Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization

Adam Slagell, William Yurcik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Logs are one of the most fundamental resources to any security professional. It is widely recognized by the government and industry that it is both beneficial and desirable to share logs for the purpose of security research. However, the sharing is not happening or not to the degree or magnitude that is desired. Organizations are reluctant to share logs because of the risk from exposing sensitive information to potential attackers. In this paper we survey current attempts at sharing logs and current log anonymization tools. We further define the problem and describe a roadmap to solve the issues that have to date inhibited large scale log sharing.

Original languageEnglish (US)
Title of host publicationWorkshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005
PublisherIEEE Computer Society
Pages80-89
Number of pages10
ISBN (Print)0780394690, 9780780394698
DOIs
StatePublished - 2005
EventWorkshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005 - Athens, Greece
Duration: Sep 5 2006Sep 9 2006

Publication series

NameWorkshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005
Volume2005

Other

OtherWorkshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005
Country/TerritoryGreece
CityAthens
Period9/5/069/9/06

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization'. Together they form a unique fingerprint.

Cite this