Privacy preserving data mining of sequential patterns for network traffic data
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Seung Woo | - |
dc.contributor.author | Park, Sanghyun | - |
dc.contributor.author | Won, Jung Im | - |
dc.contributor.author | Kim, Sang Wook | - |
dc.date.accessioned | 2022-12-21T08:41:02Z | - |
dc.date.available | 2022-12-21T08:41:02Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2007-04 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/180239 | - |
dc.description.abstract | As a total amount of traffic data in networks has been growing at an alarming rate, many researches to mine traffic data with the purpose of getting useful information are currently being performed. However, since network traffic data contain the information about Internet usage patterns of users, network users' privacy can be compromised during the mining process. In this paper, we propose an efficient and practical method for privacy preserving sequential pattern mining on network traffic data. In order to discover frequent sequential patterns without violating privacy, our method uses the N-repository server model that operates as a single mining server and the retention replacement technique that changes the answer to a query probabilistically. In addition, our method accelerates the overall mining process by maintaining the meta tables in each site. Extensive experiments with real-world network traffic data revealed the correctness and the efficiency of the proposed method. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Springer Verlag | - |
dc.title | Privacy preserving data mining of sequential patterns for network traffic data | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Won, Jung Im | - |
dc.contributor.affiliatedAuthor | Kim, Sang Wook | - |
dc.identifier.doi | 10.1007/978-3-540-71703-4_19 | - |
dc.identifier.scopusid | 2-s2.0-38049096092 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.4443 LNCS, pp.201 - 212 | - |
dc.relation.isPartOf | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.title | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.volume | 4443 LNCS | - |
dc.citation.startPage | 201 | - |
dc.citation.endPage | 212 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Mathematical models | - |
dc.subject.keywordPlus | Pattern recognition | - |
dc.subject.keywordPlus | Security of data | - |
dc.subject.keywordPlus | Telecommunication traffic | - |
dc.subject.keywordPlus | Network traffic | - |
dc.subject.keywordPlus | Sequential pattern | - |
dc.subject.keywordPlus | Data mining | - |
dc.subject.keywordAuthor | Data mining | - |
dc.subject.keywordAuthor | Network traffic | - |
dc.subject.keywordAuthor | Privacy | - |
dc.subject.keywordAuthor | Sequential pattern | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-3-540-71703-4_19 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.