際際滷

際際滷Share a Scribd company logo
1 息 Nokia Solutions and Networks 2014
Privacy Preserving Log File
Processing in Mobile Network
Environment
Shankar Lal
16-06-2015
2 息 Nokia Solutions and Networks 2014
Presentation outline
Introduction and background review
Cases of privacy breach
Statistical analysis over Network trace
Continuous fields anonymisation through Differential Privacy
Discrete fields anonymisation through -diversity
IP address anonymisation
Future work and conclusion
3 息 Nokia Solutions and Networks 2014
Introduction and Objectives of this work
4 息 Nokia Solutions and Networks 2014
Background review
Data Privacy
Need of privacy in user data
Sharing of network trace data
Tradeoff between data utility and data privacy
5 息 Nokia Solutions and Networks 2014
Privacy Laws
PII (Personally Identifying Information) US privacy law
Personal Data EU Data protection Directive
6 息 Nokia Solutions and Networks 2014
IP address as Personal Data
Arguments on both sides
EU consider it personal (UK is exception)
US consider it non-personal
7 息 Nokia Solutions and Networks 2014
Cases of privacy breach from anonymised data sets
8 息 Nokia Solutions and Networks 2014
There's No Such Thing As An Anonymized
Dataset
9 息 Nokia Solutions and Networks 2014
Netflix anonymous data set and user privacy
breach
10 息 Nokia Solutions and Networks 2014
AOL anonymous data set of user queries
11 息 Nokia Solutions and Networks 2014
Identification of medical record of former
governor of Massachusetts
William Weld
Former governor of Massachusetts
12 息 Nokia Solutions and Networks 2014
Statistical analysis over Network
traces
13 息 Nokia Solutions and Networks 2014
Sample of a Network Log file
14 息 Nokia Solutions and Networks 2014
Statistical Analysis on network trace I
15 息 Nokia Solutions and Networks 2014
Statistical Analysis on network trace II
Most used protocols
Most used packet lengths
Source and destination IP class count
IP class packet length distribution
16 息 Nokia Solutions and Networks 2014
Functional dependencies between fields
17 息 Nokia Solutions and Networks 2014
Why packet length and timestamp fields are
sensitive?
Certain security incidents have fixed packet length
Slammer worm 404 bytes
Nachi worm 92 bytes
Timestamp along with IP address reveals communication existed
between parties.
18 息 Nokia Solutions and Networks 2014
Privatizing network trace
19 息 Nokia Solutions and Networks 2014
Privacy Enhancing Technologies (PETs)
Hashing
Encryption
Randomization and Tokenization
k-anonymity
New Inclusions:
Differential Privacy
≒-diversity
20 息 Nokia Solutions and Networks 2014
k-anonymity
Main idea:
Generalization Suppression Perturbation
21 息 Nokia Solutions and Networks 2014
Example on network data set
Sample Data set 2-anonymous data set
22 息 Nokia Solutions and Networks 2014
Differential Privacy: Anonymisation of
continuous fields
23 息 Nokia Solutions and Networks 2014
Differential Privacy
Differential privacy algorithm states that probability that data
set D1 produces output C is very close to the probability of
data set D2 producing same output.
Laplace noise calculation:
Scale parameter b =  f/ 狼
Mean 亮 =0
 f =sensitivity of the function
狼= Privacy parameter
Probability density plots of Laplace distributions
24 息 Nokia Solutions and Networks 2014
Noise addition through Differential Privacy
Original Distribution 狼 =0.01狼 =0.1
Packet length field
25 息 Nokia Solutions and Networks 2014
Noise addition through Differential Privacy
狼 =0.01狼 =0.1Original Distribution
Timestamp field
26 息 Nokia Solutions and Networks 2014
Comparison between original and noisy data
Packet Length Time stamp
27 息 Nokia Solutions and Networks 2014
-diversity: Anonymisation of discrete fields
28 息 Nokia Solutions and Networks 2014
-diversity
A q-block is -diverse if contains at least  well-represented values for the
sensitive attribute (in other words, diversity in the sensitive attributes).
