2021
DOI: 10.4236/jis.2021.121002
|View full text |Cite
|
Sign up to set email alerts
|

The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning

Abstract: As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of database security research is to prevent the database from being illegally used or destroyed. This paper introduces the main literature in the field of database security research in recent years. First of all, we classify these papers, the classification criteria are the influencing factors of database … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 37 publications
0
11
0
Order By: Relevance
“…However, it will achieve specific error prediction for specific input samples with backdoor triggers. Since backdoors can be hidden indefinitely until samples with specific backdoor triggers activate them, it brings serious security risks to the Federated learning system [3].…”
Section: Backdoor Attackmentioning
confidence: 99%
See 4 more Smart Citations
“…However, it will achieve specific error prediction for specific input samples with backdoor triggers. Since backdoors can be hidden indefinitely until samples with specific backdoor triggers activate them, it brings serious security risks to the Federated learning system [3].…”
Section: Backdoor Attackmentioning
confidence: 99%
“…In practical usage scenarios, there are three commonly used attack methods: direct, indirect, and mixed. Direct attack refers to the attacker locking the target node by providing fake sensor data and directly injecting maliciously modified toxic data into the target node; Indirect attack refers to an attacker who, under the condition of not being able to inject toxic data into any target node, utilizes vulnerabilities such as communication protocol flaws in the device to indirectly affect the target node by injecting toxic data into other nodes; Hybrid attacks are a combination of direct and indirect attacks, where attackers can inject toxic data directly or indirectly into the target node [3].…”
Section: Data Poisoningmentioning
confidence: 99%
See 3 more Smart Citations