作者: Donald Berndt , Areej Yassin , Monica Chiarini
DOI:
关键词:
摘要: In this study a preliminary investigative data warehouse is developed to integrate and store very detailed audit from multiple sources support comprehensive view of database usage potential security breaches. The was populated with real collected over year use by students in variety classes. This extracted seeded some unusual patterns that represent intrusions into systems or misuse insiders. A pivot table interface shown as an example human-in-the-loop navigation tool for investigating activity at level. Market basket analysis explored mining technique uncovering rare patterns. resulting rules identified most the demonstrating such automated techniques detecting malicious unauthorized activities.