Presentation 2009-06-18
Proposal and Consideration for An Anonymity Method for The Widely Ditributed Incidents Analysis System
Kota KONDO, Ryoichi ISAWA, Masakatu MORII, Sadako TAKASUKA, Koji NAKAO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The problem caused by the computer security incidents become serious in these days. For the countermeasure, the widely distributed incidents analysis system are developed by NICT. The system is consisted of some L-SOCs and the upper level SOC. The L-SOCs capture the network data to analyze local incidents, and send the analysis results to the upper level SOC. The upper level SOC obtains the analysis results including some privacy information obtained by L-SOC, so there are needed to anonymize the privacy information. In this paper, we report the requirements of the anonymity methods and propose the specific anonymity method for the widely distributed incidents analysis system.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) anonymization / anonymous / Privacy-preserving / Network data sharing / Incident analysis
Paper # IA2009-6,ICSS2009-14
Date of Issue

Conference Information
Committee IA
Conference Date 2009/6/11(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Internet Architecture(IA)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Proposal and Consideration for An Anonymity Method for The Widely Ditributed Incidents Analysis System
Sub Title (in English)
Keyword(1) anonymization
Keyword(2) anonymous
Keyword(3) Privacy-preserving
Keyword(4) Network data sharing
Keyword(5) Incident analysis
1st Author's Name Kota KONDO
1st Author's Affiliation Graduate School of Engineering, Kobe University()
2nd Author's Name Ryoichi ISAWA
2nd Author's Affiliation CRYPTO CO., LTD
3rd Author's Name Masakatu MORII
3rd Author's Affiliation Graduate School of Engineering, Kobe University
4th Author's Name Sadako TAKASUKA
4th Author's Affiliation CRYPTO CO., LTD
5th Author's Name Koji NAKAO
5th Author's Affiliation National Institute of Information and Communications Technology
Date 2009-06-18
Paper # IA2009-6,ICSS2009-14
Volume (vol) vol.109
Number (no) 85
Page pp.pp.-
#Pages 6
Date of Issue