We focus on automatic anomaly detection in SQL databases for security systems. Many logs of database systems, here the Townhall database, contain detailed information about users, like the SQL queries and the response of the database. A database is a list of log instances, where each log instance is a Cartesian product of feature values with an attached anomaly score. All log instances with the anomaly score in the top percentile are identified as anomalous. Our contribution is multi-folded. We define a model for anomaly detection of SQL databases that learns the structure of Bayesian networks from data. Our method for automatic feature extraction generates the maximal spanning tree to detect the strongest similarities between features. Nov...
Logs generated by the applications, devices, and servers contain information that can be used to det...
Countering threats to an organization\u27s internal databases from database applications is an impor...
Anomaly detection identifies unusual patterns or items in a dataset. The anomalies identified for sy...
We focus on automatic anomaly detection in SQL databases for security systems.\u3cbr/\u3eMany logs o...
• A submitted manuscript is the version of the article upon submission and before peer-review. There...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
Today, there has been a massive proliferation of huge databases storing valuable information. The op...
Most of valuable information resources for any organization are stored in the database; it is a seri...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
Anomaly detection in database management systems (DBMSs) is difficult because of increasing number o...
A considerable effort has been recently devoted to the development of Database Management Systems (D...
Database Operating System (DBOS) is a new operating system (OS) framework that replaces the traditio...
International audienceThe last decades improvements in processing abilities have quickly led to an i...
We propose a novel approach which combines the use of Bayesian network and probabilistic association...
Logs generated by the applications, devices, and servers contain information that can be used to det...
Countering threats to an organization\u27s internal databases from database applications is an impor...
Anomaly detection identifies unusual patterns or items in a dataset. The anomalies identified for sy...
We focus on automatic anomaly detection in SQL databases for security systems.\u3cbr/\u3eMany logs o...
• A submitted manuscript is the version of the article upon submission and before peer-review. There...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
Today, there has been a massive proliferation of huge databases storing valuable information. The op...
Most of valuable information resources for any organization are stored in the database; it is a seri...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
Anomaly detection in database management systems (DBMSs) is difficult because of increasing number o...
A considerable effort has been recently devoted to the development of Database Management Systems (D...
Database Operating System (DBOS) is a new operating system (OS) framework that replaces the traditio...
International audienceThe last decades improvements in processing abilities have quickly led to an i...
We propose a novel approach which combines the use of Bayesian network and probabilistic association...
Logs generated by the applications, devices, and servers contain information that can be used to det...
Countering threats to an organization\u27s internal databases from database applications is an impor...
Anomaly detection identifies unusual patterns or items in a dataset. The anomalies identified for sy...