The document discusses mechanisms for real-time intrusion detection and response in databases. It describes building an anomaly detection and response system integrated with core database operations. The key contributions are:
1) Anomalous access pattern detection in databases using SQL query features at different granularity levels and role-based or unsupervised anomaly detection.
2) An interactive event-condition-action response policy language and algorithms for matching policies to detected anomalies. Policies support fine-grained response actions.
3) A privilege state-based access control mechanism and a joint threshold administration model for response policy administration. The system was prototyped in PostgreSQL.