Towards automatic assembly of privacy-preserved intrusion signatures

  • Authors:
  • Zhuowei Li;Amitabha Das;Jianying Zhou

  • Affiliations:
  • Indiana University at Bloomington and Nanyang Technological University, Singapore;Nanyang Technological University, Singapore;Institute for Infocomm Research, Singapore

  • Venue:
  • TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intrusion signatures are used to detect and/or prevent fast-spreading worms or exploits, and usually, constructing these signatures is an automatic process without human intervention for the sake of speed. In principle, the automatic signature construction process can produce not only true-positive intrusion signatures but also false-positive ones, the latter of which poses a grave problem because they can be misused to disclose privacy information. Manual signature checking (for a whitelist) can solve the problem, but it slows down the reaction time for an attack dramatically. In this paper, we propose a mechanism to generate signatures automatically while preserving the privacy information. Essentially, we transform the original feature values within an audit trail instance into feature ranges, and then use these feature ranges to construct a privacy-preserved intrusion signature. Our current focus is on the methods constructing feature ranges, and for this purpose, several methods are proposed to discover feature ranges. The experimental results are quite encouraging: the transformation from values to ranges leads not only to the preservation of privacy but also to the enhancement of the detection performance.