Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici
Proceedings of the 18th ACM conference on Computer and communications …, 2011
In this paper, we propose a new unsupervised approach for identifying suspicious access to sensitive relational data. In the proposed method, a tree-like model encapsulates the characteristics of the result-set (i.e., data) that the user normally access within each possible context. During the detection phase, result-sets are examined against the induced model and a similarity score is derived.