[go: up one dir, main page]

Naserinia et al., 2022 - Google Patents

Anomaly Detection in a SQL database: A Retrospective Investigation

Naserinia et al., 2022

View PDF
Document ID
9929961778584120949
Author
Naserinia V
Beremark M
Publication year

External Links

Snippet

Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with …
Continue reading at www.diva-portal.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30477Query execution
    • G06F17/30507Applying rules; deductive queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications

Similar Documents

Publication Publication Date Title
US20230359770A1 (en) Computer-implemented privacy engineering system and method
Liu et al. Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise
Kamra et al. Detecting anomalous access patterns in relational databases
Li et al. Private graph data release: A survey
Srivastava et al. Database Intrusion Detection using Weighted Sequence Mining.
CN119254489B (en) Information network security self-defense method and system based on trusted computing
Wang et al. Heterogeneous graph matching networks: Application to unknown malware detection
Wang Statistical techniques for network security: modern statistically-based intrusion detection and protection: modern statistically-based intrusion detection and protection
Alhajjar et al. Survival analysis for insider threat: Detecting insider threat incidents using survival analysis techniques
Seh et al. An analysis of integrating machine learning in healthcare for ensuring confidentiality of the electronic records
CN119205351A (en) A method and device for tracking and tracing asset risks
US12294589B2 (en) Cloud-platform push for known data breaches
Gratian et al. Identifying infected users via network traffic
Berdibayev et al. A concept of the architecture and creation for siem system in critical infrastructure
Choi et al. An easy-to-use framework to build and operate ai-based intrusion detection for in-situ monitoring
Jindal et al. Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining
Asif et al. Identifying anomalies while preserving privacy
Naserinia et al. Anomaly Detection in a SQL database: A Retrospective Investigation
Hu et al. Method for cyber threats detection and identification in modern cloud services
Asenjo Data masking, encryption, and their effect on classification performance: trade-offs between data security and utility
Subbaratinam Machine Learning Based Risk Classification of Vulnerabilities Incorporating Mitre Att&Ck Framework and Threat Intelligence
Kul et al. An analysis of complexity of insider attacks to databases
KR102146526B1 (en) Query classification method for database intrusion detection
Mardini-Bovea et al. Training and Classification Techniques in Intrusion Detection Systems Based on Network Anomalies Comparative Study
Cheng et al. SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs