Anonymization of Network Traces Data through Condensation-based Differential Privacy

被引:4
|
作者
Aleroud A. [1 ,3 ]
Yang F. [2 ]
Pallaprolu S.C. [2 ]
Chen Z. [2 ]
Karabatis G. [2 ]
机构
[1] School of Computer and Cyber Sciences, Augusta University, 2500 Walton Way, Augusta, 30904, GA
[2] Department of Information Systems, University of Maryland, Baltimore, 21250, MD
[3] Augusta University, GA
来源
Digital Threats: Research and Practice | 2021年 / 2卷 / 04期
关键词
Data Injection attacks; differential privacy; information security; intrusion detection; netflow; semantic link network; trace anonymization;
D O I
10.1145/3425401
中图分类号
学科分类号
摘要
Network traces are considered a primary source of information to researchers, who use them to investigate research problems such as identifying user behavior, analyzing network hierarchy, maintaining network security, classifying packet flows, and much more. However, most organizations are reluctant to share their data with a third party or the public due to privacy concerns. Therefore, data anonymization prior to sharing becomes a convenient solution to both organizations and researchers. Although several anonymization algorithms are available, few of them allow sufficient privacy (organization need), acceptable data utility (researcher need), and efficient data analysis at the same time. This article introduces a condensation-based differential privacy anonymization approach that achieves an improved tradeoff between privacy and utility compared to existing techniques and produces anonymized network trace data that can be shared publicly without lowering its utility value. Our solution also does not incur extra computation overhead for the data analyzer. A prototype system has been implemented, and experiments have shown that the proposed approach preserves privacy and allows data analysis without revealing the original data even when injection attacks are launched against it. When anonymized datasets are given as input to graph-based intrusion detection techniques, they yield almost identical intrusion detection rates as the original datasets with only a negligible impact. © 2021 Association for Computing Machinery.
引用
收藏
相关论文
共 50 条
  • [1] Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique
    Aleroud, Ahmed
    Chen, Zhiyuan
    Karabatis, George
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2016 CONFERENCES, 2016, 10033 : 934 - 942
  • [2] A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
    Fouad, Mohamed R.
    Elbassioni, Khaled
    Bertino, Elisa
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (07) : 1591 - 1601
  • [3] Parking recommender system privacy preservation through anonymization and differential privacy
    Saleem, Yasir
    Rehmani, Mubashir Husain
    Crespi, Noel
    Minerva, Roberto
    ENGINEERING REPORTS, 2021, 3 (02)
  • [4] (k, ε, δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
    Tsou, Yao-Tung
    Alraja, Mansour Naser
    Chen, Li-Sheng
    Chang, Yu-Hsiang
    Hu, Yung-Li
    Huang, Yennun
    Yu, Chia-Mu
    Tsai, Pei-Yuan
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (03) : 175 - 185
  • [5] Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy
    Ma, Caixia
    Jia, Chunfu
    Du, Ruizhong
    Ha, Guanxiong
    Li, Mingyue
    2024 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2024, 2024, : 371 - 382
  • [6] On Sketch Based Anonymization That Satisfies Differential Privacy Model
    Lee, Jennifer
    ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2010, 6085 : 397 - 400
  • [7] Differential privacy preserving data publishing based on Bayesian network
    Qi, Xuejian
    Ma, Xuebin
    Bai, Xiangyu
    Li, Wuyungerile
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1718 - 1726
  • [8] Dynamic differential privacy-based dataset condensation
    Wu, Zhaoxuan
    Gao, Xiaojing
    Qian, Yongfeng
    Hao, Yixue
    Chen, Min
    NEUROCOMPUTING, 2024, 608
  • [9] Big Data Privacy Based On Differential Privacy a Hope for Big Data
    Shrivastva, Krishna Mohan Pd
    Rizvi, M. A.
    Singh, Shailendra
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 776 - 781
  • [10] Desensitized Financial Data Generation Based on Generative Adversarial Network and Differential Privacy
    Zhang, Fan
    Wang, Luyao
    Zhang, Xinhong
    BIG DATA MINING AND ANALYTICS, 2025, 8 (01): : 103 - 117