Privacy preserving data mining of sequential patterns for network traffic data
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Seung-Woo | - |
dc.contributor.author | Park, Sanghyun | - |
dc.contributor.author | Won, Jung-Im | - |
dc.contributor.author | Kim, Sang-Wook | - |
dc.date.accessioned | 2022-12-21T04:22:23Z | - |
dc.date.available | 2022-12-21T04:22:23Z | - |
dc.date.created | 2022-08-26 | - |
dc.date.issued | 2008-02 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/179018 | - |
dc.description.abstract | As the total amount of traffic data in networks has been growing at an alarming rate, there is currently a substantial body of research that attempts to mine traffic data with the purpose of obtaining useful information. For instance, there are some investigations into the detection of Internet worms and intrusions by discovering abnormal traffic patterns. However, since network traffic data contain information about the Internet usage patterns of users, network users' privacy may be compromised during the mining process. In this paper, we propose an efficient and practical method that preserves privacy during sequential pattern mining on network traffic data. In order to discover frequent sequential patterns without violating privacy, our method uses the N-repository server model, which operates as a single mining server and the retention replacement technique, which changes the answer to a query probabilistically. In addition, our method accelerates the overall mining process by maintaining the meta tables in each site so as to determine quickly whether candidate patterns have ever occurred in the site or not. Extensive experiments with real-world network traffic data revealed the correctness and the efficiency of the proposed method. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.title | Privacy preserving data mining of sequential patterns for network traffic data | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Won, Jung-Im | - |
dc.contributor.affiliatedAuthor | Kim, Sang-Wook | - |
dc.identifier.doi | 10.1016/j.ins.2007.08.022 | - |
dc.identifier.scopusid | 2-s2.0-35748979448 | - |
dc.identifier.wosid | 000251621700008 | - |
dc.identifier.bibliographicCitation | INFORMATION SCIENCES, v.178, no.3, pp.694 - 713 | - |
dc.relation.isPartOf | INFORMATION SCIENCES | - |
dc.citation.title | INFORMATION SCIENCES | - |
dc.citation.volume | 178 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 694 | - |
dc.citation.endPage | 713 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | Computer worms | - |
dc.subject.keywordPlus | Data mining | - |
dc.subject.keywordPlus | Data transfer | - |
dc.subject.keywordPlus | Servers | - |
dc.subject.keywordPlus | Telecommunication traffic | - |
dc.subject.keywordAuthor | data mining | - |
dc.subject.keywordAuthor | sequential pattern | - |
dc.subject.keywordAuthor | network traffic | - |
dc.subject.keywordAuthor | privacy | - |
dc.identifier.url | https://www.sciencedirect.com/science/article/pii/S0020025507004094?via%3Dihub | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.