Anonymization of Network Traces Data through Condensation-based Differential Privacy

被引:4
|
作者
Aleroud A. [1 ,3 ]
Yang F. [2 ]
Pallaprolu S.C. [2 ]
Chen Z. [2 ]
Karabatis G. [2 ]
机构
[1] School of Computer and Cyber Sciences, Augusta University, 2500 Walton Way, Augusta, 30904, GA
[2] Department of Information Systems, University of Maryland, Baltimore, 21250, MD
[3] Augusta University, GA
来源
Digital Threats: Research and Practice | 2021年 / 2卷 / 04期
关键词
Data Injection attacks; differential privacy; information security; intrusion detection; netflow; semantic link network; trace anonymization;
D O I
10.1145/3425401
中图分类号
学科分类号
摘要
Network traces are considered a primary source of information to researchers, who use them to investigate research problems such as identifying user behavior, analyzing network hierarchy, maintaining network security, classifying packet flows, and much more. However, most organizations are reluctant to share their data with a third party or the public due to privacy concerns. Therefore, data anonymization prior to sharing becomes a convenient solution to both organizations and researchers. Although several anonymization algorithms are available, few of them allow sufficient privacy (organization need), acceptable data utility (researcher need), and efficient data analysis at the same time. This article introduces a condensation-based differential privacy anonymization approach that achieves an improved tradeoff between privacy and utility compared to existing techniques and produces anonymized network trace data that can be shared publicly without lowering its utility value. Our solution also does not incur extra computation overhead for the data analyzer. A prototype system has been implemented, and experiments have shown that the proposed approach preserves privacy and allows data analysis without revealing the original data even when injection attacks are launched against it. When anonymized datasets are given as input to graph-based intrusion detection techniques, they yield almost identical intrusion detection rates as the original datasets with only a negligible impact. © 2021 Association for Computing Machinery.
引用
收藏
相关论文
共 50 条
  • [21] Improved Bayesian network differential privacy data-releasing method based on junction tree
    Ma, Xuebin
    Qi, Xuejian
    Meng, Yulei
    Yang, Tao
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 759 - 764
  • [22] Differential Privacy Based on Data Provenance Publishing Method
    Ni W.-W.
    Shen T.
    Yan D.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (03): : 573 - 586
  • [23] An Improved Approach of Data Integration Based on Differential Privacy
    Yu, Qihong
    Rao, Ruonan
    PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), 2014, : 395 - 399
  • [24] A secure data deduplication scheme based on differential privacy
    Ren, Jun
    Yao, Zhiqiang
    Xiong, Jinbo
    Zhang, Yuanyuan
    Ye, Ayong
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 1241 - 1246
  • [25] Dynamic Data Histogram Publishing Based On Differential Privacy
    Gao, Ruichao
    Ma, Xuebin
    2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 737 - 743
  • [26] Spatial Statistic Data Release Based on Differential Privacy
    Cai, Sujin
    Lyu, Xin
    Ban, Duohan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (10) : 5244 - 5259
  • [27] A Survey on Privacy Enhanced Role Based Data Aggregation via Differential Privacy
    Shaikh, Azharuddin
    Patil, Shruti
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 285 - 290
  • [28] Data Incremental Clustering Algorithm based on Differential Privacy
    Gao, Qing
    Wang, Xiujun
    Gao, Yan
    Tao, Tao
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [29] Differential Privacy Data Protection Method Based on Clustering
    Li Li-xin
    Ding Yong-shan
    Wang Jia-yan
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 11 - 16
  • [30] A privacy-preserving trajectory data synthesis framework based on differential privacy
    Ma, Tinghuai
    Deng, Qian
    Rong, Huan
    Al-Nabhan, Najla
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77