Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with tools and methods that can detect anomalies in data access. By analyzing the input query syntax and the amount of data returned in the responses, we can deduce individuals' access patterns. Our method is based on SQL queries in database log files, which allow us to build profiles of ordinary users' access behavior by their doctors. Anomalies that deviate from these characteristics are deemed anomalous and thus indicative of possible data exfiltration or misuse. This ...
• A submitted manuscript is the version of the article upon submission and before peer-review. There...
Anomaly detection identifies unusual patterns or items in a dataset. The anomalies identified for sy...
The concerns for the cyber security threats have increased drastically since the increase in the use...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
A considerable effort has been recently devoted to the development of Database Management Systems (D...
We focus on automatic anomaly detection in SQL databases for security systems. Many logs of database...
Most of valuable information resources for any organization are stored in the database; it is a seri...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
Countering threats to an organization\u27s internal databases from database applications is an impor...
Database is a critical component of today’s Web applications. Web applications permit users to remot...
Data analytics over generated personal data has the potential to derive meaningful insights to enabl...
Logs generated by the applications, devices, and servers contain information that can be used to det...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
Despite protected by firewalls and network security systems, databases are vulnerable to attacks esp...
• A submitted manuscript is the version of the article upon submission and before peer-review. There...
Anomaly detection identifies unusual patterns or items in a dataset. The anomalies identified for sy...
The concerns for the cyber security threats have increased drastically since the increase in the use...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
A considerable effort has been recently devoted to the development of Database Management Systems (D...
We focus on automatic anomaly detection in SQL databases for security systems. Many logs of database...
Most of valuable information resources for any organization are stored in the database; it is a seri...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
Countering threats to an organization\u27s internal databases from database applications is an impor...
Database is a critical component of today’s Web applications. Web applications permit users to remot...
Data analytics over generated personal data has the potential to derive meaningful insights to enabl...
Logs generated by the applications, devices, and servers contain information that can be used to det...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
Despite protected by firewalls and network security systems, databases are vulnerable to attacks esp...
• A submitted manuscript is the version of the article upon submission and before peer-review. There...
Anomaly detection identifies unusual patterns or items in a dataset. The anomalies identified for sy...
The concerns for the cyber security threats have increased drastically since the increase in the use...