“…Most of research on intrusion prevention focuses on preventing attacks on operating systems and computer networks [1], [2], [3], [4], [5]. Although auditing tools are , provided by most of popular DBMS and there are some works on database intrusion detection [6], [7], [8], [9], [10], [11], [12], [13], these methods focus on detecting attacks after the event, so they can not realize intrusion prevention for database.…”