Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data
Sharing of network data between organizations is desperately needed as attackers bounce between targets in different security domains and launch attacks across security domains. Anonymization to protect private/sensitive information has emerged as a promising approach to sharing network data between...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 994 |
---|---|
container_issue | |
container_start_page | 991 |
container_title | |
container_volume | |
creator | Yurcik, W. Woolam, C. Hellings, G. Khan, L. Thuraisingham, B. |
description | Sharing of network data between organizations is desperately needed as attackers bounce between targets in different security domains and launch attacks across security domains. Anonymization to protect private/sensitive information has emerged as a promising approach to sharing network data between security domains. However, a fundamental tradeoff exists between the anonymization of data for privacy protection and the utility of anonymized for security analysis. While many researchers have referred to this tradeoff, no one has characterized it with testing. In this paper we present a testing framework we have developed to characterize privacy/analysis anonymization tradeoffs along with some preliminary results. |
doi_str_mv | 10.1109/NOMS.2008.4575265 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4575265</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4575265</ieee_id><sourcerecordid>4575265</sourcerecordid><originalsourceid>FETCH-LOGICAL-c223t-133f3d071ed1d1498a8b4bc7b872682138c165488e2fb9469d2beb02c8eb64453</originalsourceid><addsrcrecordid>eNpFkMtOwzAURM1LIi18AGLjH0h7ff3MElW8pJYuCuvKThxqaB0UG1D4ehBUYjWL0RkdDSEXDCaMQTV9WC5WEwQwEyG1RCUPyIgJFAJBKTgkBXItykpDdfRfSDwmBZMCS4bATskopRcAoYFDQVYLb9N7H-IztbGLwy582Ry6SN_68GHrYWqj3Q4pJJp72_iubRMNceN7HzPNHU0b-wtHnz-7_pU2NtszctLabfLn-xyTp5vrx9ldOV_e3s-u5mWNyHPJOG95A5r5hjVMVMYaJ1ytndGoDDJuaqakMMZj6yqhqgadd4C18U4JIfmYXP7tBu_9-kd4Z_thvX-GfwNU2lSM</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yurcik, W. ; Woolam, C. ; Hellings, G. ; Khan, L. ; Thuraisingham, B.</creator><creatorcontrib>Yurcik, W. ; Woolam, C. ; Hellings, G. ; Khan, L. ; Thuraisingham, B.</creatorcontrib><description>Sharing of network data between organizations is desperately needed as attackers bounce between targets in different security domains and launch attacks across security domains. Anonymization to protect private/sensitive information has emerged as a promising approach to sharing network data between security domains. However, a fundamental tradeoff exists between the anonymization of data for privacy protection and the utility of anonymized for security analysis. While many researchers have referred to this tradeoff, no one has characterized it with testing. In this paper we present a testing framework we have developed to characterize privacy/analysis anonymization tradeoffs along with some preliminary results.</description><identifier>ISSN: 1542-1201</identifier><identifier>ISBN: 1424420652</identifier><identifier>ISBN: 9781424420650</identifier><identifier>EISSN: 2374-9709</identifier><identifier>EISBN: 1424420660</identifier><identifier>EISBN: 9781424420667</identifier><identifier>DOI: 10.1109/NOMS.2008.4575265</identifier><language>eng</language><publisher>IEEE</publisher><subject>anonymization ; Collaboration ; data obfuscation ; Data privacy ; Data security ; Information security ; network data anonymization ; network data sharing ; network intrusion detection ; network log anonymization ; network monitoring ; network packet trace anonymization ; network packet traces ; Pattern analysis ; privacy protection ; Protection ; Risk analysis ; SCRUB ; SCRUB-Netflows ; SCRUB-PA ; SCRUB-tcpdump ; security data sharing ; Telecommunication traffic ; Testing ; Traffic control ; trust management</subject><ispartof>NOMS 2008 - 2008 IEEE Network Operations and Management Symposium, 2008, p.991-994</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c223t-133f3d071ed1d1498a8b4bc7b872682138c165488e2fb9469d2beb02c8eb64453</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4575265$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4575265$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yurcik, W.</creatorcontrib><creatorcontrib>Woolam, C.</creatorcontrib><creatorcontrib>Hellings, G.</creatorcontrib><creatorcontrib>Khan, L.</creatorcontrib><creatorcontrib>Thuraisingham, B.</creatorcontrib><title>Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data</title><title>NOMS 2008 - 2008 IEEE Network Operations and Management Symposium</title><addtitle>NOMS</addtitle><description>Sharing of network data between organizations is desperately needed as attackers bounce between targets in different security domains and launch attacks across security domains. Anonymization to protect private/sensitive information has emerged as a promising approach to sharing network data between security domains. However, a fundamental tradeoff exists between the anonymization of data for privacy protection and the utility of anonymized for security analysis. While many researchers have referred to this tradeoff, no one has characterized it with testing. In this paper we present a testing framework we have developed to characterize privacy/analysis anonymization tradeoffs along with some preliminary results.