Anonymization of Network Traces Data through Condensation-based Differential Privacy

被引:4
|
作者
Aleroud A. [1 ,3 ]
Yang F. [2 ]
Pallaprolu S.C. [2 ]
Chen Z. [2 ]
Karabatis G. [2 ]
机构
[1] School of Computer and Cyber Sciences, Augusta University, 2500 Walton Way, Augusta, 30904, GA
[2] Department of Information Systems, University of Maryland, Baltimore, 21250, MD
[3] Augusta University, GA
来源
关键词
Data Injection attacks; differential privacy; information security; intrusion detection; netflow; semantic link network; trace anonymization;
D O I
10.1145/3425401
中图分类号
学科分类号
摘要
Network traces are considered a primary source of information to researchers, who use them to investigate research problems such as identifying user behavior, analyzing network hierarchy, maintaining network security, classifying packet flows, and much more. However, most organizations are reluctant to share their data with a third party or the public due to privacy concerns. Therefore, data anonymization prior to sharing becomes a convenient solution to both organizations and researchers. Although several anonymization algorithms are available, few of them allow sufficient privacy (organization need), acceptable data utility (researcher need), and efficient data analysis at the same time. This article introduces a condensation-based differential privacy anonymization approach that achieves an improved tradeoff between privacy and utility compared to existing techniques and produces anonymized network trace data that can be shared publicly without lowering its utility value. Our solution also does not incur extra computation overhead for the data analyzer. A prototype system has been implemented, and experiments have shown that the proposed approach preserves privacy and allows data analysis without revealing the original data even when injection attacks are launched against it. When anonymized datasets are given as input to graph-based intrusion detection techniques, they yield almost identical intrusion detection rates as the original datasets with only a negligible impact. © 2021 Association for Computing Machinery.
引用
收藏
相关论文
共 50 条
  • [41] Correlated network data publication via differential privacy
    Rui Chen
    Benjamin C. M. Fung
    Philip S. Yu
    Bipin C. Desai
    The VLDB Journal, 2014, 23 : 653 - 676
  • [42] Parallel privacy preservation through partitioning (P4): a scalable data anonymization algorithm for health data
    Halilovic, Mehmed
    Meurers, Thierry
    Otte, Karen
    Prasser, Fabian
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2025, 25 (01)
  • [43] Differential Privacy for Evolving Network Based on GHRG
    Yang, Jing
    Wang, Yuye
    Zhang, Jianpei
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020 (2020)
  • [44] Trajectory data privacy protection based on differential privacy mechanism
    Gu, Ke
    Yang, Lihao
    Liu, Yongzhi
    Liao, Niandong
    2017 2ND INTERNATIONAL CONFERENCE ON RELIABILITY ENGINEERING (ICRE 2017), 2018, 351
  • [45] Privacy Preserving Parallel Clustering Based Anonymization for Big Data Using MapReduce Framework
    Lawrance, Josephine Usha
    Jesudhasan, Jesu Vedha Nayahi
    APPLIED ARTIFICIAL INTELLIGENCE, 2021, 35 (15) : 1587 - 1620
  • [46] Attribute susceptibility and entropy based data anonymization to improve users community privacy and utility in publishing data
    Majeed, Abdul
    Lee, Sungchang
    APPLIED INTELLIGENCE, 2020, 50 (08) : 2555 - 2574
  • [47] A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud
    Zhang, Xuyun
    Yang, Chi
    Nepal, Surya
    Liu, Chang
    Dou, Wanchun
    Chen, Jinjun
    2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING (CGC 2013), 2013, : 105 - 112
  • [48] Attribute susceptibility and entropy based data anonymization to improve users community privacy and utility in publishing data
    Abdul Majeed
    Sungchang Lee
    Applied Intelligence, 2020, 50 : 2555 - 2574
  • [49] Sensitive Attribute based Non-Homogeneous Anonymization for Privacy Preserving Data Mining
    Usha, P.
    Shriram, R.
    Sathishkumar, S.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [50] Research on data privacy protection technology of social network users based on differential disturbance
    Cheng, Shanying
    AIN SHAMS ENGINEERING JOURNAL, 2022, 13 (05)