This document presents a new approach for database intrusion detection that takes into account the sensitivity of database attributes. The approach assigns weights to attributes based on their sensitivity and generates read and write rules for highly sensitive attributes. Transactions are checked against these rules, and any that do not comply are flagged as malicious. The methodology involves generating frequent patterns from sensitive attributes, checking for write operations, and applying the generated read and write rules. The system was tested on a bank database and produced reports to identify malicious transactions in an audit log file. This dynamic, rule-based approach aims to more accurately detect intrusions by focusing on modifications to important database attributes.