Naserinia et al., 2022 - Google Patents
Anomaly Detection in a SQL database: A Retrospective InvestigationNaserinia et al., 2022
View PDF- Document ID
- 9929961778584120949
- Author
- Naserinia V
- Beremark M
- Publication year
External Links
Snippet
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with …
- 238000001514 detection method 0 title description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230359770A1 (en) | Computer-implemented privacy engineering system and method | |
Liu et al. | Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise | |
Kamra et al. | Detecting anomalous access patterns in relational databases | |
Li et al. | Private graph data release: A survey | |
Srivastava et al. | Database Intrusion Detection using Weighted Sequence Mining. | |
CN119254489B (en) | Information network security self-defense method and system based on trusted computing | |
Wang et al. | Heterogeneous graph matching networks: Application to unknown malware detection | |
Wang | Statistical techniques for network security: modern statistically-based intrusion detection and protection: modern statistically-based intrusion detection and protection | |
Alhajjar et al. | Survival analysis for insider threat: Detecting insider threat incidents using survival analysis techniques | |
Seh et al. | An analysis of integrating machine learning in healthcare for ensuring confidentiality of the electronic records | |
CN119205351A (en) | A method and device for tracking and tracing asset risks | |
US12294589B2 (en) | Cloud-platform push for known data breaches | |
Gratian et al. | Identifying infected users via network traffic | |
Berdibayev et al. | A concept of the architecture and creation for siem system in critical infrastructure | |
Choi et al. | An easy-to-use framework to build and operate ai-based intrusion detection for in-situ monitoring | |
Jindal et al. | Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining | |
Asif et al. | Identifying anomalies while preserving privacy | |
Naserinia et al. | Anomaly Detection in a SQL database: A Retrospective Investigation | |
Hu et al. | Method for cyber threats detection and identification in modern cloud services | |
Asenjo | Data masking, encryption, and their effect on classification performance: trade-offs between data security and utility | |
Subbaratinam | Machine Learning Based Risk Classification of Vulnerabilities Incorporating Mitre Att&Ck Framework and Threat Intelligence | |
Kul et al. | An analysis of complexity of insider attacks to databases | |
KR102146526B1 (en) | Query classification method for database intrusion detection | |
Mardini-Bovea et al. | Training and Classification Techniques in Intrusion Detection Systems Based on Network Anomalies Comparative Study | |
Cheng et al. | SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs |