{"title":"Network Telemetry Anonymization for Cloud Based Security Analysis - Best Practices","authors":"Sashank Dara","doi":"10.1109/CCEM.2014.7015493","DOIUrl":null,"url":null,"abstract":"Availability of network telemetry data aides in identifying security compromises, malicious traffic patterns, malware spread etc. There are varieties of Cloud based security services available for consumers to benefit from but on another hand there is a compelling need for ensuring privacy of sensitive fields before data is shared with any cloud provider. Anonymization techniques based on micro-data or macro-data have challenges in terms of attacks possible, scalability and practicality. In this paper we discuss challenges in privacy-preserving cloudification of network telemetry data. We present practical and scalable techniques for network data anonymization. These techniques ensure the privacy of the sensitive fields while retaining the ability to perform security forensics and analytics. We also provide best practices for ensuring successful data anonymization.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCEM.2014.7015493","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Availability of network telemetry data aides in identifying security compromises, malicious traffic patterns, malware spread etc. There are varieties of Cloud based security services available for consumers to benefit from but on another hand there is a compelling need for ensuring privacy of sensitive fields before data is shared with any cloud provider. Anonymization techniques based on micro-data or macro-data have challenges in terms of attacks possible, scalability and practicality. In this paper we discuss challenges in privacy-preserving cloudification of network telemetry data. We present practical and scalable techniques for network data anonymization. These techniques ensure the privacy of the sensitive fields while retaining the ability to perform security forensics and analytics. We also provide best practices for ensuring successful data anonymization.