2009
DOI: 10.1007/978-3-642-03748-1_1
|View full text |Cite
|
Sign up to set email alerts
|

User Profiling and Re-identification: Case of University-Wide Network Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(24 citation statements)
references
References 3 publications
0
23
0
1
Order By: Relevance
“…Kumpost's user re-identification technique relies on the destination IP addresses for HTTP(S) and SSH connections of each user [15]. His user profiles consist of sparse access frequency vectors that contain the number of connections to each destination IP address.…”
Section: Related Workmentioning
confidence: 99%
“…Kumpost's user re-identification technique relies on the destination IP addresses for HTTP(S) and SSH connections of each user [15]. His user profiles consist of sparse access frequency vectors that contain the number of connections to each destination IP address.…”
Section: Related Workmentioning
confidence: 99%
“…Kumpǒst and Matyáš [21,22] analysed the possibility of user re-identification based on their past network behaviour. For their approach, they construct behavioural profiles from sampled NetFlow [8] data with focus on HTTPS, HTTP and SSH traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Kumpost et al [5] believe that the websites visited by the user and the corresponding frequencies reflect his habits. Kumpost et al [5] believe that the websites visited by the user and the corresponding frequencies reflect his habits.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike the scenarios mentioned in the preceding texts, in the traffic analysis field, the behavior-based tracking techniques are carried out by passively sniffing traffic and extracting behavioral features to link multiple sessions of the same user. Kumpost et al [5] believe that the websites visited by the user and the corresponding frequencies reflect his habits. They store the destination IP address, source IP address, and the number of connections in a two-dimensional matrix based on the NetFlow logs.…”
Section: Related Workmentioning
confidence: 99%