Online event registration with minimal privacy violation
Research project nr. 2 – presentation Niels van Dijkhuizen
minimal privacy violation Research project nr. 2 presentation Niels - - PowerPoint PPT Presentation
Online event registration with minimal privacy violation Research project nr. 2 presentation Niels van Dijkhuizen Introduction Sharing captured network data IDS rule Privacy concerns Image source:
Research project nr. 2 – presentation Niels van Dijkhuizen
Image source: www.birminghamavs.com/tag/surveillance-cameras
Image source: www.open.edu/openlearn/society/the-white-mask
and topology
(chosen plaintext)
source: www.grumpycats.com
Transport layers;
anonymisation;
Image source: www.nvidia.com
Image source: digilentinc.com/sume/
Needed steps:
1.
Identify proto/apps;
2.
Get statistics;
3.
Identify threats;
4.
Identify sensitive fields;
5.
Build privacy and threat policies.
Identification and classification Anonymisation Packets Privacy policies Threat rule-sets Further conditional anonymisation Alerts & Storage IDS Detection Engine
Anonymiser Intrusion Detection
Unknown is discarded
Identification and classification Erase irrelevant fields Packets Privacy policies Threat rule-sets Alerts & Storage Simplified IDS
Anonymiser Intrusion Detection
Unknown is discarded
It is possible to anonymise network traces to a certain extent and keep some of the usefulness for threat detection
Image source: www.justice-for-families.org.uk/