29 息 Nokia Solutions and Networks 2014
Example on network data set
Sample Data set 3-diverse Data set
30 息 Nokia Solutions and Networks 2014
-diversity technique
<Change information classification in footer>
31 息 Nokia Solutions and Networks 2014
Equivalence class creation
Equivalence
class name
Protocol
name
Protocol
name
Protocol
name
Protocol
name
Transport
Protocols
TCP UDP * *
Management
Protocols
DNS ICMP DHCP ARP
Security
Protocols
TLS SSL SSH HTTPS
Mobile
Networks
Protocols
SSMP GTP GTPv2 UCP
Other
Protocols
* * * *
32 息 Nokia Solutions and Networks 2014
5-diverse data set
<Change information classification in footer>
33 息 Nokia Solutions and Networks 2014
Other Noise addition techniques
34 息 Nokia Solutions and Networks 2014
Zero Mean noise addition
35 息 Nokia Solutions and Networks 2014
Noise addition by summing LSBs technique
Example: 1414 1414+9= 1423
LSBs
36 息 Nokia Solutions and Networks 2014
IP address Anonymisation
37 息 Nokia Solutions and Networks 2014
Anonymising IP addresses
Method: 1. Last octet Obfuscation Method: 2. Transformation to IP class
Goal is to anonymise IP addresses but also preserve network topology information
38 息 Nokia Solutions and Networks 2014
Final Anonymised data set
39 息 Nokia Solutions and Networks 2014
Anonymised network
trace
<Change information classification in footer>
40 息 Nokia Solutions and Networks 2014
Conclusion and Future
Work
41 息 Nokia Solutions and Networks 2014
Conclusion
Preserving user privacy in a network trace.
Analyzing Functional dependencies between the fields.
Packet length and timestamp anonymisation by Differential Privacy and -diversity
technique.
Deciding the best values of privacy parameter 竜
IP addresses anonymisation by last octet obfuscation method
.
42 息 Nokia Solutions and Networks 2014
Future work
Framework for calculating best value of epsilon
Re-identification testing
Feature extraction/Clustering
Anomaly detection/Malware Analysis
<Change information classification in footer>
43 息 Nokia Solutions and Networks 2014
Thank you
Questions?
Privacy Preserving Log File Processing in Mobile Network Environment

More Related Content

What's hot (20)

際際滷share
際際滷share際際滷share
際際滷share
Somesh Ransubhe
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
Securing IP Fax - A New Standard Approach
Securing IP Fax - A New Standard ApproachSecuring IP Fax - A New Standard Approach
Securing IP Fax - A New Standard Approach
James Rafferty
Email sec11
Email sec11Email sec11
Email sec11
Athira Asakumar
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
Ssl for e commerce
Ssl for  e commerceSsl for  e commerce
Ssl for e commerce
shahab zebari
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
E mail security
E   mail securityE   mail security
E mail security
Soumya Vijoy
IPv17 tech
IPv17 techIPv17 tech
IPv17 tech
Vasily Prosin
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptionsHow Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
Uday Bhatia
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
Prof Olivier Bonaventure EU Presentation on MPTCP
Prof Olivier Bonaventure EU Presentation on MPTCPProf Olivier Bonaventure EU Presentation on MPTCP
Prof Olivier Bonaventure EU Presentation on MPTCP
Graham G. Turnbull
Curriculum Vitae (english)
Curriculum Vitae (english)Curriculum Vitae (english)
Curriculum Vitae (english)
Geert Bieseman
VPN Theory
VPN TheoryVPN Theory
VPN Theory
LJ PROJECTS
Ccna1v31 mod09
Ccna1v31 mod09Ccna1v31 mod09
Ccna1v31 mod09
igede tirtanata
Vpn
VpnVpn
Vpn
KamalPreet Saluja
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajendra Dangwal
Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
SAHEEL FAL DESAI
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
Securing IP Fax - A New Standard Approach
Securing IP Fax - A New Standard ApproachSecuring IP Fax - A New Standard Approach
Securing IP Fax - A New Standard Approach
James Rafferty
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
Ssl for e commerce
Ssl for  e commerceSsl for  e commerce
