TY - GEN
T1 - Dynamic surveillance
T2 - 14th International Workshop on Information Security Applications, WISA 2013
AU - Do, Heesung
AU - Choi, Peter
AU - Lee, Heejo
PY - 2014
Y1 - 2014
N2 - Surveillance is a critical measure to break anonymity. While surveillance with unlimited resources is often assumed as a means, against which, to design stronger anonymity algorithms, this paper addresses the general impact of limited resource on surveillance efficiency. The general impact of limited resource on identifying a hidden group is experimentally studied; the task of identification is only done by following communications between suspects, i.e., the information of whos talking to whom. The surveillance uses simple but intuitive algorithms to return more intelligence with limited resource. The surveillance subject used in this work is the publicly available Enron email data set, an actual trace of human interaction. The initial expectation was that, even with limited resource, intuitive surveillance algorithms would return the higher intelligence than a random approach by exploiting the general properties of power law-style communication map. To the contrary, the impact of limited resource was found large to the extent that intuitive algorithms do not return significantly higher intelligence than a random approach.
AB - Surveillance is a critical measure to break anonymity. While surveillance with unlimited resources is often assumed as a means, against which, to design stronger anonymity algorithms, this paper addresses the general impact of limited resource on surveillance efficiency. The general impact of limited resource on identifying a hidden group is experimentally studied; the task of identification is only done by following communications between suspects, i.e., the information of whos talking to whom. The surveillance uses simple but intuitive algorithms to return more intelligence with limited resource. The surveillance subject used in this work is the publicly available Enron email data set, an actual trace of human interaction. The initial expectation was that, even with limited resource, intuitive surveillance algorithms would return the higher intelligence than a random approach by exploiting the general properties of power law-style communication map. To the contrary, the impact of limited resource was found large to the extent that intuitive algorithms do not return significantly higher intelligence than a random approach.
KW - Anonymity
KW - Budget
KW - Email data set
KW - Surveillanc
UR - http://www.scopus.com/inward/record.url?scp=84958533915&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84958533915&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-05149-9_6
DO - 10.1007/978-3-319-05149-9_6
M3 - Conference contribution
AN - SCOPUS:84958533915
SN - 9783319051482
VL - 8267 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 81
EP - 99
BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PB - Springer Verlag
Y2 - 19 August 2013 through 21 August 2013
ER -