2005
DOI: 10.1007/11408079_77
|View full text |Cite
|
Sign up to set email alerts
|

Finding and Analyzing Database User Sessions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2005
2005
2019
2019

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(18 citation statements)
references
References 12 publications
0
18
0
Order By: Relevance
“…The database itself consists of 119 tables with 1142 attributes in all. For more detailed description of the data set we refer the reader to [25].…”
Section: Real Data Setmentioning
confidence: 99%
“…The database itself consists of 119 tables with 1142 attributes in all. For more detailed description of the data set we refer the reader to [25].…”
Section: Real Data Setmentioning
confidence: 99%
“…Few methods for session boundaries identification that rely on known user identity have been proposed [14][15][16][17]. The session identification task involves identifying session boundaries from the log of database events.…”
Section: Related Workmentioning
confidence: 99%
“…This approach cannot handle adhoc queries (as the authors themselves state) and works at the coarse-grained transaction level as opposed to the fine-grained query level. Database session identification is the focus of [22]: queries within a session are considered to be related to each other, and an information theoretic metric (entropy) is used to separate sessions; however, whole queries are used as the basic unit for n-gram-statistical modeling of sessions. A multiagent based approach to database intrusion detection is presented in [23]; relatively simple metrics such as access frequency, object requests and utilization and execution denials/violations are used to audit user behavior.…”
Section: Related Workmentioning
confidence: 99%