Obfuscation of sensitive data for incremental release of network flows

D Riboni, A Villani, D Vitali, C Bettini… - … /ACM Transactions on …, 2014 - ieeexplore.ieee.org
Large datasets of real network flows acquired from the Internet are an invaluable resource
for the research community. Applications include network modeling and simulation …

Novel Bi-directional Flow-based Traffic Generation Framework for IDS Evaluation and Exploratory Data Analysis

K Wilailux, S Ngamsuriyaroj - Journal of Information Processing, 2021 - jstage.jst.go.jp
Flow-based network traffic information has been recently used to detect malicious intrusion.
However, several available public flow-based datasets are unidirectional, and bidirectional …

Generic approach for security error detection based on learned system behavior models for automated security tests

C Schanes, A Hübler, F Fankhauser… - 2013 IEEE Sixth …, 2013 - ieeexplore.ieee.org
The increasing complexity of software and IT systems creates the necessity for research on
technologies addressing current key security challenges. To meet security requirements in …

Activity pattern discovery from network captures

AC Lin, GL Peterson - 2016 IEEE Security and Privacy …, 2016 - ieeexplore.ieee.org
Investigating insider threat cases is challenging because activities are conducted with
legitimate access that makes distinguishing malicious activities from normal activities …

[图书][B] A behavior-based approach towards statistics-preserving network trace anonymization

Y Song - 2012 - search.proquest.com
In modern network measurement research, there exists a clear and demonstrable need for
open sharing of large-scale network traffic datasets between organizations. Beyond network …

[PDF][PDF] A Survey for an Efficient Secure Guarantee in Network Flow

S Kalaiselvi, S Yoga - 2018 - academia.edu
Network flows carry extremely confidential information that should not be released for
privacy reasons. Existing techniques for network flow sanitization are vulnerable to different …

[PDF][PDF] DATA SECURITY IN NETWORK FLOW USING OBFUSCATION TECHNIQUE

S Kalaiselvi, S Yoga - 2018 - academia.edu
An application encompasses network modeling and simulation, recognition of privacy
assaults, and formalization of research results. Indeed, existing techniques for network flow …

[图书][B] Empirical Measurement of Defense in Depth

N Boggs - 2015 - search.proquest.com
Measurement is a vital tool for organizations attempting to increase, evaluate, or simply
maintain their overall security posture over time. Organizations rely on defense in depth …