Ssl for e commerce
shahab zebari
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
E mail security
E   mail securityE   mail security
E mail security
Soumya Vijoy
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptionsHow Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
Uday Bhatia
Prof Olivier Bonaventure EU Presentation on MPTCP
Prof Olivier Bonaventure EU Presentation on MPTCPProf Olivier Bonaventure EU Presentation on MPTCP
Prof Olivier Bonaventure EU Presentation on MPTCP
Graham G. Turnbull
Curriculum Vitae (english)
Curriculum Vitae (english)Curriculum Vitae (english)
Curriculum Vitae (english)
Geert Bieseman
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajendra Dangwal
Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
SAHEEL FAL DESAI

Similar to Privacy Preserving Log File Processing in Mobile Network Environment (20)

MidoNet: Network Virtualization & Policies
MidoNet: Network Virtualization & PoliciesMidoNet: Network Virtualization & Policies
MidoNet: Network Virtualization & Policies
Open Networking Summits
Cisco vnp workshop 16-17 april v1-0
Cisco  vnp workshop 16-17 april v1-0Cisco  vnp workshop 16-17 april v1-0
Cisco vnp workshop 16-17 april v1-0
liemgpc2
PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview
PROIDEA
LDSS for mobile cloud
LDSS for mobile cloud  LDSS for mobile cloud
LDSS for mobile cloud
sreelekshmi kishna
Beginners: Network In a Box (NIB)
Beginners: Network In a Box (NIB)Beginners: Network In a Box (NIB)
Beginners: Network In a Box (NIB)
3G4G
Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3
limenih muluneh
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPT
Satish Kumar
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Satish Kumar
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
Rajesh Porwal
Migration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stackMigration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stack
praveenReddy268
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
DAVID RAUDALES
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
Waqas Ahmed Nawaz
It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...
David Terrar
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
Irsandi Hasan
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
IJARIIE JOURNAL
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
deepak kumar
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
FRSecure
Prof. Danny Raz, Director, Bell Labs Israel, Nokia
 Prof. Danny Raz, Director, Bell Labs Israel, Nokia  Prof. Danny Raz, Director, Bell Labs Israel, Nokia
Prof. Danny Raz, Director, Bell Labs Israel, Nokia
chiportal
Google global Cache operations for youtube
Google global Cache operations for youtubeGoogle global Cache operations for youtube
Google global Cache operations for youtube
ShahinAlam930521
MidoNet: Network Virtualization & Policies
MidoNet: Network Virtualization & PoliciesMidoNet: Network Virtualization & Policies
MidoNet: Network Virtualization & Policies
Open Networking Summits
Cisco vnp workshop 16-17 april v1-0
Cisco  vnp workshop 16-17 april v1-0Cisco  vnp workshop 16-17 april v1-0
Cisco vnp workshop 16-17 april v1-0
liemgpc2
PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview
PROIDEA
Beginners: Network In a Box (NIB)
Beginners: Network In a Box (NIB)Beginners: Network In a Box (NIB)
Beginners: Network In a Box (NIB)
3G4G
Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3
limenih muluneh
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPT
Satish Kumar
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Satish Kumar
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
Rajesh Porwal
Migration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stackMigration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stack
praveenReddy268
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
DAVID RAUDALES
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
Waqas Ahmed Nawaz
It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...
