Anomaly detection of access patterns in database.
Jong-Hyuk RohSung-Hun LeeSoohyung KimPublished in: ICTC (2015)
Keyphrases
- anomaly detection
- access patterns
- database
- intrusion detection
- detecting anomalies
- databases
- anomalous behavior
- network anomaly detection
- prefetching
- relational databases
- database systems
- intrusion detection system
- network intrusion detection
- network traffic
- data management
- web logs
- one class support vector machines
- database applications
- file system
- web users
- information retrieval
- detect anomalies
- database management systems
- data streams
- data model
- data warehouse
- search engine
- unsupervised learning