Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper).
Asmaa SallamQian XiaoElisa BertinoDaren FadolalkarimPublished in: IRI (2016)
Keyphrases
- anomaly detection
- invited paper
- database
- intrusion detection
- computer security
- network traffic
- network intrusion detection
- anomalous behavior
- detecting anomalies
- intrusion detection system
- databases
- network anomaly detection
- insider threat
- artificial intelligence
- negative selection algorithm
- information security
- network security
- detect anomalies
- information retrieval
- cumulative sum
- malware detection
- unsupervised learning
- sensitive data
- lecture notes
- data mining applications
- image segmentation
- machine learning