David Terrar
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
Irsandi Hasan
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
deepak kumar
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
FRSecure
Prof. Danny Raz, Director, Bell Labs Israel, Nokia
 Prof. Danny Raz, Director, Bell Labs Israel, Nokia  Prof. Danny Raz, Director, Bell Labs Israel, Nokia
Prof. Danny Raz, Director, Bell Labs Israel, Nokia
chiportal
Google global Cache operations for youtube
Google global Cache operations for youtubeGoogle global Cache operations for youtube
Google global Cache operations for youtube
ShahinAlam930521

Recently uploaded (20)

FOOD LAWS.pptxbshdhdhdhdhdhhdhdhdhdhdhhdh
FOOD LAWS.pptxbshdhdhdhdhdhhdhdhdhdhdhhdhFOOD LAWS.pptxbshdhdhdhdhdhhdhdhdhdhdhhdh
FOOD LAWS.pptxbshdhdhdhdhdhhdhdhdhdhdhhdh
cshdhdhvfsbzdb
BSEO - The Ultimate GA4 Audit - Anna Lewis - Polka Dot Data
BSEO - The Ultimate GA4 Audit - Anna Lewis - Polka Dot DataBSEO - The Ultimate GA4 Audit - Anna Lewis - Polka Dot Data
BSEO - The Ultimate GA4 Audit - Anna Lewis - Polka Dot Data
Anna Lewis
A Simple Introduction to data Science- what is it and what does it do
A Simple Introduction to data Science- what is it and what does it doA Simple Introduction to data Science- what is it and what does it do
A Simple Introduction to data Science- what is it and what does it do
sarah mabrouk
GE-108-LESSON8.pptxbshsnsnsnsnsnsnnsnsnsnsnsbd
GE-108-LESSON8.pptxbshsnsnsnsnsnsnnsnsnsnsnsbdGE-108-LESSON8.pptxbshsnsnsnsnsnsnnsnsnsnsnsbd
GE-108-LESSON8.pptxbshsnsnsnsnsnsnnsnsnsnsnsbd
HarleySamboFavor
Threat Intelligence Platform_ The Future of Cybersecurity Defense.docx
Threat Intelligence Platform_ The Future of Cybersecurity Defense.docxThreat Intelligence Platform_ The Future of Cybersecurity Defense.docx
Threat Intelligence Platform_ The Future of Cybersecurity Defense.docx
dexposewebcast
537116365-Domain-6-Presentation-New.pptx
537116365-Domain-6-Presentation-New.pptx537116365-Domain-6-Presentation-New.pptx
537116365-Domain-6-Presentation-New.pptx
PorshaAbril1
MeasureCamp Belgrade 2025 - Yasen Lilov - Past - Present - Prompt
MeasureCamp Belgrade 2025 - Yasen Lilov - Past - Present - PromptMeasureCamp Belgrade 2025 - Yasen Lilov - Past - Present - Prompt
MeasureCamp Belgrade 2025 - Yasen Lilov - Past - Present - Prompt
Yasen Lilov
Visionaize for Visionaize AI Powered Solution For Thermal Power Plant.pptx
Visionaize  for Visionaize AI Powered Solution For Thermal Power Plant.pptxVisionaize  for Visionaize AI Powered Solution For Thermal Power Plant.pptx
Visionaize for Visionaize AI Powered Solution For Thermal Power Plant.pptx
SumantaBasu12
brightonSEO - Metehan Yesilyurt - Generative AI & GEO: the new SEO race and h...
brightonSEO - Metehan Yesilyurt - Generative AI & GEO: the new SEO race and h...brightonSEO - Metehan Yesilyurt - Generative AI & GEO: the new SEO race and h...
brightonSEO - Metehan Yesilyurt - Generative AI & GEO: the new SEO race and h...
