Preserving organizational privacy in intrusion detection log sharing

Hayretdin Bahşi, Albert Levi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

This paper presents a privacy-preserving framework for organizations that need to share their logs of intrusion detection systems with a centralized intrusion log management center. This centralized center may be an outsourced company that provides an intrusion detection management service to organizations or a system of the National Computer Emergency Response Team that probes the attacks targeting organizations that have critical information systems. For reasons of ensuring privacy, we adopt the notion of l-Diversity in the course of collecting intrusion logs from organizations. Within our framework, an organization ensures the people in the center cannot discern the exact origin of any intrusion log among the other l-1 organizations. Also, it is not possible to precisely identify the classification type of an intrusion log from among other l-1 types. Within this framework, the intrusion log management center can analyze the anonymous data, since the proposed privacy preserving solution creates little information loss. If required, it sends an alarm to the appropriate organization within a reasonable time. The center has the option of publishing useful information security statistics about specific organizations or about the whole ecosystem by using the privacy preserved intrusion logs.

Original languageEnglish (US)
Title of host publication2011 3rd International Conference on Cyber Conflict, ICCC 2011 - Proceedings
StatePublished - 2011
Externally publishedYes
Event2011 3rd International Conference on Cyber Conflict, ICCC 2011 - Tallinn, Estonia
Duration: Jun 7 2011Jun 10 2011

Publication series

Name2011 3rd International Conference on Cyber Conflict, ICCC 2011 - Proceedings

Conference

Conference2011 3rd International Conference on Cyber Conflict, ICCC 2011
Country/TerritoryEstonia
CityTallinn
Period6/7/116/10/11

Keywords

  • intrusion detection
  • log sharing
  • privacy preserving framework

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Preserving organizational privacy in intrusion detection log sharing'. Together they form a unique fingerprint.

Cite this