Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/72746
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Norrathep Rattanavipanon | en_US |
dc.contributor.author | Donlapark Ponnoprat | en_US |
dc.contributor.author | Hideya Ochiai | en_US |
dc.contributor.author | Kuljaree Tantayakul | en_US |
dc.contributor.author | Touchai Angchuan | en_US |
dc.contributor.author | Sinchai Kamolphiwong | en_US |
dc.date.accessioned | 2022-05-27T08:29:00Z | - |
dc.date.available | 2022-05-27T08:29:00Z | - |
dc.date.issued | 2022-01-01 | en_US |
dc.identifier.issn | 19390122 | en_US |
dc.identifier.issn | 19390114 | en_US |
dc.identifier.other | 2-s2.0-85129288230 | en_US |
dc.identifier.other | 10.1155/2022/1403200 | en_US |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85129288230&origin=inward | en_US |
dc.identifier.uri | http://cmuir.cmu.ac.th/jspui/handle/6653943832/72746 | - |
dc.description.abstract | Anomaly detection has emerged as a popular technique for detecting malicious activities in local area networks (LANs). Various aspects of LAN anomaly detection have been widely studied. Nonetheless, the privacy concern about individual users or their relationship in LAN has not been thoroughly explored in the prior work. In some realistic cases, the anomaly detection analysis needs to be carried out by an external party, located outside the LAN. Thus, it is important for the LAN admin to release LAN data to this party in a private way in order to protect privacy of LAN users; at the same time, the released data must also preserve the utility of being able to detect anomalies. This paper investigates the possibility of privately releasing ARP data that can later be used to identify anomalies in LAN. We present four approaches, namely, naïve, histogram-based, naïve-δ, and histogram-based-δ and show that they satisfy different levels of differential privacy - a rigorous and provable notion for quantifying privacy loss in a system. Our real-world experimental results confirm practical feasibility of our approaches. With a proper privacy budget, all of our approaches preserve more than 75% utility of detecting anomalies in the released data. | en_US |
dc.subject | Computer Science | en_US |
dc.title | Detecting Anomalous LAN Activities under Differential Privacy | en_US |
dc.type | Journal | en_US |
article.title.sourcetitle | Security and Communication Networks | en_US |
article.volume | 2022 | en_US |
article.stream.affiliations | University of Tokyo, Graduate School of Information Science and Technology | en_US |
article.stream.affiliations | Prince of Songkla University | en_US |
article.stream.affiliations | Chiang Mai University | en_US |
Appears in Collections: | CMUL: Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.