首页> 外文会议>ACM symposium on Applied Computing >A taxonomy and adversarial model for attacks against network log anonymization
【24h】

A taxonomy and adversarial model for attacks against network log anonymization

机译:对网络日志匿名攻击攻击的分类和对抗模型

获取原文

摘要

In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to enable more collaboration. Unfortunately, many new attacks have been created, in parallel, that try to exploit weaknesses in the anonymization process. In this paper, we present a taxonomy that relates similar kinds of attacks in a meaningful way. We also present a new adversarial model which we can map into the taxonomy by the types of attacks that can be perpetrated by a particular adversary. This has helped us to negotiate the trade-offs between data utility and trust, by giving us a way to specify the strength of an anonymization scheme as a measure of the types of adversaries it protects against.
机译:近年来,研究人员,安全事件响应者和教育工作者才能共享网络日志,并且已经提出了许多日志匿名化工具和技术来消除这种敏感的数据源,以便能够更好地协作。不幸的是,并行创建了许多新的攻击,该攻击试图利用匿名化进程中的缺点。在本文中,我们提出了一种分类,以有意义的方式涉及类似种类的攻击。我们还提出了一种新的对抗模型,我们可以通过特定对手犯下的攻击类型来映射到分类学。这有助于我们通过向我们提供一种方法来指定匿名化方案的力量,以指定匿名方案的衡量反对的衡量标准的衡量标准。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号