Privacy issues in intrusion detection systems: A taxonomy, survey and future directions
Tài liệu tham khảo
Westin, 1968, Privacy and freedom, Washington Lee Law Rev., 25, 166
Health Information Privacy, http://www.hhs.gov/hipaa/ (last access: 06.09.17).
Protection of Personal Data, http://ec.europa.eu/justice/data-protection/ (last access: 06.09.17).
Justice Laws Website, http://laws-lois.justice.gc.ca/eng/acts/p-8.6/ (last access: 06.09.17).
Sobirey, 1997
Büschkes, 1999, Privacy enhanced intrusion detection, 187
Lundin, 2000, Anomaly-based intrusion detection: privacy concerns and other problems, Comput. Netw., 34, 623, 10.1016/S1389-1286(00)00134-1
Biskup, 2000, Transaction-based pseudonyms in audit data for privacy respecting intrusion detection, 28
Patrick Lincoln, PhillipA. Porras, Vitaly Shmatikov, Privacy-preserving sharing and correlation of security alerts, in: USENIX Security Symposium, 2004, pp. 239–254.
Locasto, 2005, Towards collaborative security and p2p intrusion detection, 333
Xu, 2005, Privacy-preserving alert correlation: a concept hierarchy based approach, 10
Lee, 2006, A privacy-preserving interdomain audit framework, 99
Parekh, 2006, Privacy-preserving payload-based correlation for accurate malicious traffic detection, 99
Flegel, 2007
Park, 2007, PPIDS: privacy preserving intrusion detection system, 269
Zhang, 2006, Outsourcing security analysis with anonymized logs, 1
Janak J. Parekh, Privacy-preserving distributed event corroboration. Ph.D. thesis, Columbia University, 2007.
Bianchi, 2007, Towards privacy-preserving network monitoring: Issues and challenges, 1
Haakon Andreas Ringberg, Jennifer Rexford, Privacy-preserving collaborative anomaly detection. Ph.D. thesis, Princeton University, 2009.
Trousset, 2009, SAX: a privacy preserving general purpose method applied to detection of intrusions, 17
Ulltveit-Moe, 2009, Two tiered privacy enhanced intrusion detection system architecture
Vasilomanolakis, 2015, SkipMon: A locality-aware collaborative intrusion detection system, 1
Kerschbaum, 2010, Privacy-preserving pattern matching for anomaly detection in RFID anti-counterfeiting, 124
Hyang-Ah Kim, Privacy-preserving distributed, automated signature-based detection of new Internet worms. Ph.D. thesis, Carnegie Mellon University, 2010.
Burkhart, 2010, SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics, Network, 1, 101101
Bahsi, 2011, Preserving organizational privacy in intrusion detection log sharing, 1
Burkhart, 2011, Privacy-preserving distributed network troubleshootingbridging the gap between theory and practice, ACM Trans. Inf. Syst. Secur. (TISSEC), 14, 31, 10.1145/2043628.2043632
Niksefat, 2013, Zids: A privacy-preserving intrusion detection system using secure two-party computation protocols, Comput. J., 1
Do, 2015, Privacy-preserving approach for sharing and processing intrusion alert data, 1
Michael Thomas, 2015, Using classified intelligence to defend unclassified networks, 2298
Zhou, 2010, A survey of coordinated attacks and collaborative intrusion detection, Comput. Secur., 29, 124, 10.1016/j.cose.2009.06.008
Vasilomanolakis, 2015, Taxonomy and survey of collaborative intrusion detection, ACM Comput. Surv. (CSUR), 47, 55, 10.1145/2716260
Rainer Bye, Seyit Ahmet Camtepe, Sahin Albayrak, Collaborative intrusion detection framework: Characteristics, adversarial opportunities and countermeasures, in: International Conference on Collaborative Methods for Security and Privacy, CollSec, 2010.
Matyas, 2013, Conflicts between intrusion detection and privacy mechanisms for wireless sensor networks, IEEE Secur. Privacy, 5, 73, 10.1109/MSP.2013.111
Dhage, 2012, Intrusion detection system in cloud computing environment, Int. J. Cloud Comput., 1, 261, 10.1504/IJCC.2012.046711
Roesch, 1999, Snort: Lightweight intrusion detection for networks, LISA, 99, 229
Debra Anderson, Teresa F. Lunt, Harold Javitz, Ann Tamaru, Alfonso Valdes, et al. Detecting unusual program behavior using the statistical component of the Next-generation Intrusion Detection Expert System (NIDES), SRI International, Computer Science Laboratory, 1995.
Kaghazgaran, 2011, Masquerade detection using GUI events in windows systems, Int. J. Inf. Commun. Technol. (IJICT)
Tippingpoint, Zero day initiative. 2016. http://www.zerodayinitiative.com/ (Last Access: 06.09.17).
Kerschbaum, 2007, Distance-preserving pseudonymization for timestamps and spatial data, 68
Wagner, 2003, Cryptanalysis of an algebraic privacy homomorphism, 234
Rivest, 1978, On data banks and privacy homomorphisms, Found. Secure Comput., 4, 169
Craig Gentry, et al. Fully homomorphic encryption using ideal lattices, in: STOC, Vol. 9, 2009, pp. 169–178.
Kaghazgaran, 2011, Secure two party comparison over encrypted data, 1123
Goldreich, 2004
Wikipedia. Differential privacy — Wikipedia, the free encyclopedia, 2017. https://en.wikipedia.org/w/index.php?title=Differential_privacy&oldid=773421488 [Online; accessed 28.05.17].
Reed, 2010, Differential privacy for collaborative security, 1
Aggarwal, 2008, A general survey of privacy-preserving data mining models and algorithms, 11
Axelsson, 2000, The base-rate fallacy and the difficulty of intrusion detection, ACM Trans. Inf. Syst. Secur. (TISSEC), 3, 186, 10.1145/357830.357849