{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:02Z","timestamp":1773615842465,"version":"3.50.1"},"reference-count":29,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625701007","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:50Z","timestamp":1771936490000},"page":"1448-1456","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent Data Analysis and Processing for Detecting Insider Data Confidentiality Breaches in a DBMS"],"prefix":"10.3103","volume":"59","author":[{"given":"M. A.","family":"Poltavtseva","sequence":"first","affiliation":[]},{"given":"E. S.","family":"Lavrenko","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7935_CR1","unstructured":"Current cyber threats: Q1 2024. https:\/\/www.ptsecurity.com\/ru-ru\/research\/analytics\/cybersecurity-threatscape-2024-q1\/. Cited May 22, 2025."},{"key":"7935_CR2","doi-asserted-by":"publisher","first-page":"3189","DOI":"10.32604\/cmc.2024.057673","volume":"81","author":"M.A. Almaiah","year":"2024","unstructured":"Almaiah, M.A., Saqr, L.M., Al-Rawwash, L.A., Altellawi, L.A., Al-Ali, R., and Almomani, O., Classification of cybersecurity threats, vulnerabilities and countermeasures in database systems, Comput., \n               Mater. Continua, 2024, vol. 81, no. 2, pp. 3189\u20133220. https:\/\/doi.org\/10.32604\/cmc.2024.057673","journal-title":"Mater. Continua"},{"key":"7935_CR3","volume-title":"Network and Internetwork Security: Principles and Practice","author":"W. Stallings","year":"1995","unstructured":"Stallings, W., Network and Internetwork Security: Principles and Practice, Prentice-Hall, 1995, pp. 15\u201316."},{"key":"7935_CR4","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M.A., Evolution of data management systems and their security, 2019 International Conference on Engineering Technologies and Computer Science (EnT), Moscow, 2019, IEEE, 2019, pp. 25\u201329. https:\/\/doi.org\/10.1109\/ent.2019.00010","DOI":"10.1109\/ent.2019.00010"},{"key":"7935_CR5","doi-asserted-by":"publisher","first-page":"665","DOI":"10.3103\/s0146411615080180","volume":"49","author":"P.D. Zegzhda","year":"2015","unstructured":"Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665\u2013672. https:\/\/doi.org\/10.3103\/s0146411615080180","journal-title":"Autom. Control Comput. Sci."},{"key":"7935_CR6","first-page":"26","volume":"11","author":"M.A. Lawal","year":"2016","unstructured":"Lawal, M.A., Sultan, A.B.M., and Shakiru, A.O., Systematic literature review on SQL injection attack, International Journal of Soft Computing, 2016, vol. 11, no. 1, pp. 26\u201335.","journal-title":"International Journal of Soft Computing"},{"key":"7935_CR7","doi-asserted-by":"publisher","first-page":"e370","DOI":"10.1002\/spy2.370","volume":"7","author":"A. Kumar","year":"2024","unstructured":"Kumar, A., Dutta, S., and Pranav, P., Analysis of SQL injection attacks in the cloud and in WEB applications, Security and Privacy, 2024, vol. 7, no. 3, p. e370. https:\/\/doi.org\/10.1002\/spy2.370","journal-title":"Security and Privacy"},{"key":"7935_CR8","doi-asserted-by":"publisher","unstructured":"Khan, M.I., Foley, S.N., and O\u2019Sullivan, B., Database intrusion detection systems (DIDs): Insider threat detection via behaviour-based anomaly detection systems\u2014A brief survey of concepts and approaches, Emerging Information Security and Applications. EISA 2021, Meng, W. and Katsikas, S.K., Eds., Communications in Computer and Information Science, vol. 1403, Cham: Springer, 2021, pp. 178\u2013197. https:\/\/doi.org\/10.1007\/978-3-030-93956-4_11","DOI":"10.1007\/978-3-030-93956-4_11"},{"key":"7935_CR9","doi-asserted-by":"publisher","unstructured":"Amer, S., Security of DBMSs, Advances in Security, Networks, and Internet of Things, Daimi, K., Arabnia, H.R., Deligiannidis, L., Hwang, M.S., and Tinetti, F.G., Eds., Transactions on Computational Science and Computational Intelligence, Cham: Springer, 2021, pp. 449\u2013461. https:\/\/doi.org\/10.1007\/978-3-030-71017-0_32","DOI":"10.1007\/978-3-030-71017-0_32"},{"key":"7935_CR10","doi-asserted-by":"publisher","unstructured":"Dakhnovich, A., Moskvin, D., and Zegzhda, D., A necessary condition for Industrial Internet of Things sustainability, Mobile Internet Security. MobiSec 2021, You, I., Kim, H., Youn, T.Y., Palmieri, F., and Kotenko, I., Eds., Communications in Computer and Information Science, vol. 1544, Singapore: Springer, 2022, pp. 