Vis enkel innførsel

dc.contributor.authorUlltveit-Moe, Nils
dc.contributor.authorOleshchuk, Vladimir A.
dc.date.accessioned2010-10-29T08:22:33Z
dc.date.available2010-10-29T08:22:33Z
dc.date.issued2010
dc.identifier.citationUlltveit-Moe, N. & Oleshchuk, V. A. (2010). Privacy Violation Classification of Snort Ruleset. In Parallel, Distributed and Network-Based Processing. IEEE.en_US
dc.identifier.isbn978-1-4244-5672-7
dc.identifier.issn2377-5750
dc.identifier.urihttp://hdl.handle.net/11250/137754
dc.description.abstractIt is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand and quantify the privacy-invasiveness of network monitoring services. The objective in this paper is to classify Snort rules according to the risk of privacy violations in the form of leaking sensitive or confidential material. The classification is based on a ruleset that formerly has been manually categorised according to our PRIvacy LEakage (PRILE) methodology. Such information can be useful both for privacy impact assessments and automated tests for detecting privacy violations. Information about potentially privacy violating rules can subsequently be used to tune the IDS rule sets, with the objective to minimise the expected amount of data privacy violations during normal operation. The paper suggests some classification tasks that can be useful both to improve the PRILE methodology and for privacy violation evaluation tools. Finally, two selected classification tasks are analysed by using a Naive Bayes classifier.en_US
dc.language.isoengen_US
dc.publisherIEEEen_US
dc.titlePrivacy Violation Classification of Snort Ruleseten_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.rights.holder© 2010 IEEE
dc.rights.holderPersonal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
dc.subject.nsiVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424en_US
dc.source.journalParallel, Distributed and Network-Based Processing
dc.identifier.doihttp://dx.doi.org/10.1109/PDP.2010.87


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel