Abstract
As the total amount of traffic data in networks has been growing at an alarming rate, there is currently a substantial body of research that attempts to mine traffic data with the purpose of obtaining useful information. For instance, there are some investigations into the detection of Internet worms and intrusions by discovering abnormal traffic patterns. However, since network traffic data contain information about the Internet usage patterns of users, network users' privacy may be compromised during the mining process. In this paper, we propose an efficient and practical method that preserves privacy during sequential pattern mining on network traffic data. In order to discover frequent sequential patterns without violating privacy, our method uses the N-repository server model, which operates as a single mining server and the retention replacement technique, which changes the answer to a query probabilistically. In addition, our method accelerates the overall mining process by maintaining the meta tables in each site so as to determine quickly whether candidate patterns have ever occurred in the site or not. Extensive experiments with real-world network traffic data revealed the correctness and the efficiency of the proposed method.
Original language | English |
---|---|
Pages (from-to) | 694-713 |
Number of pages | 20 |
Journal | Information sciences |
Volume | 178 |
Issue number | 3 |
DOIs | |
Publication status | Published - 2008 Feb 1 |
Bibliographical note
Funding Information:This work was partially supported by the Korea Research Foundation Grant funded by the Korean Government (KRF-2005-041-D00651) and the ITRC support program supervised by the IITA (IITA-2005-C1090-0502-0009).
All Science Journal Classification (ASJC) codes
- Software
- Control and Systems Engineering
- Theoretical Computer Science
- Computer Science Applications
- Information Systems and Management
- Artificial Intelligence