{"id":"https://openalex.org/W4387760964","doi":"https://doi.org/10.1109/ipccc59175.2023.10253824","title":"UDAD: An Accurate Unsupervised Database Anomaly Detection Method","display_name":"UDAD: An Accurate Unsupervised Database Anomaly Detection Method","publication_year":2023,"publication_date":"2023-10-18","ids":{"openalex":"https://openalex.org/W4387760964","doi":"https://doi.org/10.1109/ipccc59175.2023.10253824"},"language":"en","primary_location":{"id":"doi:10.1109/ipccc59175.2023.10253824","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ipccc59175.2023.10253824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100578041","display_name":"Huazhen Zhong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huazhen Zhong","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100403428","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0002-0343-3499"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["China Mobile Information Technology Center,Beijing,China","China Mobile Information Technology Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Mobile Information Technology Center,Beijing,China","institution_ids":["https://openalex.org/I180662265"]},{"raw_affiliation_string":"China Mobile Information Technology Center, Beijing, China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048412206","display_name":"Yining Zhao","orcid":"https://orcid.org/0000-0002-3156-0858"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yining Zhao","raw_affiliation_strings":["China Mobile Information Technology Center,Beijing,China","China Mobile Information Technology Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Mobile Information Technology Center,Beijing,China","institution_ids":["https://openalex.org/I180662265"]},{"raw_affiliation_string":"China Mobile Information Technology Center, Beijing, China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101798257","display_name":"Weifang Zhang","orcid":"https://orcid.org/0000-0002-6222-278X"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weifang Zhang","raw_affiliation_strings":["China Mobile Information Technology Center,Beijing,China","China Mobile Information Technology Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Mobile Information Technology Center,Beijing,China","institution_ids":["https://openalex.org/I180662265"]},{"raw_affiliation_string":"China Mobile Information Technology Center, Beijing, China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085850141","display_name":"Wenjie Xiao","orcid":"https://orcid.org/0000-0002-4734-683X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjie Xiao","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047580108","display_name":"Xuehai Tang","orcid":"https://orcid.org/0000-0002-9901-4087"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuehai Tang","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075305753","display_name":"Liangjun Zang","orcid":"https://orcid.org/0000-0003-3483-521X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangjun Zang","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100578041"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1612996,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"109","last_page":"115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.814205527305603},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7052619457244873},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.6558977961540222},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.6390044689178467},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5977314710617065},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5142202377319336},{"id":"https://openalex.org/keywords/unsupervised-learning","display_name":"Unsupervised learning","score":0.46605736017227173},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4239305257797241},{"id":"https://openalex.org/keywords/sql","display_name":"SQL","score":0.41552361845970154},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3761987090110779},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3334890305995941},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.2382727861404419}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.814205527305603},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7052619457244873},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.6558977961540222},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.6390044689178467},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5977314710617065},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5142202377319336},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.46605736017227173},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4239305257797241},{"id":"https://openalex.org/C510870499","wikidata":"https://www.wikidata.org/wiki/Q47607","display_name":"SQL","level":2,"score":0.41552361845970154},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3761987090110779},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3334890305995941},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2382727861404419},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ipccc59175.2023.10253824","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ipccc59175.2023.10253824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1481547447","https://openalex.org/W1520397516","https://openalex.org/W1732232563","https://openalex.org/W1965630947","https://openalex.org/W1978394996","https://openalex.org/W2089303860","https://openalex.org/W2107263349","https://openalex.org/W2122646361","https://openalex.org/W2134490011","https://openalex.org/W2296719434","https://openalex.org/W2344901352","https://openalex.org/W2561748473","https://openalex.org/W2583874385","https://openalex.org/W2593412302","https://openalex.org/W2614763420","https://openalex.org/W2754665629","https://openalex.org/W2756489700","https://openalex.org/W2767094836","https://openalex.org/W2794215185","https://openalex.org/W2801426799","https://openalex.org/W2810913013","https://openalex.org/W2950361482","https://openalex.org/W2986944522","https://openalex.org/W3081497074","https://openalex.org/W3099780882","https://openalex.org/W3194035167","https://openalex.org/W4206816327","https://openalex.org/W4226128225","https://openalex.org/W4281741212","https://openalex.org/W4385245566","https://openalex.org/W6748102297"],"related_works":["https://openalex.org/W3186512740","https://openalex.org/W3017266184","https://openalex.org/W3202913553","https://openalex.org/W3194885736","https://openalex.org/W3046391934","https://openalex.org/W4363671829","https://openalex.org/W4285233543","https://openalex.org/W2997921738","https://openalex.org/W2965146396","https://openalex.org/W2770818364"],"abstract_inverted_index":{"Database":[0],"systems":[1],"are":[2],"widely":[3],"employed":[4],"to":[5,37],"store":[6],"crucial":[7],"data":[8],"across":[9],"domains.":[10],"However,":[11],"an":[12,111,116],"increasing":[13],"emergence":[14],"of":[15,60,103,110,125],"stealthy":[16,87],"abnormal":[17,88,126],"database":[18,89],"access":[19,90],"behaviors,":[20],"such":[21],"as":[22,62,75],"re-identification":[23],"and":[24,35,115,122],"differential":[25],"attacks,":[26],"has":[27],"been":[28],"observed.":[29],"These":[30],"behaviors":[31],"exhibit":[32],"short":[33],"durations":[34],"similarities":[36],"normal":[38,69],"actions,":[39],"challenging":[40],"existing":[41],"detection":[42,121],"methods.":[43,140],"Moreover,":[44],"current":[45],"approaches":[46],"lack":[47],"granularity":[48],"in":[49],"pinpointing":[50],"anomalies":[51],"at":[52],"the":[53,65,101,108],"operational":[54],"level.":[55],"They":[56],"treat":[57],"entire":[58],"sequences":[59],"operations":[61],"anomalies,":[63],"though":[64],"majority":[66],"likely":[67],"represent":[68],"behavior,":[70],"with":[71],"only":[72],"a":[73,81],"few":[74],"anomalies.":[76],"This":[77],"paper":[78],"presents":[79],"UDAD,":[80],"novel":[82],"method":[83],"for":[84],"precisely":[85],"detecting":[86],"behaviors.":[91],"By":[92],"transforming":[93],"SQL":[94],"statements":[95],"into":[96],"semantic":[97,105],"vectors,":[98],"we":[99],"enhance":[100],"learning":[102],"embedded":[104],"information.":[106],"Through":[107],"integration":[109],"attention-based":[112],"BiLSTM":[113],"model":[114],"autoencoder,":[117],"UDAD":[118,130],"achieves":[119],"accurate":[120],"precise":[123],"localization":[124],"operations.":[127],"We":[128],"evaluate":[129],"on":[131],"publicly":[132],"available":[133],"datasets,":[134],"demonstrating":[135],"its":[136],"superiority":[137],"over":[138],"state-of-the-art":[139]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
