Big privacy: Challenges and opportunities of privacy study in the age of big data

S Yu - IEEE access, 2016 - ieeexplore.ieee.org
One of the biggest concerns of big data is privacy. However, the study on big data privacy is
still at a very early stage. We believe the forthcoming solutions and theories of big data …

An operational approach to information leakage

I Issa, AB Wagner, S Kamath - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …

Predicted packet padding for anonymous web browsing against traffic analysis attacks

S Yu, G Zhao, W Dou, S James - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Anonymous communication has become a hot research topic in order to meet the increasing
demand for web privacy protection. However, there are few such systems which can provide …

From t-closeness-like privacy to postrandomization via information theory

D Rebollo-Monedero, J Forne… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
t-Closeness is a privacy model recently defined for data anonymization. A data set is said to
satisfy t-closeness if, for each group of records sharing a combination of key attributes, the …

An operational measure of information leakage

I Issa, S Kamath, AB Wagner - 2016 Annual Conference on …, 2016 - ieeexplore.ieee.org
Given two discrete random variables X and Y, an operational approach is undertaken to
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …

DDoS attacks with randomized traffic innovation: Botnet identification challenges and strategies

V Matta, M Di Mauro, M Longo - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an
“army” of compromised nodes hidden in the network. Inferential tools for DDoS mitigation …

Botnet identification in DDoS attacks with multiple emulation dictionaries

M Cirillo, M Di Mauro, V Matta… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In a Distributed Denial of Service (DDoS) attack, a network (botnet) of dispersed agents
(bots) sends requests to a website to saturate its resources. Since the requests are sent by …

Adversarial Kendall's model towards containment of distributed cyber-threats

P Addesso, M Barni, M Di Mauro… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This work examines propagation of cyber-threats over networks under an adversarial
formulation. Exploiting Kendall's birth-death-immigration model, we propose an analytical …

Dependent link padding algorithms for low latency anonymity systems

W Wang, M Motani, V Srinivasan - … of the 15th ACM conference on …, 2008 - dl.acm.org
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we
propose a dependent link padding scheme to protect anonymity systems from traffic analysis …

Optimal packet camouflage against traffic analysis

L Chaddad, A Chehab, IH Elhajj, A Kayssi - ACM Transactions on …, 2021 - dl.acm.org
Research has proved that supposedly secure encrypted network traffic is actually threatened
by privacy and security violations from many aspects. This is mainly due to flow features …