Skip navigation
Please use this identifier to cite or link to this item: http://arks.princeton.edu/ark:/99999/fk4r22d867
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorMittal, Prateek
dc.contributor.authorLiu, Yushan
dc.contributor.otherElectrical Engineering Department
dc.date.accessioned2021-10-04T13:24:54Z-
dc.date.available2021-10-04T13:24:54Z-
dc.date.created2021-01-01
dc.date.issued2021
dc.identifier.urihttp://arks.princeton.edu/ark:/99999/fk4r22d867-
dc.description.abstractToday, governments, businesses, and the critical infrastructure are facing cyberattacks of increasing frequency, intensity, and complexity. With the widespread use of sensitive data in applications such as social network based systems and enterprise systems, the chances of breaching the privacy of individuals and corporations have increased. It has thus become essential to protect networks and data from security threats and privacy leakage. Towards this end, an important line of research has focused on enhancing security and privacy using the analysis of graphs, such as social graphs in reputation systems and anonymous communication systems, and causal dependency graphs in enterprise forensic systems. In this thesis, we explore solutions to the limitations of two widely adopted graph analytics techniques in security and privacy applications, i.e., analysis of trust relationships in social graphs and causal relationships in dependency graphs. We observe that classical paradigms for graph analytics, such as the use of random walks on social graphs and the use of breadth-rst search on dependency graphs, have induced poor trade-offs between security/privacy and functionality due to the lack of exibility. Our insight is that leveraging graph-theoretic characteristics and machine learning techniques, we can make the conventional paradigms adaptive to improve the security/privacy without harming the utility. We present three systems for network security and privacy based on our advanced graph analytics: i) we introduce an adaptive random walk algorithm that uses a heterogeneous random walk length across nodes in a graph based on their local structural characteristics. Based on this algorithm, we propose SmartWalk, a security enhancing system which incorporates adaptive random walks in social network security applications. ii) We introduce a prioritized search algorithm that considers the topological properties of nodes in a graph to accelerate the search. Based on this algorithm, we propose PrioTracker, a backward and forward causality tracker that automatically prioritizes the search for abnormal causal dependencies within a time constraint. iii) We introduce an interruptible context-based prioritized search algorithm that propagates and re-assesses node priorities by uncovering the paths between nodes on a graph. Based on this algorithm, we propose RAPID, an automated real-time alert triage system that helps scale up the alarm processing capability in enterprises. Using multiple real-world datasets, we show that these three systems are able to improve the trade-off between security/privacy and utility by at least one order of magnitude. Two of our proposed systems, PrioTracker and RAPID, have been deployed in real-world enterprises.
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.publisherPrinceton, NJ : Princeton University
dc.relation.isformatofThe Mudd Manuscript Library retains one bound copy of each dissertation. Search for these copies in the library's main catalog: <a href=http://catalog.princeton.edu>catalog.princeton.edu</a>
dc.subjectdata privacy
dc.subjectenterprise network
dc.subjectgraph analytics
dc.subjectnetwork security
dc.subjectsocial network
dc.subject.classificationElectrical engineering
dc.titleEnhancing Network Security and Privacy Using Graph-Theoretic Characteristics
dc.typeAcademic dissertations (Ph.D.)
pu.date.classyear2021
pu.departmentElectrical Engineering
Appears in Collections:Electrical Engineering

Files in This Item:
File SizeFormat 
Liu_princeton_0181D_13708.pdf9.59 MBAdobe PDFView/Download


Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.