Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data

Sharing of network data between organizations is desperately needed as attackers bounce between targets in different security domains and launch attacks across security domains. Anonymization to protect private/sensitive information has emerged as a promising approach to sharing network data between...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Yurcik, W., Woolam, C., Hellings, G., Khan, L., Thuraisingham, B.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 994
container_issue
container_start_page 991
container_title
container_volume
creator Yurcik, W.
Woolam, C.
Hellings, G.
Khan, L.
Thuraisingham, B.
description Sharing of network data between organizations is desperately needed as attackers bounce between targets in different security domains and launch attacks across security domains. Anonymization to protect private/sensitive information has emerged as a promising approach to sharing network data between security domains. However, a fundamental tradeoff exists between the anonymization of data for privacy protection and the utility of anonymized for security analysis. While many researchers have referred to this tradeoff, no one has characterized it with testing. In this paper we present a testing framework we have developed to characterize privacy/analysis anonymization tradeoffs along with some preliminary results.
doi_str_mv 10.1109/NOMS.2008.4575265
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4575265</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4575265</ieee_id><sourcerecordid>4575265</sourcerecordid><originalsourceid>FETCH-LOGICAL-c223t-133f3d071ed1d1498a8b4bc7b872682138c165488e2fb9469d2beb02c8eb64453</originalsourceid><addsrcrecordid>eNpFkMtOwzAURM1LIi18AGLjH0h7ff3MElW8pJYuCuvKThxqaB0UG1D4ehBUYjWL0RkdDSEXDCaMQTV9WC5WEwQwEyG1RCUPyIgJFAJBKTgkBXItykpDdfRfSDwmBZMCS4bATskopRcAoYFDQVYLb9N7H-IztbGLwy582Ry6SN_68GHrYWqj3Q4pJJp72_iubRMNceN7HzPNHU0b-wtHnz-7_pU2NtszctLabfLn-xyTp5vrx9ldOV_e3s-u5mWNyHPJOG95A5r5hjVMVMYaJ1ytndGoDDJuaqakMMZj6yqhqgadd4C18U4JIfmYXP7tBu_9-kd4Z_thvX-GfwNU2lSM</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yurcik, W. ; Woolam, C. ; Hellings, G. ; Khan, L. ; Thuraisingham, B.</creator><creatorcontrib>Yurcik, W. ; Woolam, C. ; Hellings, G. ; Khan, L. ; Thuraisingham, B.</creatorcontrib><description>Sharing of network data between organizations is desperately needed as attackers bounce between targets in different security domains and launch attacks across security domains. Anonymization to protect private/sensitive information has emerged as a promising approach to sharing network data between security domains. However, a fundamental tradeoff exists between the anonymization of data for privacy protection and the utility of anonymized for security analysis. While many researchers have referred to this tradeoff, no one has characterized it with testing. In this paper we present a testing framework we have developed to characterize privacy/analysis anonymization tradeoffs along with some preliminary results.</description><identifier>ISSN: 1542-1201</identifier><identifier>ISBN: 1424420652</identifier><identifier>ISBN: 9781424420650</identifier><identifier>EISSN: 2374-9709</identifier><identifier>EISBN: 1424420660</identifier><identifier>EISBN: 9781424420667</identifier><identifier>DOI: 10.1109/NOMS.2008.4575265</identifier><language>eng</language><publisher>IEEE</publisher><subject>anonymization ; Collaboration ; data obfuscation ; Data privacy ; Data security ; Information security ; network data anonymization ; network data sharing ; network intrusion detection ; network log anonymization ; network monitoring ; network packet trace anonymization ; network packet traces ; Pattern analysis ; privacy protection ; Protection ; Risk analysis ; SCRUB ; SCRUB-Netflows ; SCRUB-PA ; SCRUB-tcpdump ; security data sharing ; Telecommunication traffic ; Testing ; Traffic control ; trust management</subject><ispartof>NOMS 2008 - 2008 IEEE Network Operations and Management Symposium, 2008, p.991-994</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c223t-133f3d071ed1d1498a8b4bc7b872682138c165488e2fb9469d2beb02c8eb64453</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4575265$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4575265$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yurcik, W.</creatorcontrib><creatorcontrib>Woolam, C.</creatorcontrib><creatorcontrib>Hellings, G.</creatorcontrib><creatorcontrib>Khan, L.</creatorcontrib><creatorcontrib>Thuraisingham, B.</creatorcontrib><title>Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data</title><title>NOMS 2008 - 2008 IEEE Network Operations and Management Symposium</title><addtitle>NOMS</addtitle><description>Sharing of network data between organizations is desperately needed as attackers bounce between targets in different security domains and launch attacks across security domains. Anonymization to protect private/sensitive information has emerged as a promising approach to sharing network data between security domains. However, a fundamental tradeoff exists between the anonymization of data for privacy protection and the utility of anonymized for security analysis. While many researchers have referred to this tradeoff, no one has characterized it with testing. In this paper we present a testing framework we have developed to characterize privacy/analysis anonymization tradeoffs along with some preliminary results.