79\u201389. https:\/\/doi.org\/10.1007\/978-981-16-9576-6_7","DOI":"10.1007\/978-981-16-9576-6_7"},{"key":"7935_CR11","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/3391231","volume":"12","author":"G. Kul","year":"2020","unstructured":"Kul, G., Upadhyaya, Sh., and Hughes, A., An analysis of complexity of insider attacks to databases, ACM Transactions on Management Information Systems, 2020, vol. 12, no. 1, p. 4. https:\/\/doi.org\/10.1145\/3391231","journal-title":"ACM Transactions on Management Information Systems"},{"key":"7935_CR12","doi-asserted-by":"publisher","first-page":"906","DOI":"10.3103\/s014641161808014x","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Yu., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp.\u00a0906\u2013911. https:\/\/doi.org\/10.3103\/s014641161808014x","journal-title":"Autom. Control Comput. Sci."},{"key":"7935_CR13","doi-asserted-by":"publisher","first-page":"27237","DOI":"10.1109\/access.2024.3367004","volume":"12","author":"H. Satilmi\u015f","year":"2024","unstructured":"Satilmi\u015f, H., Akleylek, S., and Tok, Z.Y\u00fc., A systematic literature review on host-based intrusion detection systems, IEEE Access, 2024, vol. 12, pp. 27237\u201327266. https:\/\/doi.org\/10.1109\/access.2024.3367004","journal-title":"IEEE Access"},{"key":"7935_CR14","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1007\/s10207-023-00794-9","volume":"23","author":"H. Asad","year":"2024","unstructured":"Asad, H., Adhikari, S., and Gashi, I., A perspective\u2013retrospective analysis of diversity in signature-based open-source network intrusion detection systems, Int. J. Inf. Secur., 2024, vol. 23, no. 2, pp. 1331\u20131346. https:\/\/doi.org\/10.1007\/s10207-023-00794-9","journal-title":"Int. J. Inf. Secur."},{"key":"7935_CR15","doi-asserted-by":"publisher","first-page":"4745","DOI":"10.1109\/access.2023.3349287","volume":"12","author":"H. Liao","year":"2024","unstructured":"Liao, H., Murah, M.Z., Hasan, M.K., Aman, A.H.M., Fang, J., Hu, X., and Khan, A.U.R., A survey of deep learning technologies for intrusion detection in Internet of Things, IEEE Access, 2024, vol. 12, pp. 4745\u20134761. https:\/\/doi.org\/10.1109\/access.2023.3349287","journal-title":"IEEE Access"},{"key":"7935_CR16","doi-asserted-by":"publisher","first-page":"834","DOI":"10.3103\/s0146411620080246","volume":"54","author":"T.D. Ovasapyan","year":"2020","unstructured":"Ovasapyan, T.D., Knyazev, P.V., and Moskvin, D.A., Application of taint analysis to study the safety of software of the Internet of Things devices based on the ARM architecture, Autom. Control Comput. Sci., 2020, vol. 54, no.\u00a08, pp. 834\u2013840. https:\/\/doi.org\/10.3103\/s0146411620080246","journal-title":"Autom. Control Comput. Sci."},{"key":"7935_CR17","doi-asserted-by":"publisher","first-page":"2573","DOI":"10.1007\/s13042-023-02049-4","volume":"15","author":"I. Singh","year":"2024","unstructured":"Singh, I. and Jindal, R., Outlier based intrusion detection in databases for user behaviour analysis using weighted sequential pattern mining, Int. J. Mach. Learn. Cybern., 2024, vol. 15, no. 7, pp. 2573\u20132593. https:\/\/doi.org\/10.1007\/s13042-023-02049-4","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"7935_CR18","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/2694428.2694435","volume":"43","author":"R.J. Santos","year":"2014","unstructured":"Santos, R.J., Bernardino, J., and Vieira, M., Approaches and challenges in database intrusion detection, ACM SIGMOD Record, 2014, vol. 43, no. 3, pp. 36\u201347. https:\/\/doi.org\/10.1145\/2694428.2694435","journal-title":"ACM SIGMOD Record"},{"key":"7935_CR19","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.3103\/s0146411623080096","volume":"57","author":"M.O. Kalinin","year":"2023","unstructured":"Kalinin, M.O. and Tkacheva, E.I., A decentralized approach to intrusion detection in dynamic networks of the Internet of Things based on multiagent reinforcement learning with interagent interaction, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 1025\u20131032. https:\/\/doi.org\/10.3103\/s0146411623080096","journal-title":"Autom. Control Comput. Sci."},{"key":"7935_CR20","doi-asserted-by":"publisher","unstructured":"Wu, G.Zh., Osborn, S.L., and Jin, X., Database intrusion detection using role profiling with role hierarchy, Secure Data Management. SDM 2009, Jonker, W. and Petkovi\u0107, M., Eds., Lecture Notes in Computer Science, vol.