Skip to main content

Design and Implementation of Information Detection System Based on Privacy Sensitive Data

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1424))

Included in the following conference series:

  • 1704 Accesses

Abstract

In recent years, with the development of network technology, network applications and network transmission protocols emerge one after another. Although a growing awareness for the protection of private data, network applications and transmission protocol is to protect user privacy data by using various methods, but there are still a part of the application or web access to user data is not to make any protective measures, its may cause the user’s private data during transmission cause leaks, have serious consequences. This paper mainly studies the detection of private data by collecting data traffic in the network, analyzing the content, and determining whether the data is encrypted during the transmission process. A private data detection system including traffic capture, data processing, protocol analysis and regular matching is implemented. At the same time, some technical methods are used to optimize and innovate all parts of the system.

This paper will briefly introduce the current development trend of network information security, and briefly describe the implementation of each part of the whole system, each part will be described from the functional introduction, specific implementation, and finally through some test samples and the results of the system function test analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Choi, J., Oh, H., UIIah, S.: IPsec for high speed network links: performance analysis and enhancements. Future Gener. Comput. Syst. (2020)

    Google Scholar 

  2. Zhao, J., Hu, Z.: Modeling and optimization of packet forwarding performance processing in software-defined WAN. Netw. Weekly News 3 (2020)

    Google Scholar 

  3. Sakharov, A.: Annotated regular expressions and input-driven languages. Inf. Process. Lett. (2020)

    Google Scholar 

  4. Vaithyasubramanian, S., Christy, A.: ATM PIN generation - a formal mathematical model to generate PIN using regular grammar, context free grammar and recognition through finite state machine, pushdown automata. Int. J. Internet Protocol Technol. (2019)

    Google Scholar 

  5. Sui, J., Xie, P., Lin, Z., Javanmard, M.: Electronic classification of barcoded particles for multiplexed detection using supervised machine learning analysis. Talanta 215, 120791 (2020). https://doi.org/10.1016/j.talanta.2020.120791

    Article  Google Scholar 

  6. Mathew, S.E., Pauline, A.: HTTP botnet defense mechanism using system dynamics based genetic algorithm. Indian J. Sci. Technol. (2016)

    Google Scholar 

  7. Zeng, P., Tan, Q., Meng, X., Shao, Z., Xie, Q.: A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol. PLOS ONE (2017)

    Google Scholar 

  8. Luthfi, F., Juanda, E.A., Kustiawan, I.: Optimization of data communication on air control device based on internet of things with application of HTTP and MQTT protocols. In: IOP Conference Series: Materials Science and Engineering (2018)

    Google Scholar 

  9. Idhammad, M., Afdel, K., Belouch, M., Li, H.: Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest. Secur. Commun. Netw. (2018)

    Google Scholar 

  10. Hubballi, N., Santini, J.: Detecting TCP ACK storm attack: a state transition modelling approach. IET Netw. (2018)

    Google Scholar 

  11. Bhattacharjya, A., Zhong, X., Wang, J.: An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures. Int. J. Inf. Comput. Secur. (2018)

    Google Scholar 

  12. Huang, K., Wang, K., Zheng, D., Zhang, X., Yan, X.: Access adaptive and thread-aware cache partitioning in multicore systems. Electronics (2018)

    Google Scholar 

  13. Li, J., Peng, D., Wei, Y.: Networked robot identification technology for multi objects based on RFID-ZigBee. In: IOP Conference Series: Materials Science and Engineering (2018)

    Google Scholar 

  14. Zheng, W., Xia, F., Yang, C., Zhang, M., Chen, L.Y.: Implementation and applications of a new real-time framework for plasma control system in HL-2A. Fusion Eng. Des. (2018)

    Google Scholar 

  15. Ghafoor, M., Iqbal, S., Tariq, S.A., Taj, I.A., Jafri, N.M.: Efficient fingerprint matching using GPU. IET Image Process. (2018)

    Google Scholar 

  16. Tahir, M., Sardaraz, M., Ikram, A.A.: EPMA: efficient pattern matching algorithm for DNA sequences. Expert Syst. Appl. (2017)

    Google Scholar 

  17. Cong, T.D., Yong, C., Myon, K.J., Hong, K.C.: A novel cooperative warp and thread block scheduling technique for improving the GPGPU resource utilization. KIPS Trans. Comput. Commun. Syst. (2017)

    Google Scholar 

  18. Xie, C., Tan, J., Chen, M., Yi, Y., Peng, L.: Emerging technology enabled energy-efficient GPGPUs register file. Microprocess. Microsyst. (2017)

    Google Scholar 

  19. Pan, L., Cheng, C., Haberkorn, U., Dimitrakopoulou-Strauss, A.: Machine learning-based kinetic modeling: a robust and reproducible solution for quantitative analysis of dynamic PET data. Phys. Med. Biol. (2017)

    Google Scholar 

  20. Gummadidala, K.R., Jeya, R.: Creating web server in Android mobile and easy serving of information to clients. Indian J. Sci. Technol. (2016)

    Google Scholar 

  21. Zhu, L., Huang, L., Fu, P., Gao, G., He, S.: Upgrade of the synchronous data management system of the EAST poloidal field power supply. Fusion Eng. Des. (2016)

    Google Scholar 

  22. Hu, Z., Shi, T.: The design and implementation of motor control system monitoring software based on WPF. Hans J. Wirel. Commun. (2016)

    Google Scholar 

  23. Chen, H., Yang, Y.: Program transmission method of PLC equipments’ remote monitoring software based on virtual serial port. Comput. Sci. Appl. (2016)

    Google Scholar 

  24. Jabal, S., Ung-arunyawee, R.: Performance improvement of developed program by using multi-thread technique. KKU Eng. J. (2015)

    Google Scholar 

  25. Cui, X.M., Zheng, K., Liu, C.R., Zheng, Q.: Multi-threaded technology apply in real time measurement system of dual-camera. Appl. Mech. Mater. (2015)

    Google Scholar 

  26. Goik, D., Sieniek, M., Gurgul, P., Paszyński, M.: Modeling of the absorption of the electromagnetic wave energy in the human head induced by cell phone. J. Appl. Math. Phys. (2015)

    Google Scholar 

Download references

Funding

Supported by National Key R&D Program of China (2017YFC1201204).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangzhan Yu .

Editor information

Editors and Affiliations

Ethics declarations

The authors declare that they have no conflicts of interest to report regarding the present study.

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Che, J., Zhang, C., Xing, X., Yu, X. (2021). Design and Implementation of Information Detection System Based on Privacy Sensitive Data. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1424. Springer, Cham. https://doi.org/10.1007/978-3-030-78621-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78621-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78620-5

  • Online ISBN: 978-3-030-78621-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics