Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Privacy preserving data mining of sequential patterns for network traffic data

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Seung Woo-
dc.contributor.authorPark, Sanghyun-
dc.contributor.authorWon, Jung Im-
dc.contributor.authorKim, Sang Wook-
dc.date.accessioned2022-12-21T08:41:02Z-
dc.date.available2022-12-21T08:41:02Z-
dc.date.created2022-09-16-
dc.date.issued2007-04-
dc.identifier.issn0302-9743-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/180239-
dc.description.abstractAs a total amount of traffic data in networks has been growing at an alarming rate, many researches to mine traffic data with the purpose of getting useful information are currently being performed. However, since network traffic data contain the information about Internet usage patterns of users, network users' privacy can be compromised during the mining process. In this paper, we propose an efficient and practical method for privacy preserving sequential pattern mining on network traffic data. In order to discover frequent sequential patterns without violating privacy, our method uses the N-repository server model that operates as a single mining server and the retention replacement technique that changes the answer to a query probabilistically. In addition, our method accelerates the overall mining process by maintaining the meta tables in each site. Extensive experiments with real-world network traffic data revealed the correctness and the efficiency of the proposed method.-
dc.language영어-
dc.language.isoen-
dc.publisherSpringer Verlag-
dc.titlePrivacy preserving data mining of sequential patterns for network traffic data-
dc.typeArticle-
dc.contributor.affiliatedAuthorWon, Jung Im-
dc.contributor.affiliatedAuthorKim, Sang Wook-
dc.identifier.doi10.1007/978-3-540-71703-4_19-
dc.identifier.scopusid2-s2.0-38049096092-
dc.identifier.bibliographicCitationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.4443 LNCS, pp.201 - 212-
dc.relation.isPartOfLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.citation.titleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.citation.volume4443 LNCS-
dc.citation.startPage201-
dc.citation.endPage212-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusMathematical models-
dc.subject.keywordPlusPattern recognition-
dc.subject.keywordPlusSecurity of data-
dc.subject.keywordPlusTelecommunication traffic-
dc.subject.keywordPlusNetwork traffic-
dc.subject.keywordPlusSequential pattern-
dc.subject.keywordPlusData mining-
dc.subject.keywordAuthorData mining-
dc.subject.keywordAuthorNetwork traffic-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorSequential pattern-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/978-3-540-71703-4_19-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles
서울 공과대학 > 서울 공학교육혁신센터 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Won, Jung Im photo

Won, Jung Im
COLLEGE OF ENGINEERING (INNOVATION CENTER FOR ENGINEERING EDUCATION)
Read more

Altmetrics

Total Views & Downloads

BROWSE