메뉴 건너뛰기




Volumn 178, Issue 3, 2008, Pages 694-713

Privacy preserving data mining of sequential patterns for network traffic data

Author keywords

Data mining; Network traffic; Privacy; Sequential pattern

Indexed keywords

COMPUTER WORMS; DATA MINING; DATA TRANSFER; SERVERS; TELECOMMUNICATION TRAFFIC;

EID: 35748979448     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2007.08.022     Document Type: Article
Times cited : (36)

References (32)
  • 1
    • 0029212693 scopus 로고    scopus 로고
    • R. Agrawal, R. Srikant, Mining sequential patterns, in: Proceedings of the 11th IEEE International Conference on Data Engineering, Taipei, Taiwan, 1995, pp. 3-14.
  • 2
    • 0041783510 scopus 로고    scopus 로고
    • R. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proceedings of 2000 ACM SIGMOD International Conference on Management of Data, Dallas, Texas, 2000, pp. 439-450.
  • 3
    • 29844443821 scopus 로고    scopus 로고
    • R. Agrawal, R. Srikant, D. Thomas, privacy preserving OLAP, in: Proceedings of 2005 ACM SIGMOD International Conference on Management of Data, Baltimore, Maryland, 2005, pp. 251-262.
  • 4
    • 0242540443 scopus 로고    scopus 로고
    • J. Ayres, J. Flannick, J. Gehrke, T. Yiu, Sequential pattern mining using bitmap representation, in: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Alberta, Canada, 2002, pp. 102-111.
  • 5
    • 35748931341 scopus 로고    scopus 로고
    • C. Clifton, D. Marks, Security and privacy implication of data mining, in: Proceedings of 1996 ACM Workshop on Data Mining and Knowledge Discovery, Montreal, Canada, 1996, pp. 15-19.
  • 6
    • 35748957026 scopus 로고    scopus 로고
    • P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, P. Tan, Data mining for network intrusion detection, in: Proceedings of the NSF Workshop on Next Generation Data Mining, Baltimore, Maryland, 2002, pp. 73-81.
  • 7
    • 0242625281 scopus 로고    scopus 로고
    • A. Evfimievski, R. Srikant, R. Agrawal, J. Gehrke, Privacy preserving mining of association rules, in: Proceedings of 2002 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, 2002, pp. 217-228.
  • 8
    • 34547572516 scopus 로고    scopus 로고
    • T. Fukasawa, J. Wang, T. Takata, M. Miyazaki, An effective distributed privacy-preserving data mining algorithm, in: Proceedings of the 5th International Conference on Intelligent Data Engineering and Automated Learning, Exeter, UK, 2004, pp. 320-325.
  • 9
    • 35748952367 scopus 로고    scopus 로고
    • M. Garofalakis, R. Rastogi, K. Shim, SPIRIT: sequential pattern mining with regular expression constraints, in: Proceedings of the 25th International Conference on Very Large Data Bases, Edinburgh, UK, 1999, pp. 223-234.
  • 10
    • 0034593066 scopus 로고    scopus 로고
    • J. Han, J. Pei, B. Mortazavi-Asl, Q. Chen, U. Dayal, M. Hsu, FreeSpan: frequent pattern-projected sequential pattern mining, in: Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Boston, Massachusetts, 2000, pp. 355-359.
  • 11
    • 35748947409 scopus 로고    scopus 로고
    • J. Han, How can data mining help bio-data analysis?, in: Proceedings of the 2nd ACM SIGKDD Workshop on Data Mining in Bioinformatics, Edmonton, Canada, 2002, pp. 1-2.
  • 12
    • 2442430540 scopus 로고    scopus 로고
    • Y. Hu, B. Panda, A data mining approach for database intrusion detection, in: Proceedings of 2004 ACM Symposium on Applied Computing, New York, NY, 2004, pp. 711-716.
  • 13
    • 35748983967 scopus 로고    scopus 로고
    • M. Kantarcioglu, C. Clifton, Privacy-preserving distributed mining of association rules on horizontally partitioned data, in: Proceedings of 2002 ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, Madison, Wisconsin, 2002, pp. 24-31.
  • 14
    • 35748983060 scopus 로고    scopus 로고
    • H. Kum, J. Pei, W. Wang, D. Duncan, ApproxMAP: approximate mining of consensus sequential patterns, in: Proceedings of the 3rd SIAM International Conference on Data Mining, San Francisco, California, 2003, pp. 311-315.
  • 15
    • 84940104123 scopus 로고    scopus 로고
    • W. Lee, S. Stolfo, K. Mok, A data mining framework for building intrusion detection models, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, 1999, pp. 120-132.
  • 16
    • 84974555530 scopus 로고    scopus 로고
