Polynomial-time Attack on Output Perturbation Sanitizers for Real-valued Databases
نویسنده
چکیده
Output Perturbation is one of several strategies in the area of Statistical Disclosure Control (SDC), also known as Private Data Analysis. The general problem in SDC consists of releasing valuable information about individuals in a databasewhile preserving their privacy. Examples of this include databases containing health information about patients, customer electronic transactions, and web browsing history, among others.
منابع مشابه
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملAsymptotic distributions of Neumann problem for Sturm-Liouville equation
In this paper we apply the Homotopy perturbation method to derive the higher-order asymptotic distribution of the eigenvalues and eigenfunctions associated with the linear real second order equation of Sturm-liouville type on $[0,pi]$ with Neumann conditions $(y'(0)=y'(pi)=0)$ where $q$ is a real-valued Sign-indefinite number of $C^{1}[0,pi]$ and $lambda$ is a real parameter.
متن کاملNonlinear Viscosity Algorithm with Perturbation for Nonexpansive Multi-Valued Mappings
In this paper, based on viscosity technique with perturbation, we introduce a new non-linear viscosity algorithm for finding a element of the set of fixed points of nonexpansivemulti-valued mappings in a Hilbert space. We derive a strong convergence theorem for thisnew algorithm under appropriate assumptions. Moreover, in support of our results, somenumerical examples (u...
متن کاملReal-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach
Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...
متن کاملPrivate Data Analysis via Output Perturbation - A Rigorous Approach to Constructing Sanitizers and Privacy Preserving Algorithms
We describe output perturbation techniques that allow for a provable, rigorous sense of individual privacy. Examples where the techniques are effective span from basic statistical computations to sophisticated machine learning algorithms.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011