Abstract
In this paper we present our methodology for context information processing, modeling users’ behaviour and re-identification. Our primary interest is to what extent a user can be re-identified if we have his “user profile” and how much information is required for a successful re-identification. We operate with “user profiles” that reflect user’s behaviour in the past. We describe the input date we use for building behavioural characteristics; similarity searching procedure and an evaluation of the re-identification process. We discuss (and provide results of our experiments) how different initial conditions, as well as different approaches used in the similarity searching phase, influence the results and propose the optimal scenario where we obtain the most accurate results. We provide experimental results of re-identification of three protocols (SSH, HTTP and HTTPS).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cvrček, D., Kumpošt, M., Matyáš, V.: A privacy classification model based on linkability valuation. In: Security and Embedded Systems. NATO Security through Science Series, D: Information and Communication Security, vol. 2, pp. 91–98. Kluwer Academic Publishers, Dordrecht (2006)
Hansen, S.: AOL removes search data on vast group of web users. New York Times (October 2006)
Korfhage, R.R.: Information storage and retrieval. John Wiley & Sons Inc., New York (1997)
Kumpošt, M.: Data preparation for user profiling from traffic log. In: Proceedings of The International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE 2007), vol. 0, pp. 89–94. IEEE Computer Society Press, Los Alamitos (2007)
Lee, J.-W., Baik, D.-K.: A model for extracting keywords of document using term frequency and distribution. In: Gelbukh, A. (ed.) CICLing 2004. LNCS, vol. 2945, pp. 437–440. Springer, Heidelberg (2004)
Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. IEEE Symposium on Security and Privacy 0, 111–125 (2008)
Salton, G.: Automatic text processing: the transformation, analysis, and retrieval of information by computer. Addison-Wesley Longman Publishing Co. Inc., Boston (1989)
Sweeney, L.: Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine and Ethics 25 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kumpošt, M., Matyáš, V. (2009). User Profiling and Re-identification: Case of University-Wide Network Analysis. In: Fischer-Hübner, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2009. Lecture Notes in Computer Science, vol 5695. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03748-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-03748-1_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03747-4
Online ISBN: 978-3-642-03748-1
eBook Packages: Computer ScienceComputer Science (R0)