    • Y. Lindell, B. Pinkas, Privacy preserving data mining, in: Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, California, 2000, pp. 36-54.
  • 17
    • 84969551380 scopus 로고    scopus 로고
    • M. Lin, S. Lee, Improving the efficiency of interactive sequential pattern mining by incremental pattern discovery, in: Proceedings of the 36th Annual Hawaii International Conference on System Sciences, Washington, DC, 2003, p. 68.2.
  • 18
    • 33144471694 scopus 로고    scopus 로고
    • A cubic-wise balance approach for privacy preservation in data cubes
    • Liu Y., Sung S., and Xiong H. A cubic-wise balance approach for privacy preservation in data cubes. Information Sciences 176 9 (2006) 1215-1240
    • (2006) Information Sciences , vol.176 , Issue.9 , pp. 1215-1240
    • Liu, Y.1    Sung, S.2    Xiong, H.3
  • 19
    • 0034247240 scopus 로고    scopus 로고
    • Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
    • Luo J., and Bridges S. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection. International Journal of Intelligent Systems 15 8 (2000) 687-704
    • (2000) International Journal of Intelligent Systems , vol.15 , Issue.8 , pp. 687-704
    • Luo, J.1    Bridges, S.2
  • 20
    • 84947770983 scopus 로고    scopus 로고
    • F. Masseglia, F. Cathala, P. Poncelet, The PSP approach for mining sequential patterns, in: Proceedings of the 2nd European Symposium on Principle of Data Mining and Knowledge Discovery, Nantes, France, 1998, pp. 176-184.
  • 22
    • 0037818783 scopus 로고    scopus 로고
    • J. Pei, J. Han, W. Wang, Mining sequential patterns with constraints in large databases, in: Proceedings of the 11th International Conference on Information and Knowledge Management, McLean, Virginia, 2002, pp. 18-25.
  • 24
    • 35748984568 scopus 로고    scopus 로고
    • B. Pinkas, Cryptographic techniques for privacy-preserving data mining, SIGKDD explorations Newsletter of the ACM Special Interest Group on Knowledge Discovery and Data Mining 4(2) (2002) 12-15.
  • 25
    • 35748938609 scopus 로고    scopus 로고
    • S. Rizvi, J. Haritsa, Maintaining data privacy in association rule mining, in: Proceedings of the 28th International Conference on Very Large Data Bases, Hong Kong, China, 2002, pp. 682-693.
  • 26
    • 35748940148 scopus 로고    scopus 로고
    • G. Schadow, S.J. Grannis, C.J. McDonald, Discussion paper: privacy-preserving distributed queries for a clinical case research network, in: Proceedings of the IEEE ICDM Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, 2002, Vol. 14, pp. 55-65.
  • 27
    • 35048885636 scopus 로고    scopus 로고
    • S. Song, Z. Huang, H. Hu, S. Jin, A sequential pattern mining algorithm for misuse intrusion detection, in: Proceedings of the International Workshop on Information Security and Survivability for Grid, Wuhan, China, 2004, pp. 458-465.
  • 28
    • 84897708583 scopus 로고    scopus 로고
    • R. Srikant, R. Agrawal, Mining sequential patterns: generalizations and performance improvements, in: Proceedings of the 5th International Conference on Extending Database Technology, Avignon, France, 1996, pp. 3-17.
  • 29
    • 35748957327 scopus 로고    scopus 로고
    • X. Yan, J. Han, R. Afshar, CloSpan: mining closed sequential patterns in large databases, in: Proceedings of the 3rd SIAM International Conference on Data Mining, San Francisco, California, 2003, pp. 166-177.
  • 30
    • 35748943986 scopus 로고    scopus 로고
    • J. Zhan, L. Changy, S. Matwinz, Privacy-preserving collaborative sequential pattern mining, in: Proceedings of the SIAM International Workshop on Link Analysis, Counter-terrorism, and Privacy, Lake Buena Vista, Florida, 2004. pp. 61-72.
  • 31
    • 35748975018 scopus 로고    scopus 로고
    • Q. Zheng, K. Xu, W. Lv, S. Ma, The algorithms of updating sequential patterns, in: Proceedings of the 5th SIAM International Workshop on High Performance Data Mining, Arlington, Virginia, 2002.
  • 32
    • 33750333499 scopus 로고    scopus 로고
    • Privacy-preserving algorithms for distributed mining of frequent itemsets
    • Zhong S. Privacy-preserving algorithms for distributed mining of frequent itemsets. Information Sciences 177 2 (2007) 490-503
    • (2007) Information Sciences , vol.177 , Issue.2 , pp. 490-503
    • Zhong, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.