We focus on automatic anomaly detection in SQL databases for security systems.Many logs of database systems, here the Townhall database, contain detailed information about users, like the SQL queries and the response of the database.A database is a list of log instances, where each log instance is a Cartesian product of feature values with an attached anomaly score. All log instances with the anomaly score in the top percentile are identified as anomalous. Our contribution is multi-folded. We define a model for anomaly detection of SQL databases that learns the structure of Bayesian networks from data. Our method for automatic feature extraction generates the maximal spanning tree to detect the strongest similarities between features. Novel...
We propose a novel approach which combines the use of Bayesian network and probabilistic association...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
This paper contains review of algorithms, methods and tools nowadays used for anomaly detection.Anom...
We focus on automatic anomaly detection in SQL databases for security systems.Many logs of database ...
• A submitted manuscript is the version of the article upon submission and before peer-review. There...
Today, there has been a massive proliferation of huge databases storing valuable information. The op...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
Most of valuable information resources for any organization are stored in the database; it is a seri...
International audienceThe last decades improvements in processing abilities have quickly led to an i...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
The increasing use of Information Technology applications in the distributed environment is increasi...
Database Operating System (DBOS) is a new operating system (OS) framework that replaces the traditio...
In some domains of application, like software development and health care processes, a normative bus...
Anomaly Detection is an important aspect of many application domains. It refers to the problem of fi...
We propose a novel approach which combines the use of Bayesian network and probabilistic association...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
This paper contains review of algorithms, methods and tools nowadays used for anomaly detection.Anom...
We focus on automatic anomaly detection in SQL databases for security systems.Many logs of database ...
• A submitted manuscript is the version of the article upon submission and before peer-review. There...
Today, there has been a massive proliferation of huge databases storing valuable information. The op...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
Most of valuable information resources for any organization are stored in the database; it is a seri...
International audienceThe last decades improvements in processing abilities have quickly led to an i...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
The increasing use of Information Technology applications in the distributed environment is increasi...
Database Operating System (DBOS) is a new operating system (OS) framework that replaces the traditio...
In some domains of application, like software development and health care processes, a normative bus...
Anomaly Detection is an important aspect of many application domains. It refers to the problem of fi...
We propose a novel approach which combines the use of Bayesian network and probabilistic association...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
This paper contains review of algorithms, methods and tools nowadays used for anomaly detection.Anom...