Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2007.14-C.3.199

Detection of Personal Information Leakage using the Network Traffic Characteristics  

Park, Jung-Min (이화여자대학교 컴퓨터정보통신공학과)
Kim, Eun-Kyung (이화여자대학교 컴퓨터정보통신공학과)
Jung, Yu-Kyung (이화여자대학교 컴퓨터정보통신공학과)
Chae, Ki-Joon (이화여자대학교 컴퓨터정보통신공학과)
Na, Jung-Chan (한국전자통신연구원 능동보안기술연구팀)
Abstract
In a ubiquitous network environment, detecting the leakage of personal information is very important. The leakage of personal information might cause severe problem such as impersonation, cyber criminal and personal privacy violation. In this paper, we have proposed a detection method of personal information leakage based on network traffic characteristics. The experimental results indicate that the traffic character of a real campus network shows the self-similarity and Proposed method can detect the anomaly of leakage of personal information by malicious code.
Keywords
Personal information; Personal information leakage; Self-similarity; Traffic characteristics;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Kalden and S. Ibrahim, 'Searching for Self-similarity in GPRS,' LNCS Vol. 3015, pp. 83-92, 2004   DOI
2 Susan C. Lee, David V. Heinbuch, 'Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks,' IEEE Trans. on Systems, Man and Cybernetics, Vol. 31, No.4, pp.294-299, 2001   DOI   ScienceOn
3 W. Leland, W. Willinger, M. Taqqu and D. Wilson, 'On the Self-similarity nature of Ethernet Traffic (Extended Version),' IEEE/ACM Transactions on Networking, Vol. 2(1), pp. 1-15, 1994   DOI   ScienceOn
4 V. Paxson and S. Floyd, 'Wide-area traffic: The failure of Poisson modeling,' IEEE-ACM Transactions on Networking, Vol. 3(3), pp.226-244, 1995   DOI   ScienceOn
5 Y. Xin, B.-X. Fang, X.-C. Yun, and H.-Y. Chen, 'Worm Detection in Large Scale Network by Traffic,' Proc. of the 6th Intl. Conf. on Parallel and Distributed Computing, Applications and Technologies (PDCAT'05), pp.270-273, 2005   DOI
6 M. E. Crovella and A. Bestavros, 'Self-similarity in World Wide Web Traffic: Evidence and Possible Causes,' IEEE/ACM Trans. on Networking, Vol. 5(6), pp.835-846, 1997   DOI   ScienceOn
7 V. Paxson, 'Fast Approximation of Self-similarity Traffic,' Technical Report LBL-36750, Lawrence Berkeley Laboratory, 1995
8 The CERIAS Intrusion Detection Research Group, 'Digging for Worms, Fishing for Answers,' Proc. of 18th Annual Computer Security Applications Conference, 2002   DOI
9 Wenke Lee, Salvatore J. Stolfo, 'Data Mining Approaches for Intrusion Detection,' Proc. of the 7th USENIX Security Symposium, pp.79-94, Jan. 1998
10 C & C Instruments Co. Ltd., http://www.cncinst.com/
11 Laura Feinstein, Dan Schnackenberg Ravindra Balupari, Darrell Kindred, 'Statistical Approaches to DDoS Attack Detection and Response,' Proc. of The DARPA Information Survivability Conference and Exposition, 2003
12 A. Popescu, 'Traffic Self-similarity,' Proc. of IEEE Intl, Conf. on Telecommunications, 2001
13 R. Pacheco, J. Cesar and T. R. Deni, 'Performance Analysis of Time-domain Algorithms for Self-similar Traffic,' Proc. of IEEE Intl' Conf. on Electronics, Communications and Computers, 2006   DOI