“…It is necessary to consider the audit logs of SQL queries at some level of abstraction, for example, in their use for anomaly-based intrusion detection systems to detect insider threats to an organization's DBMS (Lee et al, 2002 ; Low et al, 2002 ; Hussain et al, 2015 ; Kul et al, 2016 ; Sallam et al, 2016 ), where an insider is an employee of an organization with legitimate access privileges (Uno et al, 2004 ; Koh and Rountree, 2005 ). The use of abstraction, in practice, is considered since audit logs typically encompass a large number of queries.…”