dc.contributor.author | Ulltveit-Moe, Nils | |
dc.contributor.author | Oleshchuk, Vladimir A. | |
dc.date.accessioned | 2010-10-29T08:22:33Z | |
dc.date.available | 2010-10-29T08:22:33Z | |
dc.date.issued | 2010 | |
dc.identifier.citation | Ulltveit-Moe, N. & Oleshchuk, V. A. (2010). Privacy Violation Classification of Snort Ruleset. In Parallel, Distributed and Network-Based Processing. IEEE. | en_US |
dc.identifier.isbn | 978-1-4244-5672-7 | |
dc.identifier.issn | 2377-5750 | |
dc.identifier.uri | http://hdl.handle.net/11250/137754 | |
dc.description.abstract | It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand and quantify the privacy-invasiveness of network monitoring services. The objective in this paper is to classify Snort rules according to the risk of privacy violations in the form of leaking sensitive or confidential material. The classification is based on a ruleset that formerly has been manually categorised according to our PRIvacy LEakage (PRILE) methodology. Such information can be useful both for privacy impact assessments and automated tests for detecting privacy violations. Information about potentially privacy violating rules can subsequently be used to tune the IDS rule sets, with the objective to minimise the expected amount of data privacy violations during normal operation. The paper suggests some classification tasks that can be useful both to improve the PRILE methodology and for privacy violation evaluation tools. Finally, two selected classification tasks are analysed by using a Naive Bayes classifier. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | IEEE | en_US |
dc.title | Privacy Violation Classification of Snort Ruleset | en_US |
dc.type | Journal article | en_US |
dc.type | Peer reviewed | en_US |
dc.rights.holder | © 2010 IEEE | |
dc.rights.holder | Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | |
dc.subject.nsi | VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424 | en_US |
dc.source.journal | Parallel, Distributed and Network-Based Processing | |
dc.identifier.doi | http://dx.doi.org/10.1109/PDP.2010.87 | |