The Challenges of Effectively Anonymizing Network Data
Author(s) -
Ch. Hima Bindu
Publication year - 2013
Publication title -
international journal of pharmacology and pharmaceutical technology
Language(s) - English
Resource type - Journals
ISSN - 2277-3436
DOI - 10.47893/ijppt.2013.1003
Subject(s) - computer science , key (lock) , trace (psycholinguistics) , computer security , process (computing) , network security , host (biology) , data science , risk analysis (engineering) , business , ecology , philosophy , linguistics , biology , operating system
The availability of realistic network data plays a significant role in fostering collaboration and ensuring U.S. technical leadership in network security research. Unfortunately, a host of technical, legal, policy, and privacy issues limit the ability of operators to producedatasets for information security testing. In an effort to help overcome these limitations, several data collection efforts (e.g., CRAWDAD[14], PREDICT [34]) have been established in the past few years. The key principle used in all of these efforts to assure low-risk, high-value data is that of trace anonymization—the process of sanitizing data before release so that potentially sensitive information cannot be extracted.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom