Please use this identifier to cite or link to this item:
http://arks.princeton.edu/ark:/99999/fk4r22d867
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Mittal, Prateek | |
dc.contributor.author | Liu, Yushan | |
dc.contributor.other | Electrical Engineering Department | |
dc.date.accessioned | 2021-10-04T13:24:54Z | - |
dc.date.available | 2021-10-04T13:24:54Z | - |
dc.date.created | 2021-01-01 | |
dc.date.issued | 2021 | |
dc.identifier.uri | http://arks.princeton.edu/ark:/99999/fk4r22d867 | - |
dc.description.abstract | Today, governments, businesses, and the critical infrastructure are facing cyberattacks of increasing frequency, intensity, and complexity. With the widespread use of sensitive data in applications such as social network based systems and enterprise systems, the chances of breaching the privacy of individuals and corporations have increased. It has thus become essential to protect networks and data from security threats and privacy leakage. Towards this end, an important line of research has focused on enhancing security and privacy using the analysis of graphs, such as social graphs in reputation systems and anonymous communication systems, and causal dependency graphs in enterprise forensic systems. In this thesis, we explore solutions to the limitations of two widely adopted graph analytics techniques in security and privacy applications, i.e., analysis of trust relationships in social graphs and causal relationships in dependency graphs. We observe that classical paradigms for graph analytics, such as the use of random walks on social graphs and the use of breadth-rst search on dependency graphs, have induced poor trade-offs between security/privacy and functionality due to the lack of exibility. Our insight is that leveraging graph-theoretic characteristics and machine learning techniques, we can make the conventional paradigms adaptive to improve the security/privacy without harming the utility. We present three systems for network security and privacy based on our advanced graph analytics: i) we introduce an adaptive random walk algorithm that uses a heterogeneous random walk length across nodes in a graph based on their local structural characteristics. Based on this algorithm, we propose SmartWalk, a security enhancing system which incorporates adaptive random walks in social network security applications. ii) We introduce a prioritized search algorithm that considers the topological properties of nodes in a graph to accelerate the search. Based on this algorithm, we propose PrioTracker, a backward and forward causality tracker that automatically prioritizes the search for abnormal causal dependencies within a time constraint. iii) We introduce an interruptible context-based prioritized search algorithm that propagates and re-assesses node priorities by uncovering the paths between nodes on a graph. Based on this algorithm, we propose RAPID, an automated real-time alert triage system that helps scale up the alarm processing capability in enterprises. Using multiple real-world datasets, we show that these three systems are able to improve the trade-off between security/privacy and utility by at least one order of magnitude. Two of our proposed systems, PrioTracker and RAPID, have been deployed in real-world enterprises. | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | |
dc.publisher | Princeton, NJ : Princeton University | |
dc.relation.isformatof | The Mudd Manuscript Library retains one bound copy of each dissertation. Search for these copies in the library's main catalog: <a href=http://catalog.princeton.edu>catalog.princeton.edu</a> | |
dc.subject | data privacy | |
dc.subject | enterprise network | |
dc.subject | graph analytics | |
dc.subject | network security | |
dc.subject | social network | |
dc.subject.classification | Electrical engineering | |
dc.title | Enhancing Network Security and Privacy Using Graph-Theoretic Characteristics | |
dc.type | Academic dissertations (Ph.D.) | |
pu.date.classyear | 2021 | |
pu.department | Electrical Engineering | |
Appears in Collections: | Electrical Engineering |
Files in This Item:
File | Size | Format | |
---|---|---|---|
Liu_princeton_0181D_13708.pdf | 9.59 MB | Adobe PDF | View/Download |
Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.