Privacy Preserving Network Security Data Analytics: Architectures and System Design DeYoung, Mark Kobezak, Philip Raymond, David Marchany, Randy Tront, Joseph 2017-12-28T02:05:44Z 2017-12-28T02:05:44Z 2018-01-03
dc.description.abstract An incessant rhythm of data breaches, data leaks, and privacy exposure highlights the need to improve control over potentially sensitive data. History has shown that neither public nor private sector organizations are immune. Lax data handling, incidental leakage, and adversarial breaches are all contributing factors. Prudent organizations should consider the sensitive nature of network security data. Logged events often contain data elements that are directly correlated with sensitive information about people and their activities -- often at the same level of detail as sensor data. Our intent is to produce a database which holds network security data representative of people's interaction with the network mid-points and end-points without the problems of identifiability. In this paper we discuss architectures and propose a system design that supports a risk based approach to privacy preserving data publication of network security data that enables network security data analytics research.
dc.format.extent 9 pages
dc.identifier.doi 10.24251/HICSS.2018.569
dc.identifier.isbn 978-0-9981331-1-9
dc.language.iso eng
dc.relation.ispartof Proceedings of the 51st Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.subject Data Analytics Management, Governance, and Compliance
dc.subject network security data analytics, privacy preserving data analytics, privacy preserving data publication
dc.title Privacy Preserving Network Security Data Analytics: Architectures and System Design
dc.type Conference Paper
dc.type.dcmi Text
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
1.27 MB
Adobe Portable Document Format