The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.
DOI: 10.1109/seccmw.2005.1588299
|View full text |Cite
|
Sign up to set email alerts
|

Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization

Abstract: Logs are one of the most fundamental resources to any security professional. It is widely recognized by the government and industry that it is both beneficial and desirable to share logs for the purpose of security research. However, the sharing is not happening or not to the degree or magnitude that is desired. Organizations are reluctant to share logs because of the risk of exposing sensitive information to potential attackers. We believe this reluctance remains high because current anonymization techniques … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
34
0
1

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(35 citation statements)
references
References 13 publications
0
34
0
1
Order By: Relevance
“…The authors in [27] propose a system that analyzes the level of entropy in the dis- Lately, the importance of audit trails in security analysis has motivated researchers to propose various methods of log anonymization and security analysis [72,73,74,75,76,77]. This is in contrast to our solution which preserves anonymity.…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…The authors in [27] propose a system that analyzes the level of entropy in the dis- Lately, the importance of audit trails in security analysis has motivated researchers to propose various methods of log anonymization and security analysis [72,73,74,75,76,77]. This is in contrast to our solution which preserves anonymity.…”
Section: Related Workmentioning
confidence: 97%
“…Moreover, the work in [75] introduces practical tools that can be used toward the pseudonymization of log files 665 in Unix systems. The authors in [77] conduct a survey of current research attempts on sharing log files and log anonymization tools. They elaborate on the problem and present a detailed road-map to cope with the issues germane to large-scale log sharing.…”
Section: Related Workmentioning
confidence: 99%
“…Motivations for sharing data for security purposes are summarized in [23]. While there is a consensus for the exchange of logs as the data sharing medium, there are on the order of 20 commonly implemented network system logs so selecting which logs to share is an important question citesiam03,ictsm03.…”
Section: Related Workmentioning
confidence: 99%
“…At the USENIX Security Symposium in 2004, SRI researchers proposed a repository to which sensors would send anonymized alerts which are then analyzed and publicly announced [14]. While there are potential problems with their proposed encryption schemes noted in [23], more importantly the level of coordination across the Internet for this type of scheme is likely impractical as well as any public repository being an open target for attackers to evade, subvert, or disable. At the USENIX Security Symposium in 2005, two papers were presented on attacker detection and subversion of public repositories of alert information.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation