2006
DOI: 10.1007/11875604_56
|View full text |Cite
|
Sign up to set email alerts
|

Mining and Modeling Database User Access Patterns

Abstract: Abstract. We present our approach to mining and modeling the behavior of database users. In particular, we propose graphic models to capture the database user's dynamic behavior and focus on applying data mining techniques to the problem of mining and modeling database user behaviors from database trace logs. The experimental results show that our approach can discover and model user behaviors successfully.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2011
2011

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Similarly, the authors in [9] use Markov models to estimate the next transaction a user will execute based on what transaction the DBMS is executing now. The work described in [27] does use Markov models based on queries much like ours, but their models are designed to identify user sessions across transactional boundaries and to extract additional usage patterns for off-line analysis purposes.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, the authors in [9] use Markov models to estimate the next transaction a user will execute based on what transaction the DBMS is executing now. The work described in [27] does use Markov models based on queries much like ours, but their models are designed to identify user sessions across transactional boundaries and to extract additional usage patterns for off-line analysis purposes.…”
Section: Related Workmentioning
confidence: 99%
“…From the perspective of improving system performance, optimizing web application deployment and achieving load balance rely on knowledge of system utilization and user request patterns [4][5]. From the perspective of security and privacy assurance, system usage patterns can be analyzed to learn profiles for anomaly detection systems, defend against outsider intrusions, and identify insider threats [6][7].…”
Section: Introductionmentioning
confidence: 99%