Home
International Journal of Science and Research Archive
International, Peer reviewed, Open access Journal ISSN Approved Journal No. 2582-8185

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • IJSRA CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN Approved Journal || eISSN: 2582-8185 || CODEN: IJSRO2 || Impact Factor 8.2 || Google Scholar and CrossRef Indexed

Peer Reviewed and Referred Journal || Free Certificate of Publication

Research and review articles are invited for publication in March 2026 (Volume 18, Issue 3) Submit manuscript

Advanced modelling techniques for anomaly detection: A proactive approach to database breach mitigation

Breadcrumb

  • Home
  • Advanced modelling techniques for anomaly detection: A proactive approach to database breach mitigation

Chinedu Jude Nzekwe 1, * and Christopher J Ozurumba 2

1 Department of Applied Science and Technology, North Carolina Agricultural and Technical State University, Greensboro North Carolina, USA.
2 Data Engineer, Accredible Limited. UK.

Research Article
 

International Journal of Science and Research Archive, 2024, 13(02), 2893-2909.
Article DOI: 10.30574/ijsra.2024.13.2.2511
DOI url: https://doi.org/10.30574/ijsra.2024.13.2.2511

Received on 05 November 2024; revised on 14 December 2024; accepted on 16 December 2024

The increasing sophistication of cyber threats necessitates advanced approaches to database protection, with anomaly detection emerging as a cornerstone of modern cybersecurity strategies. This paper delves into cutting-edge modelling techniques, such as neural networks and Bayesian inference, for identifying anomalies in database environments. These techniques enhance the detection of malicious activities, including SQL injection attacks, unauthorized access, and data exfiltration attempts, which traditional rule-based systems often fail to capture. Neural networks, with their ability to analyse complex patterns in large datasets, enable the identification of subtle deviations indicative of potential threats. Coupled with Bayesian inference, which calculates the probability of anomalous events based on prior knowledge, these techniques provide a robust framework for detecting irregularities in real-time. Together, they offer superior performance in distinguishing genuine threats from benign anomalies, reducing false positives and improving response times. This study also explores the synergy between advanced anomaly detection methods and existing database protection measures, such as encryption and access control. By integrating these techniques into real-time monitoring systems, organizations can create comprehensive security architectures capable of adapting to evolving threats. Case studies from industries such as finance, healthcare, and e-commerce illustrate the practical benefits of this approach, showcasing enhanced breach mitigation and minimized data loss. The paper concludes by emphasizing the necessity of adopting proactive, analytics-driven solutions in database security. Advanced modelling techniques not only improve threat detection and response capabilities but also strengthen the overall resilience of database systems in an increasingly complex cyber landscape.

Anomaly Detection; Neural Networks; Bayesian Inference; Database Security; SQL Injection Prevention; Real-Time Threat Monitoring

https://ijsra.net/sites/default/files/fulltext_pdf/IJSRA-2024-2511.pdf

Preview Article PDF

Chinedu Jude Nzekwe and Christopher J Ozurumba. Advanced modelling techniques for anomaly detection: A proactive approach to database breach mitigation. International Journal of Science and Research Archive, 2024, 13(02), 2893-2909. https://doi.org/10.30574/ijsra.2024.13.2.2511

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

          

   

Copyright © 2026 International Journal of Science and Research Archive - All rights reserved

Developed & Designed by VS Infosolution