Presentation | 2009-06-18 Proposal and Consideration for An Anonymity Method for The Widely Ditributed Incidents Analysis System Kota KONDO, Ryoichi ISAWA, Masakatu MORII, Sadako TAKASUKA, Koji NAKAO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The problem caused by the computer security incidents become serious in these days. For the countermeasure, the widely distributed incidents analysis system are developed by NICT. The system is consisted of some L-SOCs and the upper level SOC. The L-SOCs capture the network data to analyze local incidents, and send the analysis results to the upper level SOC. The upper level SOC obtains the analysis results including some privacy information obtained by L-SOC, so there are needed to anonymize the privacy information. In this paper, we report the requirements of the anonymity methods and propose the specific anonymity method for the widely distributed incidents analysis system. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | anonymization / anonymous / Privacy-preserving / Network data sharing / Incident analysis |
Paper # | IA2009-6,ICSS2009-14 |
Date of Issue |
Conference Information | |
Committee | IA |
---|---|
Conference Date | 2009/6/11(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Internet Architecture(IA) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Proposal and Consideration for An Anonymity Method for The Widely Ditributed Incidents Analysis System |
Sub Title (in English) | |
Keyword(1) | anonymization |
Keyword(2) | anonymous |
Keyword(3) | Privacy-preserving |
Keyword(4) | Network data sharing |
Keyword(5) | Incident analysis |
1st Author's Name | Kota KONDO |
1st Author's Affiliation | Graduate School of Engineering, Kobe University() |
2nd Author's Name | Ryoichi ISAWA |
2nd Author's Affiliation | CRYPTO CO., LTD |
3rd Author's Name | Masakatu MORII |
3rd Author's Affiliation | Graduate School of Engineering, Kobe University |
4th Author's Name | Sadako TAKASUKA |
4th Author's Affiliation | CRYPTO CO., LTD |
5th Author's Name | Koji NAKAO |
5th Author's Affiliation | National Institute of Information and Communications Technology |
Date | 2009-06-18 |
Paper # | IA2009-6,ICSS2009-14 |
Volume (vol) | vol.109 |
Number (no) | 85 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |