...
首页> 外文期刊>ACM transactions on privacy and security >A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization
【24h】

A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization

机译:一种维护网络跟踪隐私和实用程序的多视图方法匿名

获取原文
获取原文并翻译 | 示例
           

摘要

As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive information, e.g., network and system configuration, which may potentially be exploited for attacks. In cases where data owners are convinced to share their network traces, the data are typically subjected to certain anonymization techniques, e.g., CryptoPAn, which replaces real IP addresses with prefix-preserving pseudonyms. However, most such techniques either are vulnerable to adversaries with prior knowledge about some network flows in the traces or require heavy data sanitization or perturbation, which may result in a significant loss of data utility. In this article, we aim to preserve both privacy and utility through shifting the trade-off from between privacy and utility to between privacy and computational cost. The key idea is for the analysts to generate and analyze multiple anonymized views of the original network traces: Those views are designed to be sufficiently indistinguishable even to adversaries armed with prior knowledge, which preserves the privacy, whereas one of the views will yield true analysis results privately retrieved by the data owner, which preserves the utility. We formally analyze the privacy of our solution and experimentally evaluate it using real network traces provided by a major ISP. The experimental results show that our approach can significantly reduce the level of information leakage (e.g., less than 1% of the information leaked by CryptoPAn) with comparable utility.
机译:随着网络安全监测的增长更复杂,越来越需要将这些任务外包给第三方分析师。然而,由于隐私问题,组织通常不愿意分享他们的网络迹线,因为敏感信息,例如网络和系统配置,可能可能被利用攻击。如果数据所有者相信共享其网络迹线,则数据通常经过某些匿名化技术,例如加密,其替换具有前缀保存的假名的真实IP地址。然而,大多数这样的技术要么容易受到关于迹线中的一些网络流的先验知识的对手,或者需要大量数据消毒或扰动,这可能导致数据实用性的显着损失。在本文中,我们的目标是通过在隐私和公用事业之间转移折衷以之间的权衡来保护隐私和实用性。关键的思想是分析师生成和分析原始网络迹线的多个匿名视图:这些视图甚至可以充分地无法区分,甚至对武装前瞻性知识的对手来说,保留了隐私,而其中一个观点将产生真正的分析数据所有者私下检索的结果保留该实用程序。我们正式分析我们解决方案的隐私,并通过主要ISP提供的真实网络迹线进行实验评估它。实验结果表明,我们的方法可以显着降低信息泄漏的水平(例如,少于Cryptopan泄露的信息的1%)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号