ANALYSIS OF CURRENT PROBLEMS OF SECURITY OF CORPORATE DATABASES IN THE CONDITIONS OF MODERN INFRASTRUCTURE AND WAYS TO SOLUTION THEM
DOI:
https://doi.org/10.28925/2663-4023.2025.27.726Keywords:
cybersecurity; database security; machine learning; SIEM; AlienVault; IsolationForest; SOCAbstract
This research focuses on analyzing the current security challenges of corporate databases within modern infrastructure, developing a model for detecting anomalous database access activity, and integrating it into the AlienVault SIEM system for automatic threat response. One of the main issues in database security is the need for immediate anomaly detection and response to threats affecting database availability, confidentiality, and integrity. The analysis of scientific literature led to the conclusion that modern infrastructure significantly changes the approach to corporate database security, creating both new opportunities and threats. The challenges associated with the impact of modern infrastructure on database security require new ways to solve problems and a proactive integrated approach, which consists in applying artificial intelligence in organizing the protection of corporate databases.. The study employs the IsolationForest algorithm to develop an anomaly detection model for database access, utilizing open-source Python libraries. The model was trained on historical data, followed by testing and evaluating its effectiveness using Accuracy, Precision, Recall, and ROC AUC metrics. The training process achieved a high level of anomaly detection accuracy (Accuracy = 98.8%, ROC AUC ≈ 0.99, Precision = 0.86, Recall = 0.99). The model's integration into AlienVault was implemented through an external script execution mechanism. The developed model enables real-time identification of potential threats, risk assessment, and automatic blocking of malicious requests or sending alerts to the Security Operations Center (SOC). A novel approach to integrating machine learning algorithms into SIEM systems has been proposed, ensuring proactive anomaly detection and response to database security threats. Implementing this model enhances corporate database security, reduces the risk of data leaks, and ensures prompt responses to cybersecurity incidents.
Downloads
References
Kostiuk, Y., Bebeshko, B., Kriuchkova, L., Lytvynov, V., Oksanych, I., Skladannyi, P., & Khorolska, K. (2024). Information protection and data exchange security in wireless mobile networks with authentication and key exchange protocols. Cybersecurity: Education, Science, Technique, 1(25), 229–252. https://doi.org/10.28925/2663-4023.2024.25.229252
Kyrychok, R. V., Skladannyi, P. M., Buryachok, V. L., Hulak, G. M., & Kozachok, V. A. (2016). Problems of ensuring control over the security of corporate networks and ways to solve them. Scientific Notes of the Ukrainian Research Institute of Communications, 3(43), 48–61.
Adenubi, A. O., & P. Oduroye, A. (2024). Data security in big data: challenges, strategies, and future trends. International journal of research in education humanities and commerce, 05(02), 01–15. https://doi.org/10.37602/ijrehc.2024.5201
Li, X., Wang, Z., Leung, V. C. M., Ji, H., Liu, Y., & Zhang, H. (2021). Blockchain-empowered data-driven networks. ACM Computing Surveys, 54(3), 1–38. https://doi.org/10.1145/3446373
Bao, R., Chen, Z., & Obaidat, M. S. (2018). Challenges and techniques in Big data security and privacy: A review. Security and Privacy, 1(4), Article e13. https://doi.org/10.1002/spy2.13
Yeoh, W., Liu, M., Shore, M., & Jiang, F. (2023). Zero trust cybersecurity: Critical success factors and a maturity assessment framework. Computers & Security, 103412. https://doi.org/10.1016/j.cose.2023.103412
Prince, N. U., Faheem, M. A., Khan, O., Hossain, K., Alkhayyat, A., Hamdache, A., & Elmouki, I. (2024). AI-Powered data-driven cybersecurity techniques: boosting threat identification and reaction. Nanotechnology Perceptions 20(S10), 332–353. https://doi.org/10.62441/nano-ntp.v20is10.25
Paul, P., & Aithal, P. S. (2019). Database Security: An overview and analysis of current trend. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3497728
Yasmeen, M. (2018). NOSQL database engines for big data management. International Journal of Trend in Scientific Research and Development, 2(6), 617–622. https://doi.org/10.31142/ijtsrd18608
Mousa, A., Karabatak, M., & Mustafa, T. (2020). Database security threats and challenges. 8th international symposium on digital forensics and security (ISDFS). https://doi.org/10.1109/isdfs49300.2020.9116436
Zaw, T. M., Thant, M., & Bezzateev, S. V. (2019). Database security with AES encryption, elliptic curve encryption and signature. 2019 wave electronics and its application in information and telecommunication systems (WECONF). https://doi.org/10.1109/weconf.2019.8840125
Mataz, A., & Haripriya, V. (2024). Enhancing data protection through advanced encryption or improving data security with advanced encryption. International Journal of Innovative Research in Computer and Communication Engineering, 12(03), 1710–1715. https://doi.org/10.15680/ijircce.2024.1203056
Singh, I., Kumar, N., Srinivasa, K. G., S., Sharma, T., Kumar, V., & Singhal, S. (2020). Database intrusion detection using role and user behavior based risk assessment. Journal of Information Security and Applications, 55, 102654. https://doi.org/10.1016/j.jisa.2020.102654
Lavrov, E. A., Zolkin, A. L., Aygumov, T. G., Chistyakov, M. S., & Akhmetov, I. V. (2021). Analysis of information security issues in corporate computer networks. IOP Conference Series: Materials Science and Engineering, 1047(1), 012117. https://doi.org/10.1088/1757-899x/1047/1/012117
Liu, F. T., Ting, K. M., & Zhou, Z.-H. (2008). Isolation forest. In 2008 eighth IEEE international conference on data mining (ICDM). https://doi.org/10.1109/icdm.2008.17
Szumelda, P., Orzechowski, N., Rawski, M., & Janicki, A. (2022). VHS-22 – A very heterogeneous set of network traffic data for threat detection. In EICC 2022: European interdisciplinary cybersecurity conference. ACM. https://doi.org/10.1145/3528580.3532843
De Carvalho Bertoli, G., Pereira Junior, L. A., Saotome, O., Dos Santos, A. L., Verri, F. A. N., Marcondes, C. A. C., Barbieri, S., Rodrigues, M. S., & Parente De Oliveira, J. M. (2021). An end-to-end framework for machine learning-based network intrusion detection system. IEEE Access, 9, 106790–106805. https://doi.org/10.1109/access.2021.3101188
Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Юрій Щавінський, Олександр Будзинський

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.