Youseef Alotaibi*
CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1879-1895, 2021, DOI:10.32604/cmc.2020.013739
- 26 November 2020
Abstract A new secured database management system architecture using intrusion detection systems (IDS) is proposed in this paper for organizations with no previous role mapping for users. A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm. A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’ profiles. Then, queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious. The IDS… More >