2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN) 2019
DOI: 10.1109/icufn.2019.8806077
|View full text |Cite
|
Sign up to set email alerts
|

An SDN/NFV-Enabled Architecture for Detecting Personally Identifiable Information Leaks on Network Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Most research works [11,12,13,14] related to PII discovery used string-matching techniques to discover PII and supported data breach detection. For example, AntMonitor [11] and Lumen [12], provided a blacklist of potential PII leaks represented in string.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most research works [11,12,13,14] related to PII discovery used string-matching techniques to discover PII and supported data breach detection. For example, AntMonitor [11] and Lumen [12], provided a blacklist of potential PII leaks represented in string.…”
Section: Related Workmentioning
confidence: 99%
“…The traffic was routed to analyzed at a centralized remote server. In [14], the authors proposed a PII detector for the virtual network (PIID VNF) to detect plaintext PII strings embedded in HTTP fields. The system investigated the packets containing PII, and then they were marked by the PIID.…”
Section: Related Workmentioning
confidence: 99%
“…However, PID disclosure is a risk to be managed appropriately. In fact, in [22] authors are researching at the network traffic level, and they are proposing a Software Defined Networking (SDN) / Network Function Virtualization (NFV)-enabled architecture for improving the efficiency of leak detection systems. This is a similar approach to the one proposed for identifying PII in internet traffic [23].…”
Section: Background Study a Personally Identifiable Informationmentioning
confidence: 99%
“…Over the years, personal data leaking has been widely studied in the existing literature. A recent study by Go et al [14] raises serious concern on the opening and un-intended disclosure of information on social media platforms. The authors suggest an intelligent and flexibly centralized model based on software-defined networking with virtualization to counteract unintended PII opening on the network traffic.…”
Section: Related Workmentioning
confidence: 99%