Anonymization of Network Traces Data through Condensation-based Differential Privacy

被引:4
|
作者
Aleroud A. [1 ,3 ]
Yang F. [2 ]
Pallaprolu S.C. [2 ]
Chen Z. [2 ]
Karabatis G. [2 ]
机构
[1] School of Computer and Cyber Sciences, Augusta University, 2500 Walton Way, Augusta, 30904, GA
[2] Department of Information Systems, University of Maryland, Baltimore, 21250, MD
[3] Augusta University, GA
来源
关键词
Data Injection attacks; differential privacy; information security; intrusion detection; netflow; semantic link network; trace anonymization;
D O I
10.1145/3425401
中图分类号
学科分类号
摘要
Network traces are considered a primary source of information to researchers, who use them to investigate research problems such as identifying user behavior, analyzing network hierarchy, maintaining network security, classifying packet flows, and much more. However, most organizations are reluctant to share their data with a third party or the public due to privacy concerns. Therefore, data anonymization prior to sharing becomes a convenient solution to both organizations and researchers. Although several anonymization algorithms are available, few of them allow sufficient privacy (organization need), acceptable data utility (researcher need), and efficient data analysis at the same time. This article introduces a condensation-based differential privacy anonymization approach that achieves an improved tradeoff between privacy and utility compared to existing techniques and produces anonymized network trace data that can be shared publicly without lowering its utility value. Our solution also does not incur extra computation overhead for the data analyzer. A prototype system has been implemented, and experiments have shown that the proposed approach preserves privacy and allows data analysis without revealing the original data even when injection attacks are launched against it. When anonymized datasets are given as input to graph-based intrusion detection techniques, they yield almost identical intrusion detection rates as the original datasets with only a negligible impact. © 2021 Association for Computing Machinery.
引用
收藏
相关论文
共 50 条
  • [21] A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network Traces
    Dandyan, Shaveta
    Louafi, Habib
    Sadaoui, Samira
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [22] Rule-based XML Mediation for Data Validation and Privacy Anonymization
    Teraguchi, Masayoshi
    Yoshida, Issei
    Uramoto, Naohiko
    2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 2008, : 21 - 28
  • [23] Structure based data de-anonymization of social networks and mobility traces
    Ji, Shouling
    Li, Weiqing
    Srivatsa, Mudhakar
    He, Jing Selena
    Beyah, Raheem
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8783 : 237 - 254
  • [24] Dynamic differential privacy-based dataset condensation
    Wu, Zhaoxuan
    Gao, Xiaojing
    Qian, Yongfeng
    Hao, Yixue
    Chen, Min
    NEUROCOMPUTING, 2024, 608
  • [25] Anonymization-Based Attacks in Privacy-Preserving Data Publishing
    Wong, Raymond Chi-Wing
    Fu, Ada Wai-Chee
    Wang, Ke
    Pei, Jian
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2009, 34 (02):
  • [26] Adaptive Data Anonymization against Information Fusion based Privacy Attacks on Enterprise Data
    Ganta, Srivatsava Ranjit
    Acharya, Raj
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 1075 - 1076
  • [27] Machine Learning Privacy Aware Anonymization Using MapReduce Based Neural Network
    Selvi, U.
    Pushpa, S.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (02): : 1185 - 1196
  • [28] Voice Privacy Through x-vector and CycleGAN-based Anonymization
    Prajapati, Gauri P.
    Singh, Dipesh K.
    Amin, Preet P.
    Patil, Hemant A.
    INTERSPEECH 2021, 2021, : 1684 - 1688
  • [29] Clustering based privacy preserving of big data using fuzzification and anonymization operation
    Khan S.
    Iqbal K.
    Faizullah S.
    Fahad M.
    Ali J.
    Ahmed W.
    International Journal of Advanced Computer Science and Applications, 2019, 10 (12): : 282 - 289
  • [30] Privacy preservation in outsourced mobility traces through compact data structures
    Calderoni, Luca
    Bandini, Samantha
    Maio, Dario
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55