TY - GEN
T1 - Outsourcing security analysis with anonymized logs
AU - Zhang, Jianqing
AU - Borisov, Nikita
AU - Yurcik, William
N1 - Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.
PY - 2006
Y1 - 2006
N2 - As security monitoring grows both more complicated and more sophisticated, there is an increased demand for outsourcing these tasks to Managed Security Service Providers (MSSPs). However, the core problem of sharing private security logs creates a barrier to the widespread adoption of this business model. In this paper we analyze the logs used for security analysis with the concern of privacy and propose the constraints on anonymization of security monitor logs. We believe if the anonymization solution fulfills the constraints, MSSPs can detect the attacks efficiently and protect privacy simultaneously.
AB - As security monitoring grows both more complicated and more sophisticated, there is an increased demand for outsourcing these tasks to Managed Security Service Providers (MSSPs). However, the core problem of sharing private security logs creates a barrier to the widespread adoption of this business model. In this paper we analyze the logs used for security analysis with the concern of privacy and propose the constraints on anonymization of security monitor logs. We believe if the anonymization solution fulfills the constraints, MSSPs can detect the attacks efficiently and protect privacy simultaneously.
UR - http://www.scopus.com/inward/record.url?scp=50049107144&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=50049107144&partnerID=8YFLogxK
U2 - 10.1109/SECCOMW.2006.359577
DO - 10.1109/SECCOMW.2006.359577
M3 - Conference contribution
AN - SCOPUS:50049107144
SN - 1424404231
SN - 9781424404230
T3 - 2006 Securecomm and Workshops
BT - 2006 Securecomm and Workshops
T2 - 2006 Securecomm and Workshops
Y2 - 28 August 2006 through 1 September 2006
ER -