Anomaly Detection Techniques for the Protection of Database Systems against Insider Threats