Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches

    One of the data security and privacy concerns is of insider threats, where legitimate users of the system abuse the access privileges they hold. The insider threat to data security means that an insider steals...

    Muhammad Imran Khan, Simon N. Foley in Emerging Information Security and Applicat… (2022)

  2. No Access

    Chapter and Conference Paper

    Detecting Anomalous Behavior in DBMS Logs

    It is argued that anomaly-based techniques can be used to detect anomalous DBMS queries by insiders. An experiment is described whereby an n-gram model is used to capture normal query patterns in a log of SQL ...

    Muhammad Imran Khan, Simon N. Foley in Risks and Security of Internet and Systems (2017)