</description><subject>anonymization</subject><subject>Collaboration</subject><subject>data obfuscation</subject><subject>Data privacy</subject><subject>Data security</subject><subject>Information security</subject><subject>network data anonymization</subject><subject>network data sharing</subject><subject>network intrusion detection</subject><subject>network log anonymization</subject><subject>network monitoring</subject><subject>network packet trace anonymization</subject><subject>network packet traces</subject><subject>Pattern analysis</subject><subject>privacy protection</subject><subject>Protection</subject><subject>Risk analysis</subject><subject>SCRUB</subject><subject>SCRUB-Netflows</subject><subject>SCRUB-PA</subject><subject>SCRUB-tcpdump</subject><subject>security data sharing</subject><subject>Telecommunication traffic</subject><subject>Testing</subject><subject>Traffic control</subject><subject>trust management</subject><issn>1542-1201</issn><issn>2374-9709</issn><isbn>1424420652</isbn><isbn>9781424420650</isbn><isbn>1424420660</isbn><isbn>9781424420667</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFkMtOwzAURM1LIi18AGLjH0h7ff3MElW8pJYuCuvKThxqaB0UG1D4ehBUYjWL0RkdDSEXDCaMQTV9WC5WEwQwEyG1RCUPyIgJFAJBKTgkBXItykpDdfRfSDwmBZMCS4bATskopRcAoYFDQVYLb9N7H-IztbGLwy582Ry6SN_68GHrYWqj3Q4pJJp72_iubRMNceN7HzPNHU0b-wtHnz-7_pU2NtszctLabfLn-xyTp5vrx9ldOV_e3s-u5mWNyHPJOG95A5r5hjVMVMYaJ1ytndGoDDJuaqakMMZj6yqhqgadd4C18U4JIfmYXP7tBu_9-kd4Z_thvX-GfwNU2lSM</recordid><startdate>200804</startdate><enddate>200804</enddate><creator>Yurcik, W.</creator><creator>Woolam, C.</creator><creator>Hellings, G.</creator><creator>Khan, L.</creator><creator>Thuraisingham, B.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200804</creationdate><title>Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data</title><author>Yurcik, W. ; Woolam, C. ; Hellings, G. ; Khan, L. ; Thuraisingham, B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c223t-133f3d071ed1d1498a8b4bc7b872682138c165488e2fb9469d2beb02c8eb64453</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>anonymization</topic><topic>Collaboration</topic><topic>data obfuscation</topic><topic>Data privacy</topic><topic>Data security</topic><topic>Information security</topic><topic>network data anonymization</topic><topic>network data sharing</topic><topic>network intrusion detection</topic><topic>network log anonymization</topic><topic>network monitoring</topic><topic>network packet trace anonymization</topic><topic>network packet traces</topic><topic>Pattern analysis</topic><topic>privacy protection</topic><topic>Protection</topic><topic>Risk analysis</topic><topic>SCRUB</topic><topic>SCRUB-Netflows</topic><topic>SCRUB-PA</topic><topic>SCRUB-tcpdump</topic><topic>security data sharing</topic><topic>Telecommunication traffic</topic><topic>Testing</topic><topic>Traffic control</topic><topic>trust management</topic><toplevel>online_resources</toplevel><creatorcontrib>Yurcik, W.</creatorcontrib><creatorcontrib>Woolam, C.</creatorcontrib><creatorcontrib>Hellings, G.</creatorcontrib><creatorcontrib>Khan, L.</creatorcontrib><creatorcontrib>Thuraisingham, B.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yurcik, W.</au><au>Woolam, C.</au><au>Hellings, G.</au><au>Khan, L.</au><au>Thuraisingham, B.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data</atitle><btitle>NOMS 2008 - 2008 IEEE Network Operations and Management Symposium</btitle><stitle>NOMS</stitle><date>2008-04</date><risdate>2008</risdate><spage>991</spage><epage>994</epage><pages>991-994</pages><issn>1542-1201</issn><eissn>2374-9709</eissn><isbn>1424420652</isbn><isbn>9781424420650</isbn><eisbn>1424420660</eisbn><eisbn>9781424420667</eisbn><abstract>Sharing of network data between organizations is desperately needed as attackers bounce between targets in different security domains and launch attacks across security domains. Anonymization to protect private/sensitive information has emerged as a promising approach to sharing network data between security domains. However, a fundamental tradeoff exists between the anonymization of data for privacy protection and the utility of anonymized for security analysis. While many researchers have referred to this tradeoff, no one has characterized it with testing. In this paper we present a testing framework we have developed to characterize privacy/analysis anonymization tradeoffs along with some preliminary results.</abstract><pub>IEEE</pub><doi>10.1109/NOMS.2008.4575265</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1542-1201 |
ispartof | NOMS 2008 - 2008 IEEE Network Operations and Management Symposium, 2008, p.991-994 |
issn | 1542-1201 2374-9709 |
language | eng |
recordid | cdi_ieee_primary_4575265 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | anonymization Collaboration data obfuscation Data privacy Data security Information security network data anonymization network data sharing network intrusion detection network log anonymization network monitoring network packet trace anonymization network packet traces Pattern analysis privacy protection Protection Risk analysis SCRUB SCRUB-Netflows SCRUB-PA SCRUB-tcpdump security data sharing Telecommunication traffic Testing Traffic control trust management |
title | Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T08%3A24%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Measuring%20anonymization%20privacy/analysis%20tradeoffs%20inherent%20to%20sharing%20network%20data&rft.btitle=NOMS%202008%20-%202008%20IEEE%20Network%20Operations%20and%20Management%20Symposium&rft.au=Yurcik,%20W.&rft.date=2008-04&rft.spage=991&rft.epage=994&rft.pages=991-994&rft.issn=1542-1201&rft.eissn=2374-9709&rft.isbn=1424420652&rft.isbn_list=9781424420650&rft_id=info:doi/10.1109/NOMS.2008.4575265&rft_dat=%3Cieee_6IE%3E4575265%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424420660&rft.eisbn_list=9781424420667&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4575265&rfr_iscdi=true |