Date of Publication :20th April 2018
Abstract: Intrusion Detection Systems (IDSs) detect potential attacks by monitoring activities in computers and networks. This monitoring is carried out by collecting and analyzing data pertaining to users and organizations. The data is collected from various sources – such as system log files or network traffic– and may contain private information. Therefore, analysis of the data by an IDS can raise multiple privacy concerns. Recently, building IDSs that consider privacy issues in their design criteria in addition to classic design objectives (such as IDS’ performance and precision) has become a priority. This article proposes a taxonomy of privacy issues in IDSs which is then utilized to identify new challenges and problems in the field. In this taxonomy, we classify privacy-sensitive IDS data as input, built-in and generated data. Research prototypes are then surveyed and compared using the taxonomy. The privacy techniques used in the surveyed systems are discussed and compared based on their effects on the performance and precision of the IDS. Finally, the taxonomy and the survey are used to point out a number of areas for future research
Reference :
-
- Alan F. Westin, Privacy and freedom, Washington Lee Law Rev. 25 (1) (1968) 166.
- Health Information Privacy, http://www.hhs.gov/hipaa/ (last access: 06.09.17).
- Protection of Personal Data, http://ec.europa.eu/justice/data-protection/ (last access: 06.09.17).
- Justice Laws Website, http://lawslois.justice.gc.ca/eng/acts/p-8.6/ (last ac- cess: 06.09.17).
- Michael Sobirey, Simone Fischer-Hubner, Kai Rannenberg, Pseudonymous Audit for Privacy Enhanced Intrusion Detection, Springer, 1997.
- Roland Büschkes, Dogan Kesdogan, Privacy enhanced intrusion detection, in: Multilateral Security in Communications, Information Security, 1999, pp. 187–204.
- Emilie Lundin, Erland Jonsson, Anomaly-based intrusion detection: privacy concerns and other problems, Comput. Netw. 34 (4) (2000) 623– 640.
- Joachim Biskup, Ulrich Flegel, Transactionbased pseudonyms in audit data for privacy respecting intrusion detection, in: Recent Advances in Intrusion Detection, Springer, 2000, pp. 28–48.