Skip to main content

PPIDS: Privacy Preserving Intrusion Detection System

  • Conference paper
Intelligence and Security Informatics (PAISI 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4430))

Included in the following conference series:

Abstract

The goal of intrusion detection systems(IDS) is to protect from the signs of security problems. However, since an IDS usually depends on the monitored data and has to identify an intruder, the running of IDS comes to threaten users’ privacy. In this paper, we propose a new privacy preserving method in intrusion detection system by applying cryptographic methods to log files. It can meet the enhanced privacy of users as well as the security of network providers without TTP.

This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. BĂĽschkes, R.: Privacy enhanced intrusion detection. Aachen University of Technology (1999)

    Google Scholar 

  2. http://www.oracleadvice.com/Tips/external.htm

  3. Domingo-Ferrer, J.: A new privacy homomorphism and applications. Information Processing Letters (1996)

    Google Scholar 

  4. Domingo-Ferrer, J.: A Provably Secure Additive and Multiplicative Privacy Homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471–483. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Fischer-Hubner, S.: Privacy-Enhancing Technologies. In: Fischer-Hübner, S. (ed.) IT-Security and Privacy. LNCS, vol. 1958, pp. 107–165. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Denning, D.E.: An Intrusion-Detection Model. IEEE Trans. Software Eng. (1987)

    Google Scholar 

  7. Hacigumus, H., Iyer, B., Mehrotra, S.: Efficient Execution of Aggregation Queries over Encrypted Relational Databases. In: Backhouse, R., Gibbons, J. (eds.) Generic Programming. LNCS, vol. 2793, pp. 125–136. Springer, Heidelberg (2003)

    Google Scholar 

  8. Lindqvist, U., Porras, P.A.: eXpert-BSM: A Host-based Intrusion Detection Solution for Sun Solaris. In: 17th Annual Computer Security Applications Conference (2001)

    Google Scholar 

  9. Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network Intrusion Detection. IEEE Network 8, 26–41 (1994)

    Article  Google Scholar 

  10. Sobirey, M., Fischer-Hubner, S., Rannenberg, K.: Pseudonymous Audit for Privacy Enhanced Intrusion Detection. In: IFIP/SEC (1997)

    Google Scholar 

  11. Tripwire Evaluation Guide for Unix

    Google Scholar 

  12. Biskup, J., Flegel, U.: Transaction based Psedonyms in Audit Data for Privacy Respecting Intrusion Detection. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 28–48. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Christopher C. Yang Daniel Zeng Michael Chau Kuiyu Chang Qing Yang Xueqi Cheng Jue Wang Fei-Yue Wang Hsinchun Chen

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Park, HA., Lee, D.H., Lim, J., Cho, S.H. (2007). PPIDS: Privacy Preserving Intrusion Detection System. In: Yang, C.C., et al. Intelligence and Security Informatics. PAISI 2007. Lecture Notes in Computer Science, vol 4430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71549-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71549-8_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71548-1

  • Online ISBN: 978-3-540-71549-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics