A Bayesian network approach to detecting privacy intrusion

被引:1
|
作者
An, Xiangdong [1 ,2 ]
Jutla, Dawn [1 ]
Cercone, Nick [2 ]
机构
[1] St Marys Univ, Dept Finance Info Syst & Management Sci, Halifax, NS B3H 3C3, Canada
[2] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 1W5, Canada
关键词
D O I
10.1109/WI-IATW.2006.6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Personal information privacy could be compromised during information collection, transmission, and handling. In information handling, privacy could be violated by both the inside and the outside intruders. Though, within an organization, private data are generally protected by the organization's privacy policies and the corresponding platforms for privacy practices, private data could still be misused intentionally or unintentionally by individuals who have legitimate access to them in the organization. In this paper we propose a Bayesian network-based method for insider privacy intrusion detection in database systems.
引用
收藏
页码:73 / +
页数:2
相关论文
共 50 条
  • [1] Bayesian Approach to Modeling and Detecting Communities in Signed Network
    Yang, Bo
    Zhao, Xuehua
    Liu, Xueyan
    PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 1952 - 1958
  • [2] Privacy intrusion detection using dynamic Bayesian networks
    An, Xiangdong
    Jutla, Dawn
    Cercone, Nick
    2006 ICEC: EIGHTH INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE, PROCEEDINGS: THE NEW E-COMMERCE: INNOVATIONS FOR CONQUERING CURRENT BARRIERS, OBSTACLES AND LIMITATIONS TO CONDUCTING SUCCESSFUL BUSINESS ON THE INTERNET, 2006, : 208 - 215
  • [3] Network Anomaly Intrusion Detection Using a Nonparametric Bayesian Approach and Feature Selection
    Alhakami, Wajdi
    Alharbi, Abdullah
    Bourouis, Sami
    Alroobaea, Roobaea
    Bouguila, Nizar
    IEEE ACCESS, 2019, 7 : 52181 - 52190
  • [4] Detecting 'wrong blood in tube' errors: Evaluation of a Bayesian network approach
    Doctor, Jason N.
    Strylewicz, Greg
    ARTIFICIAL INTELLIGENCE IN MEDICINE, 2010, 50 (02) : 75 - 82
  • [5] Detecting Network Intrusion Using Probabilistic Neural Network
    Zhang, Ming
    Guo, Junpeng
    Xu, Boyi
    Gong, Jie
    2015 11TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2015, : 1151 - 1158
  • [6] Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection
    Xiao, Liyuan
    Chen, Yetian
    Chang, Carl K.
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 128 - 133
  • [7] Detecting and resolving conflict for network intrusion rule
    Sun, Meifeng
    Gong, Jian
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2006, 36 (04): : 522 - 525
  • [8] Intelligent Bayesian classifiers in network intrusion detection
    Bosin, A
    Dessì, N
    Pes, B
    INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2005, 3533 : 445 - 447
  • [9] Detecting Network Intrusion in Cloud Environment Through Ensemble Learning and Feature Selection Approach
    Khan M.
    Haroon M.
    SN Computer Science, 5 (1)
  • [10] A Bayesian network-based approach for learning attack strategies from intrusion alerts
    Kavousi, Fatemeh
    Akbari, Behzad
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 833 - 853