Metehan Yeilyurt
Ch 1 Basic SQL Statement for the data.pptx
Ch 1 Basic SQL Statement for the data.pptxCh 1 Basic SQL Statement for the data.pptx
Ch 1 Basic SQL Statement for the data.pptx
ehzazulhaq
Types_of_Data_Structures_Presentation.pptx
Types_of_Data_Structures_Presentation.pptxTypes_of_Data_Structures_Presentation.pptx
Types_of_Data_Structures_Presentation.pptx
shefalisharma776119
Indian Smm Panel.docxIndian Smm Panel.docx
Indian Smm Panel.docxIndian Smm Panel.docxIndian Smm Panel.docxIndian Smm Panel.docx
Indian Smm Panel.docxIndian Smm Panel.docx
wasifkhan196986
IT Professional Ethics, Moral and Cu.ppt
IT Professional Ethics, Moral and Cu.pptIT Professional Ethics, Moral and Cu.ppt
IT Professional Ethics, Moral and Cu.ppt
FrancisFayiah
Understanding-the-Data-Science-Lifecycle
Understanding-the-Data-Science-LifecycleUnderstanding-the-Data-Science-Lifecycle
Understanding-the-Data-Science-Lifecycle
Ozias Rondon
dOWNLOADED_1_Solar_Thermal_Introduction.pptx
dOWNLOADED_1_Solar_Thermal_Introduction.pptxdOWNLOADED_1_Solar_Thermal_Introduction.pptx
dOWNLOADED_1_Solar_Thermal_Introduction.pptx
WahyuPutraSejati
PPT_OOSE software engineering data .pptx
PPT_OOSE software engineering data .pptxPPT_OOSE software engineering data .pptx
PPT_OOSE software engineering data .pptx
ssuser2d043c
BoSEU25 | Diego de J坦dar | Why User Activation is the Key to Sustainable Growth
BoSEU25 | Diego de J坦dar | Why User Activation is the Key to Sustainable GrowthBoSEU25 | Diego de J坦dar | Why User Activation is the Key to Sustainable Growth
BoSEU25 | Diego de J坦dar | Why User Activation is the Key to Sustainable Growth
Business of Software Conference
Chapter-4-Plane-Wave-Propagation-pdf.pdf
Chapter-4-Plane-Wave-Propagation-pdf.pdfChapter-4-Plane-Wave-Propagation-pdf.pdf
Chapter-4-Plane-Wave-Propagation-pdf.pdf
ShamsAli42
airfare prediction using machine learning
airfare prediction using machine learningairfare prediction using machine learning
airfare prediction using machine learning
bismayabaliarsingh00
AI-vs-Data-Science-Unraveling-the-Tech-Landscape
AI-vs-Data-Science-Unraveling-the-Tech-LandscapeAI-vs-Data-Science-Unraveling-the-Tech-Landscape
AI-vs-Data-Science-Unraveling-the-Tech-Landscape
Ozias Rondon
FOOD LAWS.pptxbshdhdhdhdhdhhdhdhdhdhdhhdh
FOOD LAWS.pptxbshdhdhdhdhdhhdhdhdhdhdhhdhFOOD LAWS.pptxbshdhdhdhdhdhhdhdhdhdhdhhdh
FOOD LAWS.pptxbshdhdhdhdhdhhdhdhdhdhdhhdh
cshdhdhvfsbzdb
BSEO - The Ultimate GA4 Audit - Anna Lewis - Polka Dot Data
BSEO - The Ultimate GA4 Audit - Anna Lewis - Polka Dot DataBSEO - The Ultimate GA4 Audit - Anna Lewis - Polka Dot Data
BSEO - The Ultimate GA4 Audit - Anna Lewis - Polka Dot Data
Anna Lewis
A Simple Introduction to data Science- what is it and what does it do
A Simple Introduction to data Science- what is it and what does it doA Simple Introduction to data Science- what is it and what does it do
A Simple Introduction to data Science- what is it and what does it do
sarah mabrouk
GE-108-LESSON8.pptxbshsnsnsnsnsnsnnsnsnsnsnsbd
GE-108-LESSON8.pptxbshsnsnsnsnsnsnnsnsnsnsnsbdGE-108-LESSON8.pptxbshsnsnsnsnsnsnnsnsnsnsnsbd
GE-108-LESSON8.pptxbshsnsnsnsnsnsnnsnsnsnsnsbd
HarleySamboFavor
Threat Intelligence Platform_ The Future of Cybersecurity Defense.docx
Threat Intelligence Platform_ The Future of Cybersecurity Defense.docxThreat Intelligence Platform_ The Future of Cybersecurity Defense.docx