\u00a05776, Berlin: Springer, 2009, pp. 33\u201348. https:\/\/doi.org\/10.1007\/978-3-642-04219-5_3","DOI":"10.1007\/978-3-642-04219-5_3"},{"key":"7935_CR21","doi-asserted-by":"publisher","unstructured":"Mahdi, A., Peters, S., Etalle, S., and Zannone, N., Behavior analysis in the medical sector: Theory and practice, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, Pau, France, 2018, New York: Association for Computing Machinery, 2018, pp. 1637\u20131646. https:\/\/doi.org\/10.1145\/3167132.3167307","DOI":"10.1145\/3167132.3167307"},{"key":"7935_CR22","doi-asserted-by":"publisher","unstructured":"Bockermann, Ch., Apel, M., and Meier, M., Learning SQL for database intrusion detection using context-sensitive modelling (extended abstract), Detection of Intrusions and Malware, and Vulnerability Assessment, Flegel, U. and Bruschi, D., Eds., Lecture Notes in Computer Science, vol. 5587, Berlin: Springer, 2009, pp. 196\u2013205. https:\/\/doi.org\/10.1007\/978-3-642-02918-9_12","DOI":"10.1007\/978-3-642-02918-9_12"},{"key":"7935_CR23","doi-asserted-by":"publisher","unstructured":"Bertino, E., Kamra, A., Terzi, E., and Vakali, A., Intrusion detection in RBAC-administered databases, 21st\u00a0Annual Computer Security Applications Conference (ACSAC\u201905), Tucson, AZ, 2005, IEEE, 2005. https:\/\/doi.org\/10.1109\/csac.2005.33","DOI":"10.1109\/csac.2005.33"},{"key":"7935_CR24","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1007\/s00778-007-0051-4","volume":"17","author":"A. Kamra","year":"2008","unstructured":"Kamra, A., Terzi, E., and Bertino, E., Detecting anomalous access patterns in relational databases, VLDB J., 2008, vol. 17, no. 5, pp. 1063\u20131077. https:\/\/doi.org\/10.1007\/s00778-007-0051-4","journal-title":"VLDB J."},{"key":"7935_CR25","doi-asserted-by":"publisher","unstructured":"Hussain, S.R., Sallam, A.M., and Bertino, E., Detanom: Detecting anomalous database transactions by insiders, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, San Antonio, TX, 2015, New York: Association for Computing Machinery, 2015, pp. 25\u201335. https:\/\/doi.org\/10.1145\/2699026.2699111","DOI":"10.1145\/2699026.2699111"},{"key":"7935_CR26","doi-asserted-by":"publisher","unstructured":"Mathew, S., Petropoulos, M., Ngo, H.Q., and Upadhyaya, Sh., A data-centric approach to insider attack detection in database systems, Recent Advances in Intrusion Detection. RAID 2010, Jha, S., Sommer, R., and Kreibich, C., Eds., Lecture Notes in Computer Science, vol. 6307, Berlin: Springer, 2010, pp. 382\u2013401. https:\/\/doi.org\/10.1007\/978-3-642-15512-3_20","DOI":"10.1007\/978-3-642-15512-3_20"},{"key":"7935_CR27","doi-asserted-by":"publisher","unstructured":"Khan, M.I., O\u2019Sullivan, B., and Foley, S.N., A semantic approach to frequency based anomaly detection of insider access in database management systems, Risks and Security of Internet and Systems. CRiSIS 2017, Cuppens, N., Cuppens, F., Lanet, J.L., Legay, A., and Garcia-Alfaro, J., Eds., Lecture Notes in Computer Science, vol.\u00a010694, Cham: Springer, 2017, pp. 18\u201328. https:\/\/doi.org\/10.1007\/978-3-319-76687-4_2","DOI":"10.1007\/978-3-319-76687-4_2"},{"key":"7935_CR28","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1002\/widm.1195","volume":"6","author":"A. Sallam","year":"2016","unstructured":"Sallam, A., Fadolalkarim, D., Bertino, E., and Xiao, Q., Data and syntax centric anomaly detection for relational databases, WIREs \n               Data Min. Knowl. Discovery, 2016, vol. 6, no. 6, pp. 231\u2013239. https:\/\/doi.org\/10.1002\/widm.1195","journal-title":"Data Min. Knowl. Discovery"},{"key":"7935_CR29","unstructured":"Northwind database for PostgreSQL. https:\/\/github.com\/pthom\/northwind_psql. Cited May 17, 2025."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701007.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625701007","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701007.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:24Z","timestamp":1773612324000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625701007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":29,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7935"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625701007","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"2 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}