Data Mining with Digital Fingerprinting - Challenges, Chances, and Novel Application Domains

被引:0
作者
Vodel, Matthias [1 ]
Ritter, Marc [2 ]
机构
[1] Tech Univ Chemnitz, Univ Comp Ctr, D-09107 Chemnitz, Germany
[2] Mittweida Univ Appl Sci, Professorship Media Informat, D-09648 Mittweida, Germany
来源
ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS (ICDM 2018) | 2018年 / 10933卷
关键词
Digital fingerprinting; Data mining; Sensor networks; IoT; Profiling; Classification; Sensor data fusion; Digital fingerprint; Security; Monitoring; Experimental application domains;
D O I
10.1007/978-3-319-95786-9_11
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
During the last decades, digital fingerprinting was used for hundreds of security-related applications. The main purpose relates to tracking and identification procedures for both users and tasks. The role of digital fingerprinting in data mining area became very important. As a key scale-out technology, thermal fingerprinting represents an experimental case study, which was introduced to show new application domains for fingerprinting-based profiling. We are now able to monitor all kind of sensor sources in a generic way. The concept is adoptable to hundreds of novel application domains in the IoT & smart metering context. In this paper, we summarize key features of the thermal fingerprinting approach. The feasibility is demonstrated in a large scaled data centre testbed with typical sensor sources, e.g., temperature, CPU load behaviour, memory usage, I/O characteristics, and general system information. As a result, the approach generates two-dimensional unique and indexable patterns. Besides this case study, we introduce several further use cases for this kind of sensor data fingerprinting. This includes data mining projects in the area of urban mobility profiling or innovative & lightweight weather forecast models, but also profiling capabilities in body area networks (health monitoring, fitness applications). Finally, we describe remaining challenges and critical security issues that still have to be solved.
引用
收藏
页码:148 / 161
页数:14
相关论文
共 12 条
[1]  
Fifield D., 2015, Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security AISec '15, P57
[2]  
Han B.B., 2014, P INT C INF TECHN CO, P377
[3]   Enhancing security of fingerprints through contextual biornetric watermarking [J].
Noore, Afzel ;
Singh, Richa ;
Vatsa, Mayank ;
Houck, Max M. .
FORENSIC SCIENCE INTERNATIONAL, 2007, 169 (2-3) :188-194
[4]  
Storz Michael, 2013, Human-Computer Interaction. Towards Intelligent and Implicit Interaction. 15th International Conference, HCI International 2013. Proceedings: LNCS 8008, P196, DOI 10.1007/978-3-642-39342-6_22
[5]   Digital image forensics via intrinsic fingerprints [J].
Swaminathan, Ashwin ;
Wu, Min ;
Liu, K. J. Ray .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) :101-117
[6]   Web Browser Fingerprinting using only Cascading Style Sheets [J].
Takei, Naoki ;
Saito, Takamichi ;
Takasu, Ko ;
Yamada, Tomotaka .
2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, :57-63
[7]  
Vodel Matthias, 2008, Journal of Communications, V3, P11, DOI 10.4304/jcm.3.7.11-19
[8]  
Vodel M., 2017, P INT C EL INF COMM
[9]  
Vodel M., 2016, P 6 INT C SMART GRID
[10]  
Vodel M., 2017, P INT C INF RES MAN