2006 Securecomm and Workshops 2006
DOI: 10.1109/seccomw.2006.359577
|View full text |Cite
|
Sign up to set email alerts
|

Outsourcing Security Analysis with Anonymized Logs

Abstract: Abstract-As security monitoring grows both more complicated and more sophisticated, there is an increased demand for outsourcing these tasks to Managed Security Service Providers (MSSPs). However, the core problem of sharing private security logs creates a barrier to the widespread adoption of this business model. In this paper we analyze the logs used for security analysis with the concern of privacy and propose the constraints on anonymization of security monitor logs. We believe if the anonymization solutio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 12 publications
(17 reference statements)
0
11
0
Order By: Relevance
“…Hence, a malicious system may inject faulty data into the communication to affect the operation of a competitor. To prevent this, operators may use anonymized auditing that provides mechanisms to verify the integrity of data without accessing the actual data [53]. Additionally, a non-profit or a government agency may perform random inspections to assure lawful operation.…”
Section: Privacy Assurancementioning
confidence: 99%
“…Hence, a malicious system may inject faulty data into the communication to affect the operation of a competitor. To prevent this, operators may use anonymized auditing that provides mechanisms to verify the integrity of data without accessing the actual data [53]. Additionally, a non-profit or a government agency may perform random inspections to assure lawful operation.…”
Section: Privacy Assurancementioning
confidence: 99%
“…Hence, a malicious system may inject faulty data into the communication to affect the operation of a competitor. Accuracy of transmitted messages will be verified using data integrity evaluations with anonymized auditing similar to [4], [74], [78]. Anonymized auditing will provide mechanisms to verify the integrity of data without accessing the actual data.…”
Section: A Privacymentioning
confidence: 99%
“…[9,17,18]. In [9] light-weight practical data sanitization techniques geared towards detection capabilities are presented in an overall framework.…”
Section: Related Workmentioning
confidence: 99%
“…In [17] this suppression is structured in a concept hierarchy, such that it can be controlled better. An actual tool that allows multiple levels of pseudonymization is described in [18].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation