This document describes a project to develop an intrusion detection system (IDS) using query pattern access and fuzzy clustering. The system aims to detect insider threats and prevent inference attacks on sensitive database attributes by monitoring user access patterns. It will create user profiles based on historical access logs and detect anomalies by comparing new queries to the profiles. Fuzzy clustering will be used to partition users into groups with similar access patterns defined by cluster profiles containing access rules. The IDS seeks to enforce database security while addressing the limitations of existing syntactic and data-centric auditing approaches.
Related topics: