Generalization Privacy Protection Method for Alarm Data

Article Preview

Abstract:

To resolve conflicts between share and collaborative analysis requirements of security alarm and alert data holders worries about privacy, it firstly probes into the anonymized protection method Incognito. Based on that, it improves the algorithm to solve existing problems by extending common data like privacy protection targets to alert data. The generalized anonymous processing model for alert data is developed and the quantitative evaluation is realized between the level of alert datas secret protection and data quality. With authoritative data set of intrusion detection attack scenario as test data, the experiment validates efficiency and effectiveness of the proposed method on the part of performance and security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3646-3649

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] X. Yin, K. Lakkaraju, Y. Li et al. Selecting log data sources to correlate attack traces for computer network security: Preliminary results. In: Proceedings of the 11th International Conference on Telecommunication Systems, Modelling and Analysis, 2003: 112-116.

Google Scholar

[2] T. Limmer, and F. Dressler. Survey of Event Correlation Techniques for Attack Detection in Early Warning Systems. University of Erlangen, Dept. of Computer Science, Technical Report, 2008: 45-50.

Google Scholar

[3] L. H. Cox. Suppression methodology and statistical disclosure control. Journal of the American Statistical Association, 2004: 377-385.

Google Scholar

[4] B. Fung, K. Wang, R. Chen et al. Privacy-preserving data publishing: a survey of recent developments. ACM Computing Surveys (CSUR). 2010: 234-240.

DOI: 10.1145/1749603.1749605

Google Scholar

[5] A. Meyerson, and R. Williams. On the complexity of optimal k-anonymity. In: Proceedings of the 23th ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, 2004: 223-228.

DOI: 10.1145/1055558.1055591

Google Scholar