To read this content please select one of the options below:

Maintaining privacy in anomaly‐based intrusion detection systems

A.S. Sodiya (Department of Mathematical Sciences, University of Agriculture, Abeokuta, Ogun State, Nigeria)
H.O.D. Longe (Department of Computer Sciences, University of Lagos, Lagos, Nigeria)
A.T. Akinwale (Department of Mathematical Sciences, University of Agriculture, Abeokuta, Ogun State, Nigeria)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 February 2005

1032

Abstract

Purpose

The goal of our work is to discuss the fundamental issues of privacy and anomaly‐based intrusion detection systems (IDS) and to design an efficient anomaly‐based intrusion IDS architecture where users' privacy is maintained.

Design/methodology/approach

In this work, any information that can link intrusion detection activity to a user is encrypted so as to pseudonyze the sensitive information. A database of encrypted information would then be created which becomes the source database for the IDS. The design makes use of dynamic key generation algorithm that generates key randomly when an intrusion is detected. The keys are only released when an intrusion occurs and immediately swapped to protect harm access to the mapping database.

Findings

The result after testing the new privacy maintained IDS architecture on an application package shows greater improvement over the ordinary IDSs. Privacy complaints reduced considerably from between 8 and 16 per week to about 1‐2.

Research limitations/implications

We only tested the new privacy maintained IDS on a package, it would also be interesting to test the design on some other systems. There is a possibility that time to detection would increase because of the encryption/decryption part of the new design. All the same, we have designed an IDS architecture where privacy of users on the systems is guaranteed.

Practical implications

This work provides a background for researchers in IDS and it requires further improvements and extensions.

Originality/value

The work shows that it is possible to design an IDS architecture for maintaining privacy of users on the network. The result shows the originality of the new design.

Keywords

Citation

Sodiya, A.S., Longe, H.O.D. and Akinwale, A.T. (2005), "Maintaining privacy in anomaly‐based intrusion detection systems", Information Management & Computer Security, Vol. 13 No. 1, pp. 72-80. https://doi.org/10.1108/09685220510582683

Publisher

:

Emerald Group Publishing Limited

Copyright © 2005, Emerald Group Publishing Limited

Related articles