Threat Intelligence Platform_ The Future of Cybersecurity Defense.docx
dexposewebcast
537116365-Domain-6-Presentation-New.pptx
537116365-Domain-6-Presentation-New.pptx537116365-Domain-6-Presentation-New.pptx
537116365-Domain-6-Presentation-New.pptx
PorshaAbril1
MeasureCamp Belgrade 2025 - Yasen Lilov - Past - Present - Prompt
MeasureCamp Belgrade 2025 - Yasen Lilov - Past - Present - PromptMeasureCamp Belgrade 2025 - Yasen Lilov - Past - Present - Prompt
MeasureCamp Belgrade 2025 - Yasen Lilov - Past - Present - Prompt
Yasen Lilov
Visionaize for Visionaize AI Powered Solution For Thermal Power Plant.pptx
Visionaize  for Visionaize AI Powered Solution For Thermal Power Plant.pptxVisionaize  for Visionaize AI Powered Solution For Thermal Power Plant.pptx
Visionaize for Visionaize AI Powered Solution For Thermal Power Plant.pptx
SumantaBasu12
brightonSEO - Metehan Yesilyurt - Generative AI & GEO: the new SEO race and h...
brightonSEO - Metehan Yesilyurt - Generative AI & GEO: the new SEO race and h...brightonSEO - Metehan Yesilyurt - Generative AI & GEO: the new SEO race and h...
brightonSEO - Metehan Yesilyurt - Generative AI & GEO: the new SEO race and h...
Metehan Yeilyurt
Ch 1 Basic SQL Statement for the data.pptx
Ch 1 Basic SQL Statement for the data.pptxCh 1 Basic SQL Statement for the data.pptx
Ch 1 Basic SQL Statement for the data.pptx
ehzazulhaq
Types_of_Data_Structures_Presentation.pptx
Types_of_Data_Structures_Presentation.pptxTypes_of_Data_Structures_Presentation.pptx
Types_of_Data_Structures_Presentation.pptx
shefalisharma776119
Indian Smm Panel.docxIndian Smm Panel.docx
Indian Smm Panel.docxIndian Smm Panel.docxIndian Smm Panel.docxIndian Smm Panel.docx
Indian Smm Panel.docxIndian Smm Panel.docx
wasifkhan196986
IT Professional Ethics, Moral and Cu.ppt
IT Professional Ethics, Moral and Cu.pptIT Professional Ethics, Moral and Cu.ppt
IT Professional Ethics, Moral and Cu.ppt
FrancisFayiah
Understanding-the-Data-Science-Lifecycle
Understanding-the-Data-Science-LifecycleUnderstanding-the-Data-Science-Lifecycle
Understanding-the-Data-Science-Lifecycle
Ozias Rondon
dOWNLOADED_1_Solar_Thermal_Introduction.pptx
dOWNLOADED_1_Solar_Thermal_Introduction.pptxdOWNLOADED_1_Solar_Thermal_Introduction.pptx
dOWNLOADED_1_Solar_Thermal_Introduction.pptx
WahyuPutraSejati
PPT_OOSE software engineering data .pptx
PPT_OOSE software engineering data .pptxPPT_OOSE software engineering data .pptx
PPT_OOSE software engineering data .pptx
ssuser2d043c
BoSEU25 | Diego de J坦dar | Why User Activation is the Key to Sustainable Growth
BoSEU25 | Diego de J坦dar | Why User Activation is the Key to Sustainable GrowthBoSEU25 | Diego de J坦dar | Why User Activation is the Key to Sustainable Growth
BoSEU25 | Diego de J坦dar | Why User Activation is the Key to Sustainable Growth
Business of Software Conference
Chapter-4-Plane-Wave-Propagation-pdf.pdf
Chapter-4-Plane-Wave-Propagation-pdf.pdfChapter-4-Plane-Wave-Propagation-pdf.pdf
Chapter-4-Plane-Wave-Propagation-pdf.pdf
ShamsAli42
airfare prediction using machine learning
airfare prediction using machine learningairfare prediction using machine learning
airfare prediction using machine learning
bismayabaliarsingh00
AI-vs-Data-Science-Unraveling-the-Tech-Landscape
AI-vs-Data-Science-Unraveling-the-Tech-LandscapeAI-vs-Data-Science-Unraveling-the-Tech-Landscape
AI-vs-Data-Science-Unraveling-the-Tech-Landscape
