Abstract:
Data security has a critical role in the larger context of information and system security. In this paper, we propose the anomaly detection system for securing database. ...Show MoreMetadata
Abstract:
Data security has a critical role in the larger context of information and system security. In this paper, we propose the anomaly detection system for securing database. Our approach is based on analyzing the user's access pattern stored in database log and detecting the anomalous access event. We consider three methods for this, user pattern analysis, machine learning analysis, and rule-based access control. Our experimental evaluation on both real and virtual database shows that our approaches work well.
Published in: 2015 International Conference on Information and Communication Technology Convergence (ICTC)
Date of Conference: 28-30 October 2015
Date Added to IEEE Xplore: 17 December 2015
ISBN Information: