1st International ICST Workshop on the Value of Security through Collaboration

Research Article

Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization

  • @INPROCEEDINGS{10.1109/SECCMW.2005.1588299,
        author={Adam  Slagell and William  Yurcik},
        title={Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization},
        proceedings={1st International ICST Workshop on the Value of Security through Collaboration},
        publisher={IEEE},
        proceedings_a={SECOVAL},
        year={2006},
        month={2},
        keywords={},
        doi={10.1109/SECCMW.2005.1588299}
    }
    
  • Adam Slagell
    William Yurcik
    Year: 2006
    Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization
    SECOVAL
    IEEE
    DOI: 10.1109/SECCMW.2005.1588299
Adam Slagell1,*, William Yurcik1
  • 1: NCSA, University of Illinois at Urbana-Champaign, USA
*Contact email: slagell@ncsa.uiuc.edu

Abstract

Logs are one of the most fundamental resources to any security professional. It is widely recognized by the government and industry that it is both beneficial and desirable to share logs for the purpose of security research. However, the sharing is not happening or not to the degree or magnitude that is desired. Organizations are reluctant to share logs because of the risk from exposing sensitive information to potential attackers. In this paper we survey current attempts at sharing logs and current log anonymization tools. We further define the problem and describe a roadmap to solve the issues that have to date inhibited large scale log sharing.