{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:01Z","timestamp":1750221121730,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316626","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"569-573","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System"],"prefix":"10.1145","author":[{"given":"Yee Jian","family":"Chew","sequence":"first","affiliation":[{"name":"Science and Technology, Multimedia University, Melaka, Malaysia"}]},{"given":"Shih Yin","family":"Ooi","sequence":"additional","affiliation":[{"name":"Science and Technology, Multimedia University, Melaka, Malaysia"}]},{"given":"Kok-Seng","family":"Wong","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Nazarbayev University, Astana, Kazakhstan"}]},{"given":"Ying Han","family":"Pang","sequence":"additional","affiliation":[{"name":"Science and Technology, Multimedia University, Melaka, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_4_1","first-page":"106","volume-title":"Conf. Data Eng., no. 3","author":"Li N.","year":"2007","unstructured":"N. Li , T. Li , and S. Venkatasubramanian , \" t-Closeness: Privacy Beyond k-Anonymity and l-Diversity,\" 2007 IEEE 23rd Int . Conf. Data Eng., no. 3 , pp. 106 -- 115 , 2007 . N. Li, T. Li, and S. Venkatasubramanian, \"t-Closeness: Privacy Beyond k-Anonymity and l-Diversity,\" 2007 IEEE 23rd Int. Conf. Data Eng., no. 3, pp. 106--115, 2007."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proenv.2012.01.432"},{"key":"e_1_3_2_1_7_1","first-page":"2372","article-title":"Obfuscation of sensitive data in network flows","author":"Riboni D.","year":"2012","unstructured":"D. Riboni , A. Villani , D. Vitali , C. Bettini , and L. V. Mancini , \" Obfuscation of sensitive data in network flows ,\" Proc. - IEEE INFOCOM , pp. 2372 -- 2380 , 2012 . D. Riboni, A. Villani, D. Vitali, C. Bettini, and L. V. Mancini, \"Obfuscation of sensitive data in network flows,\" Proc. - IEEE INFOCOM, pp. 2372--2380, 2012.","journal-title":"Proc. - IEEE INFOCOM"},{"key":"e_1_3_2_1_8_1","volume-title":"Anonymizing Network Traces with Temporal Pseudonym Consistency","author":"Qardaji W.","year":"2012","unstructured":"W. Qardaji and N. Li , \" Anonymizing Network Traces with Temporal Pseudonym Consistency ,\" 2012 . W. Qardaji and N. Li, \"Anonymizing Network Traces with Temporal Pseudonym Consistency,\" 2012."},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Evaluation of Black-Marker and Bilateral Classification with J48 Decision Tree in Anomaly Based Intrusion Detection System","author":"Chew Y. J.","year":"2018","unstructured":"Y. J. Chew , S. Y. Ooi , K. Wong , Y. H. Pang , and S. O. Hwang , \" Evaluation of Black-Marker and Bilateral Classification with J48 Decision Tree in Anomaly Based Intrusion Detection System ,\" J. Intell. Fuzzy Syst. , pp. 1 -- 11 , 2018 . Y. J. Chew, S. Y. Ooi, K. Wong, Y. H. Pang, and S. O. Hwang, \"Evaluation of Black-Marker and Bilateral Classification with J48 Decision Tree in Anomaly Based Intrusion Detection System,\" J. Intell. Fuzzy Syst., pp. 1-- 11, 2018.","journal-title":"J. Intell. Fuzzy Syst."},{"key":"e_1_3_2_1_10_1","volume-title":"Generation of the database gurekddcup","author":"Perona I.","year":"2016","unstructured":"I. Perona , O. Arbelaitz , I. Gurrutxaga , J. I. Martin , J. Muguerza , and J. M. Perez , \" Generation of the database gurekddcup ,\" 2016 . I. Perona, O. Arbelaitz, I. Gurrutxaga, J. I. Martin, J. Muguerza, and J. M. Perez, \"Generation of the database gurekddcup,\" 2016."