Role of AI in Database Security

Authors

  • Nagireddy Karri Senior IT Administrator Database, Sherwin-Williams, USA. Author
  • Sandeep Kumar Jangam Lead Consultant, Infosys Limited, USA. Author

DOI:

https://doi.org/10.63282/3050-9262.IJAIDSML-V4I1P110

Keywords:

Database Security, Artificial Intelligence, Machine Learning, Intrusion Detection, Anomaly Detection, Cybersecurity, Predictive Analytics, Data Encryption

Abstract

The speed at which digital data is expanding into different fields has created the need to have highly developed security systems to entrap sensitive information. However, the conventional database protection techniques though succeeding to some degree, may fail to manage advanced cyber threats, data breach issues at magnitude and volatile attack patterns. AI has become one of the radonuces in improving the safety of the database by utilizing the machine learning, deep learning, and intelligent algorithms to forecast, identify, and adjust the possible security threat. The paper discusses the use of AI in the security of databases, currently studying its methodologies, applications, and challenges. Anomaly detection, predictive analytics, user behavior profiling, and automated threat response mechanisms (AI-based methods) are examples of proactive means of protecting databases. The integration of AI in systems of access control, encryption management, and intrusion detector is also explored in the study. As the paper illustrates the efficient use of AI in increasing data integrity, confidentiality, and availability, there was a comprehensive literature review, analysis of the methodology, and discussion of the experimental results. The results suggest that AI-based security systems can substantially surpass the traditional systems, but necessary areas of work include model interpretability, computational challenges, and the changing threat environment, with ongoing research necessary. The paper has concluded by highlighting the future opportunities of AI in developing strong, dynamic as well as intelligent database protection solutions

References

[1] Singh, B. (2017). Enhancing Real-Time Database Security Monitoring Capabilities Using Artificial Intelligence. International Journal of Current Engineering and Scientific Research (IJCESR).

[2] Tekale, K. M., & Rahul, N. (2022). AI and Predictive Analytics in Underwriting, 2022 Advancements in Machine Learning for Loss Prediction and Customer Segmentation. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 3(1), 95-113. https://doi.org/10.63282/3050-9262.IJAIDSML-V3I1P111

[3] Bertino, E., & Sandhu, R. (2005). Database security-concepts, approaches, and challenges. IEEE Transactions on Dependable and secure computing, 2(1), 2-19.

[4] Agrawal, R., & Srikant, R. (2000, May). Privacy-preserving data mining. In Proceedings of the 2000 ACM SIGMOD international conference on Management of data (pp. 439-450).

[5] Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on software engineering, (2), 222-232.

[6] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58.

[7] Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & De Alvarenga, S. C. (2017). A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications, 84, 25-37.

[8] Qureshi, K. N., Jeon, G., & Piccialli, F. (2021). Anomaly detection and trust authority in artificial intelligence and cloud computing. Computer Networks, 184, 107647.

[9] Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19-31.

[10] Tekale, K. M. (2022). Claims Optimization in a High-Inflation Environment Provide Frameworks for Leveraging Automation and Predictive Analytics to Reduce Claims Leakage and Accelerate Settlements. International Journal of Emerging Research in Engineering and Technology, 3(2), 110-122. https://doi.org/10.63282/3050-922X.IJERET-V3I2P112

[11] Sommer, R., & Paxson, V. (2010, May). Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE symposium on security and privacy (pp. 305-316). IEEE.

[12] Shokri, R., Stronati, M., Song, C., & Shmatikov, V. (2017, May). Membership inference attacks against machine learning models. In 2017 IEEE symposium on security and privacy (SP) (pp. 3-18). IEEE.

[13] Goodfellow, I., Bengio, Y., Courville, A., & Bengio, Y. (2016). Deep learning (Vol. 1, No. 2). Cambridge: MIT press.

[14] Dhingra, M., Jain, M., & Jadon, R. S. (2016, December). Role of artificial intelligence in enterprise information security: a review. In 2016 fourth international conference on parallel, distributed and grid computing (PDGC) (pp. 188-191). IEEE.

[15] Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), 1153-1176.

[16] Bertino, E., Kantarcioglu, M., Akcora, C. G., Samtani, S., Mittal, S., & Gupta, M. (2021, April). AI for Security and Security for AI. In Proceedings of the eleventh ACM conference on data and application security and privacy (pp. 333-334).

[17] Paul, P., & Aithal, P. S. (2019). Database security: An overview and analysis of current trend. International Journal of Management, Technology, and Social Sciences (IJMTS), 4(2), 53-58.

[18] Alalwan, J. A. A. (2022). Roles and challenges of AI-based cybersecurity: A case study. Jordan Journal of Business Administration, 18(3).

[19] Tekale, K. M. T., & Enjam, G. reddy . (2022). The Evolving Landscape of Cyber Risk Coverage in P&C Policies. International Journal of Emerging Trends in Computer Science and Information Technology, 3(3), 117-126. https://doi.org/10.63282/3050-9246.IJETCSIT-V3I1P113

[20] Abdiyeva-Aliyeva, G., & Hematyar, M. (2022, May). AI-based network security anomaly prediction and detection in future network. In The International Conference on Artificial Intelligence and Applied Mathematics in Engineering (pp. 149-159). Cham: Springer International Publishing.

[21] Musa, A. B. (2013). Comparative study on classification performance between support vector machine and logistic regression. International Journal of Machine Learning and Cybernetics, 4(1), 13-24.

[22] Shahriar, H., & Zulkernine, M. (2012). Mitigating program security vulnerabilities: Approaches and challenges. ACM Computing Surveys (CSUR), 44(3), 1-46.

[23] Oseni, A., Moustafa, N., Janicke, H., Liu, P., Tari, Z., & Vasilakos, A. (2021). Security and privacy for artificial intelligence: Opportunities and challenges. arXiv preprint arXiv:2102.04661.

Published

2023-03-30

Issue

Section

Articles

How to Cite

1.
Karri N, Jangam SK. Role of AI in Database Security. IJAIDSML [Internet]. 2023 Mar. 30 [cited 2025 Oct. 30];4(1):89-97. Available from: https://ijaidsml.org/index.php/ijaidsml/article/view/286