Anonymization of Network Traces Data through Condensation-based Differential Privacy

被引:4
|
作者
Aleroud A. [1 ,3 ]
Yang F. [2 ]
Pallaprolu S.C. [2 ]
Chen Z. [2 ]
Karabatis G. [2 ]
机构
[1] School of Computer and Cyber Sciences, Augusta University, 2500 Walton Way, Augusta, 30904, GA
[2] Department of Information Systems, University of Maryland, Baltimore, 21250, MD
[3] Augusta University, GA
来源
Digital Threats: Research and Practice | 2021年 / 2卷 / 04期
关键词
Data Injection attacks; differential privacy; information security; intrusion detection; netflow; semantic link network; trace anonymization;
D O I
10.1145/3425401
中图分类号
学科分类号
摘要
Network traces are considered a primary source of information to researchers, who use them to investigate research problems such as identifying user behavior, analyzing network hierarchy, maintaining network security, classifying packet flows, and much more. However, most organizations are reluctant to share their data with a third party or the public due to privacy concerns. Therefore, data anonymization prior to sharing becomes a convenient solution to both organizations and researchers. Although several anonymization algorithms are available, few of them allow sufficient privacy (organization need), acceptable data utility (researcher need), and efficient data analysis at the same time. This article introduces a condensation-based differential privacy anonymization approach that achieves an improved tradeoff between privacy and utility compared to existing techniques and produces anonymized network trace data that can be shared publicly without lowering its utility value. Our solution also does not incur extra computation overhead for the data analyzer. A prototype system has been implemented, and experiments have shown that the proposed approach preserves privacy and allows data analysis without revealing the original data even when injection attacks are launched against it. When anonymized datasets are given as input to graph-based intrusion detection techniques, they yield almost identical intrusion detection rates as the original datasets with only a negligible impact. © 2021 Association for Computing Machinery.
引用
收藏
相关论文
共 50 条
  • [41] A Frequent Itemsets Data Mining Algorithm Based on Differential Privacy
    Li, Qingpeng
    Zhang, Longjun
    Li, Haoyu
    Sun, Wenjun
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 251 - 253
  • [42] Differential Privacy Data Publishing Method Based on Cell Merging
    Li, Qi
    Li, Yuqiang
    Zeng, Guicai
    Liu, Aihua
    PROCEEDINGS OF THE 2017 IEEE 14TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC 2017), 2017, : 778 - 782
  • [43] A Data Leakage Traceability Scheme Based on Differential Privacy and Fingerprint
    Wang, Mingyong
    Zheng, Shuli
    2024 3RD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND MEDIA COMPUTING, ICIPMC 2024, 2024, : 327 - 334
  • [44] Data desensitization mechanism of Android application based on differential privacy
    Jiang, Xinzao
    Song, Yubo
    Song, Rui
    Hu, Aiqun
    2021 IEEE 94TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-FALL), 2021,
  • [45] NetDP: In-Network Differential Privacy for Large-Scale Data Processing
    Zhou, Zhengyan
    Chen, Hanze
    Chen, Lingfei
    Zhang, Dong
    Wu, Chunming
    Liu, Xuan
    Khan, Muhammad Khurram
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2024, 8 (03): : 1076 - 1089
  • [46] Design of a privacy-preserving algorithm for peer-to-peer network based on differential privacy
    Yu J.
    Ingenierie des Systemes d'Information, 2019, 24 (04): : 433 - 437
  • [47] Encrypted Data Aggregation in Mobile CrowdSensing based on Differential Privacy
    Girolami, Michele
    Urselli, Emanuele
    Chessa, Stefano
    2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [48] Differential Privacy-Based skyline Query in Road Network Environment
    Li, Song
    Wang, He
    Zhang, Liping
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2024, 52 (06): : 120 - 127
  • [49] Adaptive graph neural network protection algorithm based on differential privacy
    Yu, Junjie
    Li, Yong
    Liu, Zhandong
    Yang, Qianren
    JOURNAL OF SYSTEMS AND SOFTWARE, 2025, 225
  • [50] Differential privacy-based trajectory community recommendation in social network
    Wei, Jianhao
    Lin, Yaping
    Yao, Xin
    Sandor, Voundi Koe Arthur
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 133 : 136 - 148