Abstract
In recent years, with the development of network technology, network applications and network transmission protocols emerge one after another. Although a growing awareness for the protection of private data, network applications and transmission protocol is to protect user privacy data by using various methods, but there are still a part of the application or web access to user data is not to make any protective measures, its may cause the user’s private data during transmission cause leaks, have serious consequences. This paper mainly studies the detection of private data by collecting data traffic in the network, analyzing the content, and determining whether the data is encrypted during the transmission process. A private data detection system including traffic capture, data processing, protocol analysis and regular matching is implemented. At the same time, some technical methods are used to optimize and innovate all parts of the system.
This paper will briefly introduce the current development trend of network information security, and briefly describe the implementation of each part of the whole system, each part will be described from the functional introduction, specific implementation, and finally through some test samples and the results of the system function test analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Choi, J., Oh, H., UIIah, S.: IPsec for high speed network links: performance analysis and enhancements. Future Gener. Comput. Syst. (2020)
Zhao, J., Hu, Z.: Modeling and optimization of packet forwarding performance processing in software-defined WAN. Netw. Weekly News 3 (2020)
Sakharov, A.: Annotated regular expressions and input-driven languages. Inf. Process. Lett. (2020)
Vaithyasubramanian, S., Christy, A.: ATM PIN generation - a formal mathematical model to generate PIN using regular grammar, context free grammar and recognition through finite state machine, pushdown automata. Int. J. Internet Protocol Technol. (2019)
Sui, J., Xie, P., Lin, Z., Javanmard, M.: Electronic classification of barcoded particles for multiplexed detection using supervised machine learning analysis. Talanta 215, 120791 (2020). https://doi.org/10.1016/j.talanta.2020.120791
Mathew, S.E., Pauline, A.: HTTP botnet defense mechanism using system dynamics based genetic algorithm. Indian J. Sci. Technol. (2016)
Zeng, P., Tan, Q., Meng, X., Shao, Z., Xie, Q.: A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol. PLOS ONE (2017)
Luthfi, F., Juanda, E.A., Kustiawan, I.: Optimization of data communication on air control device based on internet of things with application of HTTP and MQTT protocols. In: IOP Conference Series: Materials Science and Engineering (2018)
Idhammad, M., Afdel, K., Belouch, M., Li, H.: Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest. Secur. Commun. Netw. (2018)
Hubballi, N., Santini, J.: Detecting TCP ACK storm attack: a state transition modelling approach. IET Netw. (2018)
Bhattacharjya, A., Zhong, X., Wang, J.: An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures. Int. J. Inf. Comput. Secur. (2018)
Huang, K., Wang, K., Zheng, D., Zhang, X., Yan, X.: Access adaptive and thread-aware cache partitioning in multicore systems. Electronics (2018)
Li, J., Peng, D., Wei, Y.: Networked robot identification technology for multi objects based on RFID-ZigBee. In: IOP Conference Series: Materials Science and Engineering (2018)
Zheng, W., Xia, F., Yang, C., Zhang, M., Chen, L.Y.: Implementation and applications of a new real-time framework for plasma control system in HL-2A. Fusion Eng. Des. (2018)
Ghafoor, M., Iqbal, S., Tariq, S.A., Taj, I.A., Jafri, N.M.: Efficient fingerprint matching using GPU. IET Image Process. (2018)
Tahir, M., Sardaraz, M., Ikram, A.A.: EPMA: efficient pattern matching algorithm for DNA sequences. Expert Syst. Appl. (2017)
Cong, T.D., Yong, C., Myon, K.J., Hong, K.C.: A novel cooperative warp and thread block scheduling technique for improving the GPGPU resource utilization. KIPS Trans. Comput. Commun. Syst. (2017)
Xie, C., Tan, J., Chen, M., Yi, Y., Peng, L.: Emerging technology enabled energy-efficient GPGPUs register file. Microprocess. Microsyst. (2017)
Pan, L., Cheng, C., Haberkorn, U., Dimitrakopoulou-Strauss, A.: Machine learning-based kinetic modeling: a robust and reproducible solution for quantitative analysis of dynamic PET data. Phys. Med. Biol. (2017)
Gummadidala, K.R., Jeya, R.: Creating web server in Android mobile and easy serving of information to clients. Indian J. Sci. Technol. (2016)
Zhu, L., Huang, L., Fu, P., Gao, G., He, S.: Upgrade of the synchronous data management system of the EAST poloidal field power supply. Fusion Eng. Des. (2016)
Hu, Z., Shi, T.: The design and implementation of motor control system monitoring software based on WPF. Hans J. Wirel. Commun. (2016)
Chen, H., Yang, Y.: Program transmission method of PLC equipments’ remote monitoring software based on virtual serial port. Comput. Sci. Appl. (2016)
Jabal, S., Ung-arunyawee, R.: Performance improvement of developed program by using multi-thread technique. KKU Eng. J. (2015)
Cui, X.M., Zheng, K., Liu, C.R., Zheng, Q.: Multi-threaded technology apply in real time measurement system of dual-camera. Appl. Mech. Mater. (2015)
Goik, D., Sieniek, M., Gurgul, P., Paszyński, M.: Modeling of the absorption of the electromagnetic wave energy in the human head induced by cell phone. J. Appl. Math. Phys. (2015)
Funding
Supported by National Key R&D Program of China (2017YFC1201204).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
The authors declare that they have no conflicts of interest to report regarding the present study.
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Che, J., Zhang, C., Xing, X., Yu, X. (2021). Design and Implementation of Information Detection System Based on Privacy Sensitive Data. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1424. Springer, Cham. https://doi.org/10.1007/978-3-030-78621-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-78621-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78620-5
Online ISBN: 978-3-030-78621-2
eBook Packages: Computer ScienceComputer Science (R0)