A Novel Machine Learning Approach for Database Exploitation to Enhance Database Security: A Survey

Authors

  • Muhammad Hamza Akhtar Department of Information Technology, Faculty of Computer Science & IT Superior, University Lahore, 54000, Pakistan
  • Asfar Ali Department of Information Technology, Faculty of Computer Science & IT Superior, University Lahore, 54000, Pakistan
  • Sadaqat Ali Superior University, Lahore
  • Fawad Nasim Department of Computer Science, Faculty of Computer Science and Information Technology Superior University Lahore, 54000, Pakistan
  • Muhammad Hamza Aziz Regvm Enterprises
  • Hamayun Khan Department of Computer Science, Faculty of Computer Science & IT Superior, University Lahore, 54000, Pakistan
  • Syed Asad Ali Naqvi Department of Information Technology, Faculty of Computer Science and Information Technology Superior University Lahore, 54000, Pakistan

Abstract

As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics, and other relevant contextual information, such as time. It is well understood today that the semantics of data must be taken into account in order to specify effective access control policies. Here this paper discusses the Machine learning-based approaches that can be implemented to improve the level of security in a database with emphasis on the discrepancies in security models that are composed of both traditional and advanced protection layers extending from input and output interfaces of databases and framework of databases. With the ever-increasing growth of online trading, it is possible to see how SQLi attacks can continue to be one of the leading routes for cyber-attacks in the future, as indicated by findings reported in OWASP It also proposes a combined architecture consisting of intricate cryptographic protocols, advanced anomaly detection systems and affordable access control solutions. As a result of the formation of efficient database ecosystems, this work underlines the need for the multiple-level approach by considering the organizational success factors and technical solutions. The Comprehensive approach in the paper benefits the numerous professionals and researchers who are endeavoring to protect databases against new emerging risks.

Keywords

Database safety, Security Oddity Detection, Authorization, Security hierarchies, Schemes of Security, Cyber Threats, Data Consistency, Artificial Intelligence, Machine Learning, Access Control, Cloud Database

Downloads

Published

2025-01-23

How to Cite

Muhammad Hamza Akhtar, Asfar Ali, Sadaqat Ali, Fawad Nasim, Muhammad Hamza Aziz, Hamayun Khan, & Syed Asad Ali Naqvi. (2025). A Novel Machine Learning Approach for Database Exploitation to Enhance Database Security: A Survey. Spectrum of Engineering Sciences, 3(2), 26–57. Retrieved from https://sesjournal.com/index.php/1/article/view/131