메뉴 건너뛰기




Volumn , Issue , 2008, Pages 11-18

New directions in privacy-preserving anomaly detection for network traffic

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALOUS BEHAVIOR; ANOMALY DETECTION; BLOOM FILTERS; DATA PACKET; EFFICIENT DATA STRUCTURES; ENCRYPTED DATA; MONITORING APPLICATIONS; NETWORK CUSTOMERS; NETWORK MONITORING; NETWORK MONITORING SYSTEMS; NETWORK TRAFFIC; NEW APPROACHES; NEW DIRECTIONS; ON-THE-FLY; PRIVACY PRESERVING; REAL-WORLD; RESEARCH DIRECTIONS; RUNNING-IN; SEARCHING TECHNIQUES; STATISTICAL ANALYSIS; TRAFFIC DATA;

EID: 70349237882     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456441.1456446     Document Type: Conference Paper
Times cited : (15)

References (19)
  • 1
    • 42249109834 scopus 로고    scopus 로고
    • Legal Issues Surrounding Monitoring during Network Research
    • Oct, San Diego, USA
    • P. Ohm, D. Sicker, D. Grunwald, "Legal Issues Surrounding Monitoring during Network Research", ACM Internet Measurement Conference 2007, Oct. 2007, San Diego, USA.
    • (2007) ACM Internet Measurement Conference
    • Ohm, P.1    Sicker, D.2    Grunwald, D.3
  • 2
    • 84869610552 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, / on the concept of personal data, 20 June, available at
    • Article 29 Data Protection Working Party, WP 136, Opinion 4/2007 on the concept of personal data, 20 June, 2007; available at http://ec.europa.eu/ justice-home/fsj/privacy/docs/wpdocs/2007/wp136-en.pdf
    • (2007) WP 136, Opinion , vol.4
  • 5
    • 6344251217 scopus 로고    scopus 로고
    • Fingerprinting Websites Using Traffic Analysis Privacy Enhancing Technologies
    • April
    • A. Hintz, "Fingerprinting Websites Using Traffic Analysis Privacy Enhancing Technologies", Proc. Privacy Enhancing Technologies (PET) Workshop, April 2002.
    • (2002) Proc. Privacy Enhancing Technologies (PET) Workshop
    • Hintz, A.1
  • 10
    • 4544360452 scopus 로고    scopus 로고
    • New directions in traffic measurements and accounting
    • Pittsburgh, USA, Aug
    • C. Estan, G. Varghese, "New directions in traffic measurements and accounting", ACM SIGCOMM 2002, Pittsburgh, USA, Aug. 2002.
    • (2002) ACM SIGCOMM
    • Estan, C.1    Varghese, G.2
  • 11
    • 24144488819 scopus 로고    scopus 로고
    • Efficient Implementation of a Statistics Counter Architecture
    • San Diego, USA, June
    • S. Ramabhadran, G. Varghese, "Efficient Implementation of a Statistics Counter Architecture", ACM SIGMETRICS 2003, San Diego, USA, June 2003.
    • (2003) ACM SIGMETRICS
    • Ramabhadran, S.1    Varghese, G.2
  • 12
    • 70450232823 scopus 로고    scopus 로고
    • Network Applications of Bloom Filters: A Survey
    • A. Broder, M. Mitzenmacher, "Network Applications of Bloom Filters: A Survey", Internet Mathematics, Volume 1, Issue 4, pp. 485-509, 2005.
    • (2005) Internet Mathematics , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzenmacher, M.2
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret", Communications of the ACM, volume 22, issue 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 17
    • 70349229794 scopus 로고    scopus 로고
    • Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
    • IETF Request for Comments, RFC 4868, May
    • S. Kelly, S. Frankel, "Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec", IETF Request for Comments, RFC 4868, May 2007.
    • (2007)
    • Kelly, S.1    Frankel, S.2
  • 18
    • 0033705124 scopus 로고    scopus 로고
    • D. Song, D. Wagner, A. Perrig, Practical Techniques for Searches on Encrypted Data, IEEE Symposium on Research in Security and Privacy, May 2000, pp:44-55.
    • D. Song, D. Wagner, A. Perrig, "Practical Techniques for Searches on Encrypted Data", IEEE Symposium on Research in Security and Privacy, May 2000, pp:44-55.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.