This document proposes creating user and application profiles to detect database intrusions, developing algorithms to efficiently detect anomalous behavior, and implementing response strategies in PostgreSQL. The goals are to 1) create profiles representing normal behavior, 2) detect intrusions through anomalous behavior analysis, and 3) respond to intrusions through the database itself. The methods will be implemented in PostgreSQL to highlight issues.