ANALYSIS OF CURRENT PROBLEMS OF SECURITY OF CORPORATE DATABASES IN THE CONDITIONS OF MODERN INFRASTRUCTURE AND WAYS TO SOLUTION THEM

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.27.726

Keywords:

cybersecurity; database security; machine learning; SIEM; AlienVault; IsolationForest; SOC

Abstract

This research focuses on analyzing the current security challenges of corporate databases within modern infrastructure, developing a model for detecting anomalous database access activity, and integrating it into the AlienVault SIEM system for automatic threat response. One of the main issues in database security is the need for immediate anomaly detection and response to threats affecting database availability, confidentiality, and integrity. The analysis of scientific literature led to the conclusion that modern infrastructure significantly changes the approach to corporate database security, creating both new opportunities and threats. The challenges associated with the impact of modern infrastructure on database security require new ways to solve problems and a proactive integrated approach, which consists in applying artificial intelligence in organizing the protection of corporate databases.. The study employs the IsolationForest algorithm to develop an anomaly detection model for database access, utilizing open-source Python libraries. The model was trained on historical data, followed by testing and evaluating its effectiveness using Accuracy, Precision, Recall, and ROC AUC metrics. The training process achieved a high level of anomaly detection accuracy (Accuracy = 98.8%, ROC AUC ≈ 0.99, Precision = 0.86, Recall = 0.99). The model's integration into AlienVault was implemented through an external script execution mechanism. The developed model enables real-time identification of potential threats, risk assessment, and automatic blocking of malicious requests or sending alerts to the Security Operations Center (SOC). A novel approach to integrating machine learning algorithms into SIEM systems has been proposed, ensuring proactive anomaly detection and response to database security threats. Implementing this model enhances corporate database security, reduces the risk of data leaks, and ensures prompt responses to cybersecurity incidents.

Downloads

Download data is not yet available.

References

Kostiuk, Y., Bebeshko, B., Kriuchkova, L., Lytvynov, V., Oksanych, I., Skladannyi, P., & Khorolska, K. (2024). Information protection and data exchange security in wireless mobile networks with authentication and key exchange protocols. Cybersecurity: Education, Science, Technique, 1(25), 229–252. https://doi.org/10.28925/2663-4023.2024.25.229252

Kyrychok, R. V., Skladannyi, P. M., Buryachok, V. L., Hulak, G. M., & Kozachok, V. A. (2016). Problems of ensuring control over the security of corporate networks and ways to solve them. Scientific Notes of the Ukrainian Research Institute of Communications, 3(43), 48–61.

Adenubi, A. O., & P. Oduroye, A. (2024). Data security in big data: challenges, strategies, and future trends. International journal of research in education humanities and commerce, 05(02), 01–15. https://doi.org/10.37602/ijrehc.2024.5201

Li, X., Wang, Z., Leung, V. C. M., Ji, H., Liu, Y., & Zhang, H. (2021). Blockchain-empowered data-driven networks. ACM Computing Surveys, 54(3), 1–38. https://doi.org/10.1145/3446373

Bao, R., Chen, Z., & Obaidat, M. S. (2018). Challenges and techniques in Big data security and privacy: A review. Security and Privacy, 1(4), Article e13. https://doi.org/10.1002/spy2.13

Yeoh, W., Liu, M., Shore, M., & Jiang, F. (2023). Zero trust cybersecurity: Critical success factors and a maturity assessment framework. Computers & Security, 103412. https://doi.org/10.1016/j.cose.2023.103412

Prince, N. U., Faheem, M. A., Khan, O., Hossain, K., Alkhayyat, A., Hamdache, A., & Elmouki, I. (2024). AI-Powered data-driven cybersecurity techniques: boosting threat identification and reaction. Nanotechnology Perceptions 20(S10), 332–353. https://doi.org/10.62441/nano-ntp.v20is10.25

Paul, P., & Aithal, P. S. (2019). Database Security: An overview and analysis of current trend. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3497728

Yasmeen, M. (2018). NOSQL database engines for big data management. International Journal of Trend in Scientific Research and Development, 2(6), 617–622. https://doi.org/10.31142/ijtsrd18608

Mousa, A., Karabatak, M., & Mustafa, T. (2020). Database security threats and challenges. 8th international symposium on digital forensics and security (ISDFS). https://doi.org/10.1109/isdfs49300.2020.9116436

Zaw, T. M., Thant, M., & Bezzateev, S. V. (2019). Database security with AES encryption, elliptic curve encryption and signature. 2019 wave electronics and its application in information and telecommunication systems (WECONF). https://doi.org/10.1109/weconf.2019.8840125

Mataz, A., & Haripriya, V. (2024). Enhancing data protection through advanced encryption or improving data security with advanced encryption. International Journal of Innovative Research in Computer and Communication Engineering, 12(03), 1710–1715. https://doi.org/10.15680/ijircce.2024.1203056

Singh, I., Kumar, N., Srinivasa, K. G., S., Sharma, T., Kumar, V., & Singhal, S. (2020). Database intrusion detection using role and user behavior based risk assessment. Journal of Information Security and Applications, 55, 102654. https://doi.org/10.1016/j.jisa.2020.102654

Lavrov, E. A., Zolkin, A. L., Aygumov, T. G., Chistyakov, M. S., & Akhmetov, I. V. (2021). Analysis of information security issues in corporate computer networks. IOP Conference Series: Materials Science and Engineering, 1047(1), 012117. https://doi.org/10.1088/1757-899x/1047/1/012117

Liu, F. T., Ting, K. M., & Zhou, Z.-H. (2008). Isolation forest. In 2008 eighth IEEE international conference on data mining (ICDM). https://doi.org/10.1109/icdm.2008.17

Szumelda, P., Orzechowski, N., Rawski, M., & Janicki, A. (2022). VHS-22 – A very heterogeneous set of network traffic data for threat detection. In EICC 2022: European interdisciplinary cybersecurity conference. ACM. https://doi.org/10.1145/3528580.3532843

De Carvalho Bertoli, G., Pereira Junior, L. A., Saotome, O., Dos Santos, A. L., Verri, F. A. N., Marcondes, C. A. C., Barbieri, S., Rodrigues, M. S., & Parente De Oliveira, J. M. (2021). An end-to-end framework for machine learning-based network intrusion detection system. IEEE Access, 9, 106790–106805. https://doi.org/10.1109/access.2021.3101188

Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.

Downloads


Abstract views: 5

Published

2025-03-27

How to Cite

Shchavinskyi, Y., & Budzynskyi , O. (2025). ANALYSIS OF CURRENT PROBLEMS OF SECURITY OF CORPORATE DATABASES IN THE CONDITIONS OF MODERN INFRASTRUCTURE AND WAYS TO SOLUTION THEM . Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(27), 390–405. https://doi.org/10.28925/2663-4023.2025.27.726