A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
The need for privacy in intrusion detection data, such as audit logs is widely recognized. The prevalent method for privacy protection in audit logs is pseudonymization (and suppression). There is a clear trade-off between the privacy of a pseudonymization technique and its utility for intrusion detection. E.g., for IP addresses a method for prefixpreserving pseudonymization has been developed, that allows pseudonymized IP addresses to be still grouped into subnets. This paper describes adoi:10.1145/1314333.1314346 dblp:conf/wpes/Kerschbaum07 fatcat:uq4p5sxpjjadfc5zxr52dulad4