</description><subject>anonymization</subject><subject>Collaboration</subject><subject>data obfuscation</subject><subject>Data privacy</subject><subject>Data security</subject><subject>Information security</subject><subject>network data anonymization</subject><subject>network data sharing</subject><subject>network intrusion detection</subject><subject>network log anonymization</subject><subject>network monitoring</subject><subject>network packet trace anonymization</subject><subject>network packet traces</subject><subject>Pattern analysis</subject><subject>privacy protection</subject><subject>Protection</subject><subject>Risk analysis</subject><subject>SCRUB</subject><subject>SCRUB-Netflows</subject><subject>SCRUB-PA</subject><subject>SCRUB-tcpdump</subject><subject>security data sharing</subject><subject>Telecommunication traffic</subject><subject>Testing</subject><subject>Traffic control</subject><subject>trust management</subject><issn>1542-1201</issn><issn>2374-9709</issn><isbn>1424420652</isbn><isbn>9781424420650</isbn><isbn>1424420660</isbn><isbn>9781424420667</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFkMtOwzAURM1LIi18AGLjH0h7ff3MElW8pJYuCuvKThxqaB0UG1D4ehBUYjWL0RkdDSEXDCaMQTV9WC5WEwQwEyG1RCUPyIgJFAJBKTgkBXItykpDdfRfSDwmBZMCS4bATskopRcAoYFDQVYLb9N7H-IztbGLwy582Ry6SN_68GHrYWqj3Q4pJJp72_iubRMNceN7HzPNHU0b-wtHnz-7_pU2NtszctLabfLn-xyTp5vrx9ldOV_e3s-u5mWNyHPJOG95A5r5hjVMVMYaJ1ytndGoDDJuaqakMMZj6yqhqgadd4C18U4JIfmYXP7tBu_9-kd4Z_thvX-GfwNU2lSM</recordid><startdate>200804</startdate><enddate>200804</enddate><creator>Yurcik, W.</creator><creator>Woolam, C.</creator><creator>Hellings, G.</creator><creator>Khan, L.</creator><creator>Thuraisingham, B.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200804</creationdate><title>Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data</title><author>Yurcik, W. ; Woolam, C. ; Hellings, G. ; Khan, L. ; Thuraisingham, B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c223t-133f3d071ed1d1498a8b4bc7b872682138c165488e2fb9469d2beb02c8eb64453</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>anonymization</topic><topic>Collaboration</topic><topic>data obfuscation</topic><topic>Data privacy</topic><topic>Data security</topic><topic>Information security</topic><topic>network data anonymization</topic><topic>network data sharing</topic><topic>network intrusion detection</topic><topic>network log anonymization</topic><topic>network monitoring</topic><topic>network packet trace anonymization</topic><topic>network packet traces</topic><topic>Pattern analysis</topic><topic>privacy protection</topic><topic>Protection</topic><topic>Risk analysis</topic><topic>SCRUB</topic><topic>SCRUB-Netflows</topic><topic>SCRUB-PA</topic><topic>SCRUB-tcpdump</topic><topic>security data sharing</topic><topic>Telecommunication traffic</topic><topic>Testing</topic><topic>Traffic control</topic><topic>trust management</topic><toplevel>online_resources</toplevel><creatorcontrib>Yurcik, W.</creatorcontrib><creatorcontrib>Woolam, C.</creatorcontrib><creatorcontrib>Hellings, G.</creatorcontrib><creatorcontrib>Khan, L.</creatorcontrib><creatorcontrib>Thuraisingham, B.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yurcik, W.</au><au>Woolam, C.</au><au>Hellings, G.</au><au>Khan, L.</au><au>Thuraisingham, B.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data</atitle><btitle>NOMS 2008 - 2008 IEEE Network Operations and Management Symposium</btitle><stitle>NOMS</stitle><date>2008-04</date><risdate>2008</risdate><spage>991</spage><epage>994</epage><pages>991-994</pages><issn>1542-1201</issn><eissn>2374-9709</eissn><isbn>1424420652</isbn><isbn>9781424420650</isbn><eisbn>1424420660</eisbn><eisbn>9781424420667</eisbn><abstract>Sharing of network data between organizations is desperately needed as attackers bounce between targets in different security domains and launch attacks across security domains. Anonymization to protect private/sensitive information has emerged as a promising approach to sharing network data between security domains. However, a fundamental tradeoff exists between the anonymization of data for privacy protection and the utility of anonymized for security analysis. While many researchers have referred to this tradeoff, no one has characterized it with testing. In this paper we present a testing framework we have developed to characterize privacy/analysis anonymization tradeoffs along with some preliminary results.</abstract><pub>IEEE</pub><doi>10.1109/NOMS.2008.4575265</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1542-1201
ispartof NOMS 2008 - 2008 IEEE Network Operations and Management Symposium, 2008, p.991-994
issn 1542-1201
2374-9709
language eng
recordid cdi_ieee_primary_4575265
source IEEE Electronic Library (IEL) Conference Proceedings
subjects anonymization
Collaboration
data obfuscation
Data privacy
Data security
Information security
network data anonymization
network data sharing
network intrusion detection
network log anonymization
network monitoring
network packet trace anonymization
network packet traces
Pattern analysis
privacy protection
Protection
Risk analysis
SCRUB
SCRUB-Netflows
SCRUB-PA
SCRUB-tcpdump
security data sharing
Telecommunication traffic
Testing
Traffic control
trust management
title Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T08%3A24%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Measuring%20anonymization%20privacy/analysis%20tradeoffs%20inherent%20to%20sharing%20network%20data&rft.btitle=NOMS%202008%20-%202008%20IEEE%20Network%20Operations%20and%20Management%20Symposium&rft.au=Yurcik,%20W.&rft.date=2008-04&rft.spage=991&rft.epage=994&rft.pages=991-994&rft.issn=1542-1201&rft.eissn=2374-9709&rft.isbn=1424420652&rft.isbn_list=9781424420650&rft_id=info:doi/10.1109/NOMS.2008.4575265&rft_dat=%3Cieee_6IE%3E4575265%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424420660&rft.eisbn_list=9781424420667&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4575265&rfr_iscdi=true