Organizations security becomes increasingly more difficult to obtain due to the fact that information technology and networking resources are dispersed across organizations. Network intrusion attacks are more and more difficult to detect even if the most sophisticated security tools are used. To address this problem, researchers and vendors have proposed alert correlation, an analysis process that takes the events produced by the monitoring components and produces compact reports on the security status of the organization under monitoring. Centralized solutions imply to gather from distributed resources by a third party the global state of the network in order to evaluate risks of attacks but neglect the honest but curious behaviors. In this paper, we focus on this issue and propose a set of solutions able to give a coarse or a fine grain global state depending on the system needs and on the privacy level requested by the involved organizations.

A distributed and privacy-preserving method for network intrusion detection / F. Benali, N. Bennani, G. Gianini, S. Cimato (LECTURE NOTES IN COMPUTER SCIENCE). - In: On the Move to Meaningful Internet Systems, OTM 2010 / [a cura di] R. Meersman, T. Dillon, P. Herrero. - Berlin : Springer, 2010. - ISBN 9783642169489. - pp. 861-875 (( convegno OTM Confederated International Conferences tenutosi a Crete nel 2010 [10.1007/978-3-642-16949-6_13].

A distributed and privacy-preserving method for network intrusion detection

G. Gianini
Penultimo
;
S. Cimato
Ultimo
2010

Abstract

Organizations security becomes increasingly more difficult to obtain due to the fact that information technology and networking resources are dispersed across organizations. Network intrusion attacks are more and more difficult to detect even if the most sophisticated security tools are used. To address this problem, researchers and vendors have proposed alert correlation, an analysis process that takes the events produced by the monitoring components and produces compact reports on the security status of the organization under monitoring. Centralized solutions imply to gather from distributed resources by a third party the global state of the network in order to evaluate risks of attacks but neglect the honest but curious behaviors. In this paper, we focus on this issue and propose a set of solutions able to give a coarse or a fine grain global state depending on the system needs and on the privacy level requested by the involved organizations.
Bayesian Network; Information System; Intrusion Detection; Intrusion Detection System; Trusted Third Party
Settore INF/01 - Informatica
2010
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
Benali2010_Chapter_ADistributedAndPrivacy-Preserv.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 315.16 kB
Formato Adobe PDF
315.16 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/154947
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 8
  • ???jsp.display-item.citation.isi??? 3
social impact