是防止数据库被非法使用或破坏。本文介绍了近年来数据库安全研究领域的主要文献。首先,我们对这些论文进行了分类,分类标准是影响数据库安全的因素。与传统的和机器学习(ML)方法相比,一些概念的解释穿插在其中,使这些方法更容易理解。其次,我们发现相关研究取得了一些可喜的成果,但也存在一些不足,如泛化能力弱、偏离实际等。然后,提出了本研究今后可能开展的工作。最后,我们总结了主要贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning
As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of database security research is to prevent the database from being illegally used or destroyed. This paper introduces the main literature in the field of database security research in recent years. First of all, we classify these papers, the classification criteria are the influencing factors of database security. Compared with the traditional and machine learning (ML) methods, some explanations of concepts are interspersed to make these methods easier to understand. Secondly, we find that the related research has achieved some gratifying results, but there are also some shortcomings, such as weak generalization, deviation from reality. Then, possible future work in this research is proposed. Finally, we summarize the main contribution.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
211
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信