Privacy preserving data mining of sequential patterns for network traffic data

被引:18
|
作者
Kim, Seung-Woo [1 ]
Park, Sanghyun [1 ]
Won, Jung-Im [2 ]
Kim, Sang-Wook [2 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul 120749, South Korea
[2] Hanyang Univ, Coll Informat & Commun, Hayang, South Korea
基金
新加坡国家研究基金会;
关键词
data mining; sequential pattern; network traffic; privacy;
D O I
10.1016/j.ins.2007.08.022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the total amount of traffic data in networks has been growing at an alarming rate, there is currently a substantial body of research that attempts to mine traffic data with the purpose of obtaining useful information. For instance, there are some investigations into the detection of Internet worms and intrusions by discovering abnormal traffic patterns. However, since network traffic data contain information about the Internet usage patterns of users, network users' privacy may be compromised during the mining process. In this paper, we propose an efficient and practical method that preserves privacy during sequential pattern mining on network traffic data. In order to discover frequent sequential patterns without violating privacy, our method uses the N-repository server model, which operates as a single mining server and the retention replacement technique, which changes the answer to a query probabilistically. In addition, our method accelerates the overall mining process by maintaining the meta tables in each site so as to determine quickly whether candidate patterns have ever occurred in the site or not. Extensive experiments with real-world network traffic data revealed the correctness and the efficiency of the proposed method. (c) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:694 / 713
页数:20
相关论文
共 50 条
  • [1] Privacy preserving data mining of sequential patterns for network traffic data
    Kim, Seung-Woo
    Park, Sanghyun
    Won, Jung-Im
    Kim, Sang-Wook
    [J]. ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 201 - +
  • [2] Privacy Preserving Sequential Pattern Mining in Data Stream
    Huang, Qin-Hua
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2008, 15 : 69 - 75
  • [3] Privacy preserving sequential pattern mining based on data perturbation
    Ouyang, Wei-Min
    Xin, Hong-Liang
    Huang, Qin-Hua
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3239 - +
  • [4] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [5] Privacy Preserving Data Mining
    [J]. Journal of Cryptology, 2002, 15 : 177 - 206
  • [6] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [7] On data distortion for privacy preserving data mining
    Kabir, Saif M. A.
    Youssef, Amr M.
    Elhakeem, Ahmed K.
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311
  • [8] Sequential Data Mining of Network Traffic in URL Logs
    Korytkowski, Marcin
    Nowak, Jakub
    Nowicki, Robert
    Milkowska, Kamila
    Scherer, Magdalena
    Goetzen, Piotr
    [J]. ARTIFICIAL INTELLIGENCEAND SOFT COMPUTING, PT I, 2019, 11508 : 125 - 130
  • [9] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [10] Privacy preserving in sequential data publishing
    Hossain, Md. Muktar
    Islam, Md. Rabiul
    [J]. 2021 International Conference on Automation, Control and Mechatronics for Industry 4.0, ACMI 2021, 2021,