Abstract
The goal of intrusion detection systems(IDS) is to protect from the signs of security problems. However, since an IDS usually depends on the monitored data and has to identify an intruder, the running of IDS comes to threaten users’ privacy. In this paper, we propose a new privacy preserving method in intrusion detection system by applying cryptographic methods to log files. It can meet the enhanced privacy of users as well as the security of network providers without TTP.
This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
BĂĽschkes, R.: Privacy enhanced intrusion detection. Aachen University of Technology (1999)
Domingo-Ferrer, J.: A new privacy homomorphism and applications. Information Processing Letters (1996)
Domingo-Ferrer, J.: A Provably Secure Additive and Multiplicative Privacy Homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471–483. Springer, Heidelberg (2002)
Fischer-Hubner, S.: Privacy-Enhancing Technologies. In: Fischer-Hübner, S. (ed.) IT-Security and Privacy. LNCS, vol. 1958, pp. 107–165. Springer, Heidelberg (2001)
Denning, D.E.: An Intrusion-Detection Model. IEEE Trans. Software Eng. (1987)
Hacigumus, H., Iyer, B., Mehrotra, S.: Efficient Execution of Aggregation Queries over Encrypted Relational Databases. In: Backhouse, R., Gibbons, J. (eds.) Generic Programming. LNCS, vol. 2793, pp. 125–136. Springer, Heidelberg (2003)
Lindqvist, U., Porras, P.A.: eXpert-BSM: A Host-based Intrusion Detection Solution for Sun Solaris. In: 17th Annual Computer Security Applications Conference (2001)
Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network Intrusion Detection. IEEE Network 8, 26–41 (1994)
Sobirey, M., Fischer-Hubner, S., Rannenberg, K.: Pseudonymous Audit for Privacy Enhanced Intrusion Detection. In: IFIP/SEC (1997)
Tripwire Evaluation Guide for Unix
Biskup, J., Flegel, U.: Transaction based Psedonyms in Audit Data for Privacy Respecting Intrusion Detection. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 28–48. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Park, HA., Lee, D.H., Lim, J., Cho, S.H. (2007). PPIDS: Privacy Preserving Intrusion Detection System. In: Yang, C.C., et al. Intelligence and Security Informatics. PAISI 2007. Lecture Notes in Computer Science, vol 4430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71549-8_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-71549-8_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71548-1
Online ISBN: 978-3-540-71549-8
eBook Packages: Computer ScienceComputer Science (R0)