},{"key":"e_1_3_2_1_11_1","first-page":"553","volume-title":"The WEKA Workbench,\" Morgan Kaufmann","author":"Frank E.","year":"2016","unstructured":"E. Frank , M. A. Hall , and I. H. Witten , \" The WEKA Workbench,\" Morgan Kaufmann , Fourth Ed., pp. 553 -- 571 , 2016 . E. Frank, M. A. Hall, and I. H. Witten, \"The WEKA Workbench,\" Morgan Kaufmann, Fourth Ed., pp. 553--571, 2016."},{"key":"e_1_3_2_1_12_1","unstructured":"J. Bongertz \"TraceWrangler.\" {Online}. Available: https:\/\/www.tracewrangler.com\/. {Accessed: 01-Nov- 2017}.  J. Bongertz \"TraceWrangler.\" {Online}. Available: https:\/\/www.tracewrangler.com\/. {Accessed: 01-Nov- 2017}."},{"key":"e_1_3_2_1_13_1","first-page":"16","volume-title":"LISA 06 20th Large Install. Syst. Adm. Conf. Washingt. DC USENIX Assoc.","author":"Slagell A.","year":"2006","unstructured":"A. Slagell , K. Lakkaraju , and K. Luo , \" FLAIM: A Multilevel Anonymization Framework for Computer and Network Logs,\" Proc . LISA 06 20th Large Install. Syst. Adm. Conf. Washingt. DC USENIX Assoc. December 38 2006 , p. 16 , 2006. A. Slagell, K. Lakkaraju, and K. Luo, \"FLAIM: A Multilevel Anonymization Framework for Computer and Network Logs,\" Proc. LISA 06 20th Large Install. Syst. Adm. Conf. Washingt. DC USENIX Assoc. December 38 2006, p. 16, 2006."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550306"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182660"},{"key":"e_1_3_2_1_16_1","volume-title":"The SCRUB * Security Anonymization Tool Infrastructure The SCRUB * Architecture","author":"Yurcik W.","year":"2008","unstructured":"W. Yurcik , \" Safely Sharing Data Between CSIR Ts : The SCRUB * Security Anonymization Tool Infrastructure The SCRUB * Architecture ,\" 2008 . {Online}. Available: https:\/\/www.first.org\/resources\/papers\/conference2008\/yur cik-William-slides.pdf. W. Yurcik, \"Safely Sharing Data Between CSIRTs: The SCRUB * Security Anonymization Tool Infrastructure The SCRUB * Architecture,\" 2008. {Online}. Available: https:\/\/www.first.org\/resources\/papers\/conference2008\/yur cik-William-slides.pdf."},{"key":"e_1_3_2_1_17_1","volume-title":"Comput. Commun. INFOCOM","volume":"23","author":"Riboni D.","year":"2012","unstructured":"D. Riboni , A. Villani , D. Vitali , C. Bettini , and L. V Mancini , \"Obfuscation of sensitive data in network flows,\" IEEE Conf . Comput. Commun. INFOCOM 2012 , vol. 23 , no. 2, pp. 2372--2380, 2015. D. Riboni, A. Villani, D. Vitali, C. Bettini, and L. V Mancini, \"Obfuscation of sensitive data in network flows,\" IEEE Conf. Comput. Commun. INFOCOM 2012, vol. 23, no. 2, pp. 2372--2380, 2015."},{"key":"e_1_3_2_1_18_1","first-page":"280","volume-title":"Conf. Netw. Protoc. ICNP","volume":"46","author":"Xu J.","year":"2004","unstructured":"J. Xu , J. Fan , M. H. Ammar , and S. B. Moon , \" Prefixpreserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme,\" Proc. - Int . Conf. Netw. Protoc. ICNP , vol. 46 , pp. 280 -- 289 , 2004 . J. Xu, J. Fan, M. H. Ammar, and S. B. Moon, \"Prefixpreserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme,\" Proc. - Int. Conf. Netw. Protoc. ICNP, vol. 46, pp. 280-- 289, 2004."},{"key":"e_1_3_2_1_19_1","first-page":"125","volume-title":"15th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Coull S. E.","year":"2008","unstructured":"S. E. Coull , C. V. Wright , A. D. Keromytis , F. Monrose , and M. K. Reiter , \" Taming the Devil: Techniques for Evaluating Anonymized Network Data,\" Proc . 