skip to main content
10.1145/1752046.1752047acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Differential privacy for collaborative security

Published:13 April 2010Publication History

ABSTRACT

Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered by the fact that operators can observe only the traffic in their local domains. We propose a collaborative approach to this problem, in which operators share aggregate information about the traffic in their respective domains through an automated query mechanism. We argue that existing work on differential privacy and type systems can be leveraged to build a programmable query mechanism that can express a wide range of queries while limiting what can be learned about individual customers. We report on our progress towards building such a mechanism, and we discuss opportunities and challenges of the collaborative security approach.

References

  1. P. Bächer, T. Holz, M. Kötter, and G. Wicherski. Know your enemy: Tracking botnets, 2005. http://honeynet.org/papers/bots.Google ScholarGoogle Scholar
  2. J. R. Binkley. An algorithm for anomaly-based botnet detection. In Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), pages 43--48, July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In Proceedings of the 24th ACM Symposium on Principles of Database Systems (PODS), pages 128--138, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC), pages 609--618, May 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Chaudhuri, S. Gulwani, and R. Lublinerman. Continuity analysis of programs. ACM SIGPLAN Notices, 45(1):57--70, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C.-M. Cheng, H. T. Kung, and K.-S. Tan. Use of spectral analysis in defense against DoS attacks. In Proceedings of IEEE GLOBECOM, volume 3, pages 2143--2148, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  7. E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of the Conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Dwork. Differential privacy. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Dwork. Differential privacy: A survey of results. In Proceedings of the International Conference on Theory and Applications of Models of Computation (TAMC), Apr. 2008. Invited paper. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Dwork. The differential privacy frontier (extended abstract). In Theory of Cryptography, Lecture Notes in Computer Science, chapter 29, pages 496--502. Springer, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Dwork and J. Lei. Differential privacy and robust statistics. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC), pages 371--380, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Proceedings of the 3rd Theory of Cryptography Conference (TCC), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Goebel and T. Holz. Rishi: Identify bot contaminated host by IRC nickname evaluation. In Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots), April 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proceedings of the 17th USENIX Security Symposium, July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. Bothunter: Detecting malware infection through IDS-driven dialog crrelation. In Proceedings of the 16th USENIX Security Symposium, Aug. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Gu, J. Zhang, and W. Lee. Botsniffer: Detecting botnet command and control channels in network traffic. In Proceedings of the Network and Distributed System Security Symposium (NDSS), February 2008.Google ScholarGoogle Scholar
  17. A. Gupta, K. Ligett, F. McSherry, A. Roth, and K. Talwar. Differentially private combinatorial optimization, Nov 2009. http://arxiv.org/abs/0903.4510.Google ScholarGoogle Scholar
  18. T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling. Measuring and detecting fast-flux service networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2008.Google ScholarGoogle Scholar
  19. J. Ioannidis and S. Bellovin. Implementing pushback: Router-based defense against DDoS attacks. In Proceedings of the Network and Distributed System Security Symposium (NDSS), volume 2, Feb. 2002.Google ScholarGoogle Scholar
  20. C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamalytics: an empirical analysis of spam marketing conversion. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), pages 3--14, Oct. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Karasardis, B. Rexroad, and D. Hoeflin. Wide-scale botnet detection and characterization. In Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What can we learn privately? In Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 531--540, October 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Livads, R. Walsh, D. Lapsley, and W. Strayer. Using machine learning techniques to identify botnet traffic. In 2nd IEEE LCN Workshop on Network Security (WNS '06), Nov. 2006.Google ScholarGoogle Scholar
  24. F. McSherry and K. Talwar. Mechanism design via differential privacy. In Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 94--103, Oct. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. F. D. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In Proceedings of the ACM International Conference on Management of Data (SIGMOD), pages 19--30, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. Moore, G. M. Voelker, and S. Savage. Inferring internet denial-of-service activity. In Proceedings of the 10th USENIX Security Symposium, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC), pages 75--84, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. Roth and T. Roughgarden. The Median Mechanism: Interactive and efficient privacy with multiple queries. To appear in: Proceedings of the 42nd Annual ACM Symposium on Theory of Computing (STOC). Preprint available as arXiv:0911.1813v1.Google ScholarGoogle Scholar
  30. B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), pages 635--647, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. T. Yen and M. K. Reiter. Traffic aggregation for malware detection. In Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, volume 5137, pages 207--227. LNCS Springer Berlin / Heidelberg, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Differential privacy for collaborative security

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        EUROSEC '10: Proceedings of the Third European Workshop on System Security
        April 2010
        51 pages
        ISBN:9781450300599
        DOI:10.1145/1752046

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 April 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate47of113submissions,42%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader