Database intrusion detection using role and user behavior based risk assessment.
Indu SinghNarendra KumarSrinivasa K. G.Tript SharmaVaibhav KumarSiddharth SinghalPublished in: J. Inf. Secur. Appl. (2020)
Keyphrases
- intrusion detection
- network security
- risk assessment
- database
- information security
- intrusion detection system
- anomaly detection
- network traffic
- risk factors
- network intrusion
- network intrusion detection
- computer networks
- risk analysis
- high detection rate
- data mining
- database systems
- risk management
- cyber security
- databases
- detecting anomalous
- network attacks
- data sets
- information systems
- smart grid
- data model
- machine learning
- fraud detection
- smart card
- monitoring system
- control system
- dos attacks
- normal behavior
- expert systems
- alert correlation
- network intrusions