dc.contributor.author | Taipalus Toni | |
dc.contributor.author | Grahn Hilkka | |
dc.contributor.author | Turtiainen Hannu | |
dc.contributor.author | Costin Andrei | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Karjalainen, Mika | |
dc.date.accessioned | 2024-06-27T12:26:42Z | |
dc.date.available | 2024-06-27T12:26:42Z | |
dc.date.issued | 2024 | |
dc.identifier.citation | Taipalus Toni, Grahn Hilkka, Turtiainen Hannu, Costin Andrei. (2024). Utilizing Vector Database Management Systems in Cyber Security. In M. Lehto, & M. Karjalainen (Eds.), <i>Proceedings of the 23rd European Conference on Cyber Warfare and Security</i> (23, pp. 560-565). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.23.1.2220" target="_blank">https://doi.org/10.34190/eccws.23.1.2220</a> | |
dc.identifier.other | CONVID_220828029 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/96213 | |
dc.description.abstract | The rising popularity of phenomena such as ubiquitous computing and IoT poses increasingly high demands for data management, and it is not uncommon that database management systems (DBMS) must be capable of reading and writing hundreds of operations per second. Vector DBMSs (VDBMS) are novel products that focus on the management of vector data and can alleviate data management pressures by storing data objects such as logs, system calls, emails, network flow data, and memory dumps in feature vectors that are computationally efficient in both storage and information retrieval. VDMBSs allow efficient nearest neighbour similarity search on complex data objects, which can be used in various cyber security applications such as anomaly, intrusion, malware detection, user behaviour analysis, and network flow analysis. This study describes VDBMSs and some of their use cases in cyber security. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International Ltd | |
dc.relation.ispartof | Proceedings of the 23rd European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European Conference on Cyber Warfare and Security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | vector database | |
dc.subject.other | anomaly detection | |
dc.subject.other | traffic analysis | |
dc.subject.other | cyber security | |
dc.subject.other | phishing detection | |
dc.title | Utilizing Vector Database Management Systems in Cyber Security | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-202406275055 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 560-565 | |
dc.relation.issn | 2048-8602 | |
dc.relation.numberinseries | 1 | |
dc.relation.volume | 23 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2024 European Conference on Cyber Warfare and Security | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | verkkourkinta | |
dc.subject.yso | tietoturva | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27723 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.34190/eccws.23.1.2220 | |
jyx.fundinginformation | Hannu Turtiainen thanks the Finnish Cultural Foundation / Suomen Kulttuurirahasto for supporting his Ph.D. dissertation work and research (grant decision no. 00231412). | |
dc.type.okm | A4 | |