Privacy issues in intrusion detection systems: A taxonomy, survey and future directions

Computer Science Review - Tập 25 - Trang 69-78 - 2017
Salman Niksefat1, Parisa Kaghazgaran2, Babak Sadeghiyan1
1APA Research Center, Amirkabir University of Technology, Tehran, Iran
2Texas A & M University, TX, USA

Tài liệu tham khảo

Westin, 1968, Privacy and freedom, Washington Lee Law Rev., 25, 166 Health Information Privacy, http://www.hhs.gov/hipaa/ (last access: 06.09.17). Protection of Personal Data, http://ec.europa.eu/justice/data-protection/ (last access: 06.09.17). Justice Laws Website, http://laws-lois.justice.gc.ca/eng/acts/p-8.6/ (last access: 06.09.17). Sobirey, 1997 Büschkes, 1999, Privacy enhanced intrusion detection, 187 Lundin, 2000, Anomaly-based intrusion detection: privacy concerns and other problems, Comput. Netw., 34, 623, 10.1016/S1389-1286(00)00134-1 Biskup, 2000, Transaction-based pseudonyms in audit data for privacy respecting intrusion detection, 28 Patrick Lincoln, PhillipA. Porras, Vitaly Shmatikov, Privacy-preserving sharing and correlation of security alerts, in: USENIX Security Symposium, 2004, pp. 239–254. Locasto, 2005, Towards collaborative security and p2p intrusion detection, 333 Xu, 2005, Privacy-preserving alert correlation: a concept hierarchy based approach, 10 Lee, 2006, A privacy-preserving interdomain audit framework, 99 Parekh, 2006, Privacy-preserving payload-based correlation for accurate malicious traffic detection, 99 Flegel, 2007 Park, 2007, PPIDS: privacy preserving intrusion detection system, 269 Zhang, 2006, Outsourcing security analysis with anonymized logs, 1 Janak J. Parekh, Privacy-preserving distributed event corroboration. Ph.D. thesis, Columbia University, 2007. Bianchi, 2007, Towards privacy-preserving network monitoring: Issues and challenges, 1 Haakon Andreas Ringberg, Jennifer Rexford, Privacy-preserving collaborative anomaly detection. Ph.D. thesis, Princeton University, 2009. Trousset, 2009, SAX: a privacy preserving general purpose method applied to detection of intrusions, 17 Ulltveit-Moe, 2009, Two tiered privacy enhanced intrusion detection system architecture Vasilomanolakis, 2015, SkipMon: A locality-aware collaborative intrusion detection system, 1 Kerschbaum, 2010, Privacy-preserving pattern matching for anomaly detection in RFID anti-counterfeiting, 124 Hyang-Ah Kim, Privacy-preserving distributed, automated signature-based detection of new Internet worms. Ph.D. thesis, Carnegie Mellon University, 2010. Burkhart, 2010, SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics, Network, 1, 101101 Bahsi, 2011, Preserving organizational privacy in intrusion detection log sharing, 1 Burkhart, 2011, Privacy-preserving distributed network troubleshootingbridging the gap between theory and practice, ACM Trans. Inf. Syst. Secur. (TISSEC), 14, 31, 10.1145/2043628.2043632 Niksefat, 2013, Zids: A privacy-preserving intrusion detection system using secure two-party computation protocols, Comput. J., 1 Do, 2015, Privacy-preserving approach for sharing and processing intrusion alert data, 1 Michael Thomas, 2015, Using classified intelligence to defend unclassified networks, 2298 Zhou, 2010, A survey of coordinated attacks and collaborative intrusion detection, Comput. Secur., 29, 124, 10.1016/j.cose.2009.06.008 Vasilomanolakis, 2015, Taxonomy and survey of collaborative intrusion detection, ACM Comput. Surv. (CSUR), 47, 55, 10.1145/2716260 Rainer Bye, Seyit Ahmet Camtepe, Sahin Albayrak, Collaborative intrusion detection framework: Characteristics, adversarial opportunities and countermeasures, in: International Conference on Collaborative Methods for Security and Privacy, CollSec, 2010. Matyas, 2013, Conflicts between intrusion detection and privacy mechanisms for wireless sensor networks, IEEE Secur. Privacy, 5, 73, 10.1109/MSP.2013.111 Dhage, 2012, Intrusion detection system in cloud computing environment, Int. J. Cloud Comput., 1, 261, 10.1504/IJCC.2012.046711 Roesch, 1999, Snort: Lightweight intrusion detection for networks, LISA, 99, 229 Debra Anderson, Teresa F. Lunt, Harold Javitz, Ann Tamaru, Alfonso Valdes, et al. Detecting unusual program behavior using the statistical component of the Next-generation Intrusion Detection Expert System (NIDES), SRI International, Computer Science Laboratory, 1995. Kaghazgaran, 2011, Masquerade detection using GUI events in windows systems, Int. J. Inf. Commun. Technol. (IJICT) Tippingpoint, Zero day initiative. 2016. http://www.zerodayinitiative.com/ (Last Access: 06.09.17). Kerschbaum, 2007, Distance-preserving pseudonymization for timestamps and spatial data, 68 Wagner, 2003, Cryptanalysis of an algebraic privacy homomorphism, 234 Rivest, 1978, On data banks and privacy homomorphisms, Found. Secure Comput., 4, 169 Craig Gentry, et al. Fully homomorphic encryption using ideal lattices, in: STOC, Vol. 9, 2009, pp. 169–178. Kaghazgaran, 2011, Secure two party comparison over encrypted data, 1123 Goldreich, 2004 Wikipedia. Differential privacy — Wikipedia, the free encyclopedia, 2017. https://en.wikipedia.org/w/index.php?title=Differential_privacy&oldid=773421488 [Online; accessed 28.05.17]. Reed, 2010, Differential privacy for collaborative security, 1 Aggarwal, 2008, A general survey of privacy-preserving data mining models and algorithms, 11 Axelsson, 2000, The base-rate fallacy and the difficulty of intrusion detection, ACM Trans. Inf. Syst. Secur. (TISSEC), 3, 186, 10.1145/357830.357849