Anonymization of Network Traces Data through Condensation-based Differential Privacy

被引:4
|
作者
Aleroud A. [1 ,3 ]
Yang F. [2 ]
Pallaprolu S.C. [2 ]
Chen Z. [2 ]
Karabatis G. [2 ]
机构
[1] School of Computer and Cyber Sciences, Augusta University, 2500 Walton Way, Augusta, 30904, GA
[2] Department of Information Systems, University of Maryland, Baltimore, 21250, MD
[3] Augusta University, GA
来源
关键词
Data Injection attacks; differential privacy; information security; intrusion detection; netflow; semantic link network; trace anonymization;
D O I
10.1145/3425401
中图分类号
学科分类号
摘要
Network traces are considered a primary source of information to researchers, who use them to investigate research problems such as identifying user behavior, analyzing network hierarchy, maintaining network security, classifying packet flows, and much more. However, most organizations are reluctant to share their data with a third party or the public due to privacy concerns. Therefore, data anonymization prior to sharing becomes a convenient solution to both organizations and researchers. Although several anonymization algorithms are available, few of them allow sufficient privacy (organization need), acceptable data utility (researcher need), and efficient data analysis at the same time. This article introduces a condensation-based differential privacy anonymization approach that achieves an improved tradeoff between privacy and utility compared to existing techniques and produces anonymized network trace data that can be shared publicly without lowering its utility value. Our solution also does not incur extra computation overhead for the data analyzer. A prototype system has been implemented, and experiments have shown that the proposed approach preserves privacy and allows data analysis without revealing the original data even when injection attacks are launched against it. When anonymized datasets are given as input to graph-based intrusion detection techniques, they yield almost identical intrusion detection rates as the original datasets with only a negligible impact. © 2021 Association for Computing Machinery.
引用
收藏
相关论文
共 50 条
  • [31] Clustering based Privacy Preserving of Big Data using Fuzzification and Anonymization Operation
    Khan, Saira
    Iqba, Khalid
    Faizullah, Safi
    Fahad, Muhammad
    Ali, Jawad
    Ahmed, Waqas
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 282 - 289
  • [32] Stipulation-Based Anonymization with Sensitivity Flags for Privacy Preserving Data Publishing
    Ashoka, K.
    Poornima, B.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 445 - 454
  • [33] Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
    Hore, Bijit
    Jammalamadaka, Ravi Chandra
    Mehrotra, Sharad
    PROCEEDINGS OF THE SEVENTH SIAM INTERNATIONAL CONFERENCE ON DATA MINING, 2007, : 497 - 502
  • [34] Optimizing data privacy: an RFD-based approach to anonymization strategy selection
    Sadeghi-Nasab, Alireza
    Rahmani, Mohsen
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (01):
  • [35] Big Data Privacy Based On Differential Privacy a Hope for Big Data
    Shrivastva, Krishna Mohan Pd
    Rizvi, M. A.
    Singh, Shailendra
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 776 - 781
  • [36] Desensitized Financial Data Generation Based on Generative Adversarial Network and Differential Privacy
    Zhang, Fan
    Wang, Luyao
    Zhang, Xinhong
    BIG DATA MINING AND ANALYTICS, 2025, 8 (01): : 103 - 117
  • [37] An anonymization-based privacy-preserving data collection protocol for digital health data
    Andrew, J.
    Eunice, R. Jennifer
    Karthikeyan, J.
    FRONTIERS IN PUBLIC HEALTH, 2023, 11
  • [38] Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations
    Asif, Waciar
    Ray, Indranil Ghosh
    Tahir, Shahzaib
    Rajarajan, Muttukrishnan
    2018 19TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2018, : 329 - 334
  • [39] Class-based graph anonymization for social network data
    Bhagat, Smriti
    Cormode, Graham
    Krishnamurthy, Balachander
    Srivastava, Divesh
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2009, 2 (01):
  • [40] Correlated network data publication via differential privacy
    Chen, Rui
    Fung, Benjamin C. M.
    Yu, Philip S.
    Desai, Bipin C.
    VLDB JOURNAL, 2014, 23 (04): : 653 - 676