Martin BurkhartEnabling Collaborative Network Security with Privacy-Preserving Data Aggregation | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
ISBN: | 978-3-8440-0245-4 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Reihe: | Kommunikationstechnik | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Publikationsart: | Dissertation | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Sprache: | Englisch | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Seiten: | 212 Seiten | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Gewicht: | 314 g | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Format: | 21 x 14,8 cm | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Bindung: | Paperback | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Preis: | 49,80 € | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Erscheinungsdatum: | Juli 2011 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kaufen: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Download: | Verfügbare Online-Dokumente zu diesem Titel: Sie benötigen den Adobe Reader, um diese Dateien ansehen zu können. Hier erhalten Sie eine kleine Hilfe und Informationen, zum Download der PDF-Dateien. Bitte beachten Sie, dass die Online-Dokumente nicht ausdruckbar und nicht editierbar sind.
Benutzereinstellungen für registrierte Online-Kunden Sie können hier Ihre Adressdaten ändern sowie bereits georderte Dokumente erneut aufrufen.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Weiterempfehlung: | Sie möchten diesen Titel weiterempfehlen? | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rezensionsexemplar: | Hier können Sie ein Rezensionsexemplar bestellen. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Verlinken: | Sie möchten diese Seite verlinken? Hier klicken. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Export Zitat: |
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rezensionen: | Hier finden Sie Rezensionen zu diesem Titel | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Zusammenfassung: | Today, there is a fundamental imbalance in cybersecurity. While attackers act more and more globally and coordinated, e.g., by using botnets, their counterparts trying to manage and defend networks are limited to examine local information only. Collaboration across network boundaries would substantially strengthen network defense by enabling collaborative intrusion and anomaly detection. Also, general network management tasks, such as multi-domain traffic engineering and collection of performance statistics, could substantially profit from collaborative approaches. Unfortunately, privacy concerns largely prevent collaboration in multi-domain networking. Data protection legislation makes data sharing illegal in certain cases, especially if PII (personally identifying information) is involved. Even if it were legal, sharing sensitive network internals might actually reduce security if the data fall into the wrong hands. Furthermore, if data are supposed to be aggregated with those of a competitor, sensitive business secrets are at risk. To address these privacy concerns, a large number of data anonymization techniques and tools have been developed. The main goal of these techniques is to sanitize a data set before it leaves an administrative domain. Sensitive information is obscured or completely stripped off the data set. Sanitized properly, organizations can safely share their anonymized data sets and aggregate information. However, these anonymization techniques are generally not lossless. Therefore, organizations face a delicate privacy-utility tradeoff. While stronger sanitization improves data privacy, it also severely impairs data utility. In the first part of this thesis, we analyze the effect of state-of-the-art data anonymization techniques on both data utility and privacy. We find that for some use cases only requiring highly aggregated data, it is possible to find an acceptable tradeoff. However, for anonymization techniques which do not destroy a significant portion of the original information, we show that attackers can easily de-anonymize data sets by injecting crafted traffic patterns into the network. The recovery of these patterns in anonymized traffic makes it easy to map anonymized to real data objects. We conclude that network trace anonymization does not properly protect the privacy of users, hosts, and networks. In the second part of this thesis we explore cryptographic alternatives to anonymization. In particular, we apply secure multiparty computation (MPC) to the problem of aggregating network data from multiple domains. Unlike anonymization, MPC gives information-theoretic guarantees for input data privacy. However, although MPC has been studied substantially for almost 30 years, building solutions that are practical in terms of computation and communication cost is still a major challenge, especially if input data are voluminous as in our scenarios. Therefore, we develop new MPC operations for processing high volume data in near real-time. The prevalent paradigm for designing MPC protocols is to minimize the number of synchronization rounds, i.e., to build constant-round protocols. However, the resulting protocols tend to be inefficient for large numbers of parallel operations. By challenging the constant-round paradigm, we manage to significantly reduce the CPU time and bandwidth consumption of parallel MPC operations. We then implement our optimized operations together with a complete set of basic MPC primitives in the SEPIA library. For parallel invocations, SEPIA's operations are between 35 and several hundred times faster than those of comparable MPC frameworks. Using the SEPIA library, we then design and implement a number of privacy-preserving protocols for aggregating network statistics, such as time series, histograms, entropy values, and distinct item counts. In addition, we devise generic protocols for distributed event correlation and top-k reports. We extensively evaluate the performance of these protocols and show that they run in near real-time. Finally, we apply these protocols to real traffic data from 17 customers of SWITCH (the Swiss national research and education network). We show how these protocols enable the collaborative monitoring of network state as well as the detection and analysis of distributed anomalies, without leaking sensitive local information. |