15th Annu. Netw. Distrib. Syst. Secur. Symp. , pp. 125 -- 135 , 2008 . S. E. Coull, C. V. Wright, A. D. Keromytis, F. Monrose, and M. K. Reiter, \"Taming the Devil: Techniques for Evaluating Anonymized Network Data,\" Proc. 15th Annu. Netw. Distrib. Syst. Secur. Symp., pp. 125--135, 2008."},{"key":"e_1_3_2_1_20_1","first-page":"35","article-title":"Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces","volume":"7","author":"Coull S. E.","year":"2007","unstructured":"S. E. Coull , C. V Wright , F. Monrose , M. P. Collins , M. K. Reiter , and others , \" Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces .,\" Ndss , vol. 7 , pp. 35 -- 47 , 2007 . S. E. Coull, C. V Wright, F. Monrose, M. P. Collins, M. K. Reiter, and others, \"Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.,\" Ndss, vol. 7, pp. 35--47, 2007.","journal-title":"Ndss"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.189"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460899"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.295"},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"Comput. Intell. Secur. Def. Appl. CISDA 2009","author":"Tavallaee M.","year":"2009","unstructured":"M. Tavallaee , E. Bagheri , W. Lu , and A. A. Ghorbani , \" A detailed analysis of the KDD CUP 99 data set,\" IEEE Symp . Comput. Intell. Secur. Def. Appl. CISDA 2009 , no. Cisda , pp. 1 -- 6 , 2009 . M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, \"A detailed analysis of the KDD CUP 99 data set,\" IEEE Symp. Comput. Intell. Secur. Def. Appl. CISDA 2009, no. Cisda, pp. 1--6, 2009."},{"key":"e_1_3_2_1_25_1","first-page":"1348","volume-title":"Adv. Comput. Conf. IACC 2014","author":"Sahu S. K.","year":"2014","unstructured":"S. K. Sahu , S. Sarangi , and S. K. Jena , \" A detail analysis on intrusion detection datasets,\" Souvenir 2014 IEEE Int . Adv. Comput. Conf. IACC 2014 , pp. 1348 -- 1353 , 2014 . S. K. Sahu, S. Sarangi, and S. K. Jena, \"A detail analysis on intrusion detection datasets,\" Souvenir 2014 IEEE Int. Adv. Comput. Conf. IACC 2014, pp. 1348--1353, 2014."},{"key":"e_1_3_2_1_26_1","first-page":"1","article-title":"Study of long short-term memory in flow-based network intrusion detection system","author":"Nicholas L.","year":"2018","unstructured":"L. Nicholas , S. Y. Ooi , Y. H. Pang , S. O. Hwang , and S.-Y. Tan , \" Study of long short-term memory in flow-based network intrusion detection system ,\" J. Intell. Fuzzy Syst. , pp. 1 -- 11 , 2018 . L. Nicholas, S. Y. Ooi, Y. H. Pang, S. O. Hwang, and S.-Y. Tan, \"Study of long short-term memory in flow-based network intrusion detection system,\" J. Intell. Fuzzy Syst., pp. 1--11, 2018.","journal-title":"J. Intell. Fuzzy Syst."}],"event":{"name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","sponsor":["University of New Brunswick University of New Brunswick"],"location":"Penang Malaysia","acronym":"ICSCA '19"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316626","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:11Z","timestamp":1750208531000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316626"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":26,"alternative-id":["10.1145\/3316615.3316626","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316626","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}