Research Article
Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization
@INPROCEEDINGS{10.1109/SECCMW.2005.1588299, author={Adam Slagell and William Yurcik}, title={Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization}, proceedings={1st International ICST Workshop on the Value of Security through Collaboration}, publisher={IEEE}, proceedings_a={SECOVAL}, year={2006}, month={2}, keywords={}, doi={10.1109/SECCMW.2005.1588299} }
- Adam Slagell
William Yurcik
Year: 2006
Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization
SECOVAL
IEEE
DOI: 10.1109/SECCMW.2005.1588299
Abstract
Logs are one of the most fundamental resources to any security professional. It is widely recognized by the government and industry that it is both beneficial and desirable to share logs for the purpose of security research. However, the sharing is not happening or not to the degree or magnitude that is desired. Organizations are reluctant to share logs because of the risk from exposing sensitive information to potential attackers. In this paper we survey current attempts at sharing logs and current log anonymization tools. We further define the problem and describe a roadmap to solve the issues that have to date inhibited large scale log sharing.
Copyright © 2005–2024 IEEE