CONCEPT OF AUTOMATED RESPONSE TO THREATS IN CORPORATE DATABASES IN REAL-TIME MODE

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.29.927

Keywords:

cybersecurity, threat response concept, database security, machine learning

Abstract

The article presents a concept of automated real-time threat response in corporate databases, developed with consideration of current trends in cyber threat evolution and the limitations of existing protection mechanisms. The relevance of the research is determined by the growing number of database attacks, among which the most common remain SQL injections, unauthorized privilege escalation, insider activities, and lateral movement within corporate networks. Traditional approaches to database security, primarily focused on access control and signature-based detection, do not provide sufficient response speed and fail to address the complexity of multi-vector attacks. The study defines the conceptual principles of system design, including continuous monitoring, multi-level analysis, adaptability, and integration with existing security platforms. The proposed architecture combines data collection mechanisms, artificial intelligence–based analytics modules for anomaly detection, a SOAR subsystem for dynamic response, and integration with SOC and SIEM solutions. This combination ensures the implementation of a closed security loop: monitoring → analysis → response → management and control. The practical validation of the concept is demonstrated through scenarios of detecting SQL injections and identifying anomalous employee behavior, which confirms the system’s ability to effectively counter both external and internal threats in real time. The differences of the proposed model from traditional solutions, its advantages (response speed, flexibility, scalability), and limitations (dependence on configuration, resource intensity) are analyzed. The obtained results have scientific novelty, which lies in the development of a concept for an integrated architecture of automated threat response in corporate databases. The practical significance lies in the possibility of implementing the proposed concept in corporate systems to enhance their resilience against modern cyber threats.

Downloads

Download data is not yet available.

References

• Almaiah, M. A., Saqr, L. M., Al-Rawwash, L. A., Altellawi, L. A., Al-Ali, R., & Almomani, O. (2024). Classification of cybersecurity threats, vulnerabilities and countermeasures in database systems. Computers, Materials & Continua, 1–10. https://doi.org/10.32604/cmc.2024.057673

• Raji, A. N., Olawore, A. O., Ayodeji, A., & Joseph, J. (2023). Integrating artificial intelligence, machine learning, and data analytics in cybersecurity: A holistic approach to advanced threat detection and response. World Journal of Advanced Research and Reviews, 20(3), 2005–2024. https://doi.org/10.30574/wjarr.2023.20.3.2741

• Guo, Y. (2022). A review of machine learning-based zero-day attack detection: Challenges and future directions. Computer Communications, 198, 175–185. https://doi.org/10.1016/j.comcom.2022.11.001

• Wang, Y., Xi, J., & Cheng, T. (2021). The overview of database security threats’ solutions: Traditional and machine learning. Journal of Information Security, 12(1), 34–55. https://doi.org/10.4236/jis.2021.121002

• Shchavinskyi, Y., & Budzynskyi, O. (2025). Analysis of current problems of security of corporate databases in the conditions of modern infrastructure and ways to solution them. Cybersecurity: Education, Science, Technique, 3(27), 390–405. https://doi.org/10.28925/2663-4023.2025.27.726

• Kostiuk, Y., Bebeshko, B., Kriuchkova, L., Lytvynov, V., Oksanych, I., Skladannyi, P., & Khorolska, K. (2024). Information protection and data exchange security in wireless mobile networks with authentication and key exchange protocols. Cybersecurity: Education, Science, Technique, 1(25), 229–252. https://doi.org/10.28925/2663-4023.2024.25.229252

• Kyrychok, R. V., Skladannyi, P. M., Buriachok, V. L., Hulak, H. M., & Kozachok, V. A. (2016). Problems of ensuring control over the security of corporate networks and ways to solve them. Scientific Notes of the Ukrainian Research Institute of Communications, 3(43), 48–61. https://journals.dut.edu.ua/index.php/sciencenotes/article/view/772/716

• Adenubi, A. O., & Oduroye, P. A. (2024). Data security in big data: Challenges, strategies, and future trends. International Journal of Research in Education Humanities and Commerce, 5(2), 1–15. https://doi.org/10.37602/ijrehc.2024.5201

• Bao, R., Chen, Z., & Obaidat, M. S. (2018). Challenges and techniques in big data security and privacy: A review. Security and Privacy, 1(4), e13. https://doi.org/10.1002/spy2.13

• Li, X., Wang, Z., Leung, V. C. M., Ji, H., Liu, Y., & Zhang, H. (2021). Blockchain-empowered data-driven networks. ACM Computing Surveys, 54(3), 1–38. https://doi.org/10.1145/3446373

• Budzynskyi, O. (2025). Method of detecting vulnerabilities and automated response in corporate database protection systems. Modern Information Security, 62(2). https://doi.org/10.31673/2409-7292.2025.029259

• Matseniuk, Y., & Partyka, A. (2024). The concept of automated compliance verification as the foundation of a fundamental cloud security model. Computer Systems and Networks, 6(1), 108–123. https://doi.org/10.23939/csn2024.01.108

• Kostiuk, Yu. V., Skladannyi, P. M., Bebeshko, B. T., Khorolska, K. V., Rzaieva, S. L., & Vorokhob, M. V. (2025). Information and communication systems security [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.

• Kostiuk, Yu. V., Skladannyi, P. M., Hulak, H. M., Bebeshko, B. T., Khorolska, K. V., & Rzaieva, S. L. (2025). Information security systems [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.

• Hulak, H. M., Zhyltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2023). Enterprise information and cyber security [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.

Downloads


Abstract views: 19

Published

2025-09-26

How to Cite

Lehominova , S., Kapeliushna, T., Shchavinskyi, Y., Zaporozhchenko, M., & Budzynskyi, O. (2025). CONCEPT OF AUTOMATED RESPONSE TO THREATS IN CORPORATE DATABASES IN REAL-TIME MODE. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(29), 676–686. https://doi.org/10.28925/2663-4023.2025.29.927

Most read articles by the same author(s)

1 2 > >>