KUMPOŠT, Marek and Václav MATYÁŠ. User profiling and re-identification: Case of university-wide network analysis. Simone Fischer-Hübner, Costas Lambrinoudakis and Günther Pernul (Eds.). In Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009. LNCS 5695. Heidelberg: Springer, Lecture Notes in Computer Science (LNCS), 2009, p. 1-10. ISBN 978-3-642-03747-4. Available from: https://dx.doi.org/10.1007/978-3-642-03748-1_1.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name User profiling and re-identification: Case of university-wide network analysis
Name in Czech Profilování uživatelů a reidentifikace: Analýza na úrovni univerzitní sítě
Authors KUMPOŠT, Marek (203 Czech Republic, guarantor, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, belonging to the institution).
Simone Fischer-Hübner, Costas Lambrinoudakis and Günther Pernul (Eds.).
Edition LNCS 5695. Heidelberg, Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, p. 1-10, 10 pp. 2009.
Publisher Springer, Lecture Notes in Computer Science (LNCS)
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Germany
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
Impact factor Impact factor: 0.402 in 2005
RIV identification code RIV/00216224:14330/09:00067134
Organization unit Faculty of Informatics
ISBN 978-3-642-03747-4
ISSN 0302-9743
Doi http://dx.doi.org/10.1007/978-3-642-03748-1_1
UT WoS 000270209600001
Keywords (in Czech) profilování uživetelů; analýza sítě; data mining; IDF; podobnostní vyhledávání; kosinová metrika
Keywords in English user profiling; network analysis; data mining; IDF; similarity searching; cosine similarity
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 30/4/2014 05:54.
Abstract
In this paper we present our methodology for context information processing, modeling users' behaviour and re-identification. Our primary interest is to what extent a user can be re-identified if we have his "user profile" and how much information is required for a successful re-identification. We operate with ``user profiles'' that reflect user's behaviour in the past. We describe the input date we use for building behavioural characteristics; similarity searching procedure and an evaluation of the re-identification process. We discuss (and provide results of our experiments) how different initial conditions, as well as different approaches used in the similarity searching phase, influence the results and propose the optimal scenario where we obtain the most accurate results. We provide experimental results of re-identification of three protocols (SSH, HTTP and HTTPS).
Abstract (in Czech)
Článek se zabývá metodami zpracování kontextové informace, modelováním chování uživatelů a reidentifikací. Primární snahou je zjistit, do jaké míry lze uživatele reidentifikovat na základě jeho "profilu" a kolik informací je nutných pro úspěšnou reindtifikaci. V článku jsou popsána vstupní data, která jsou využita pro budování uživatelských profilů, dále pak proces vyhledání podobných profilů a vyhodnocení procesu reidentifikace. V článku jsou uvedeny výsledky experimentů pro tři komunikační protokoly (SSH, HTTP a HTTPS).
Links
LA09016, research and development projectName: Účast ČR v European Research Consortium for Informatics and Mathematics (ERCIM) (Acronym: ERCIM)
Investor: Ministry of Education, Youth and Sports of the CR, Czech Republic membership in the European Research Consortium for Informatics and Mathematics
PrintDisplayed: 26/4/2024 11:43