Please use this identifier to cite or link to this item: http://cmuir.cmu.ac.th/jspui/handle/6653943832/72746
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNorrathep Rattanavipanonen_US
dc.contributor.authorDonlapark Ponnopraten_US
dc.contributor.authorHideya Ochiaien_US
dc.contributor.authorKuljaree Tantayakulen_US
dc.contributor.authorTouchai Angchuanen_US
dc.contributor.authorSinchai Kamolphiwongen_US
dc.date.accessioned2022-05-27T08:29:00Z-
dc.date.available2022-05-27T08:29:00Z-
dc.date.issued2022-01-01en_US
dc.identifier.issn19390122en_US
dc.identifier.issn19390114en_US
dc.identifier.other2-s2.0-85129288230en_US
dc.identifier.other10.1155/2022/1403200en_US
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85129288230&origin=inwarden_US
dc.identifier.urihttp://cmuir.cmu.ac.th/jspui/handle/6653943832/72746-
dc.description.abstractAnomaly detection has emerged as a popular technique for detecting malicious activities in local area networks (LANs). Various aspects of LAN anomaly detection have been widely studied. Nonetheless, the privacy concern about individual users or their relationship in LAN has not been thoroughly explored in the prior work. In some realistic cases, the anomaly detection analysis needs to be carried out by an external party, located outside the LAN. Thus, it is important for the LAN admin to release LAN data to this party in a private way in order to protect privacy of LAN users; at the same time, the released data must also preserve the utility of being able to detect anomalies. This paper investigates the possibility of privately releasing ARP data that can later be used to identify anomalies in LAN. We present four approaches, namely, naïve, histogram-based, naïve-δ, and histogram-based-δ and show that they satisfy different levels of differential privacy - a rigorous and provable notion for quantifying privacy loss in a system. Our real-world experimental results confirm practical feasibility of our approaches. With a proper privacy budget, all of our approaches preserve more than 75% utility of detecting anomalies in the released data.en_US
dc.subjectComputer Scienceen_US
dc.titleDetecting Anomalous LAN Activities under Differential Privacyen_US
dc.typeJournalen_US
article.title.sourcetitleSecurity and Communication Networksen_US
article.volume2022en_US
article.stream.affiliationsUniversity of Tokyo, Graduate School of Information Science and Technologyen_US
article.stream.affiliationsPrince of Songkla Universityen_US
article.stream.affiliationsChiang Mai Universityen_US
Appears in Collections:CMUL: Journal Articles

Files in This Item:
There are no files associated with this item.


Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.