Ozias Rondon

Privacy Preserving Log File Processing in Mobile Network Environment

  • 1. 1 息 Nokia Solutions and Networks 2014 Privacy Preserving Log File Processing in Mobile Network Environment Shankar Lal 16-06-2015
  • 2. 2 息 Nokia Solutions and Networks 2014 Presentation outline Introduction and background review Cases of privacy breach Statistical analysis over Network trace Continuous fields anonymisation through Differential Privacy Discrete fields anonymisation through -diversity IP address anonymisation Future work and conclusion
  • 3. 3 息 Nokia Solutions and Networks 2014 Introduction and Objectives of this work
  • 4. 4 息 Nokia Solutions and Networks 2014 Background review Data Privacy Need of privacy in user data Sharing of network trace data Tradeoff between data utility and data privacy
  • 5. 5 息 Nokia Solutions and Networks 2014 Privacy Laws PII (Personally Identifying Information) US privacy law Personal Data EU Data protection Directive
  • 6. 6 息 Nokia Solutions and Networks 2014 IP address as Personal Data Arguments on both sides EU consider it personal (UK is exception) US consider it non-personal
  • 7. 7 息 Nokia Solutions and Networks 2014 Cases of privacy breach from anonymised data sets
  • 8. 8 息 Nokia Solutions and Networks 2014 There's No Such Thing As An Anonymized Dataset
  • 9. 9 息 Nokia Solutions and Networks 2014 Netflix anonymous data set and user privacy breach
  • 10. 10 息 Nokia Solutions and Networks 2014 AOL anonymous data set of user queries
  • 11. 11 息 Nokia Solutions and Networks 2014 Identification of medical record of former governor of Massachusetts William Weld Former governor of Massachusetts
  • 12. 12 息 Nokia Solutions and Networks 2014 Statistical analysis over Network traces
  • 13. 13 息 Nokia Solutions and Networks 2014 Sample of a Network Log file
  • 14. 14 息 Nokia Solutions and Networks 2014 Statistical Analysis on network trace I
  • 15. 15 息 Nokia Solutions and Networks 2014 Statistical Analysis on network trace II Most used protocols Most used packet lengths Source and destination IP class count IP class packet length distribution
  • 16. 16 息 Nokia Solutions and Networks 2014 Functional dependencies between fields
  • 17. 17 息 Nokia Solutions and Networks 2014 Why packet length and timestamp fields are sensitive? Certain security incidents have fixed packet length Slammer worm 404 bytes Nachi worm 92 bytes Timestamp along with IP address reveals communication existed between parties.
  • 18. 18 息 Nokia Solutions and Networks 2014 Privatizing network trace
  • 19. 19 息 Nokia Solutions and Networks 2014 Privacy Enhancing Technologies (PETs) Hashing Encryption Randomization and Tokenization k-anonymity New Inclusions: Differential Privacy ≒-diversity
  • 20. 20 息 Nokia Solutions and Networks 2014 k-anonymity Main idea: Generalization Suppression Perturbation
  • 21. 21 息 Nokia Solutions and Networks 2014 Example on network data set Sample Data set 2-anonymous data set
  • 22. 22 息 Nokia Solutions and Networks 2014 Differential Privacy: Anonymisation of continuous fields
  • 23. 23 息 Nokia Solutions and Networks 2014 Differential Privacy Differential privacy algorithm states that probability that data set D1 produces output C is very close to the probability of data set D2 producing same output. Laplace noise calculation: Scale parameter b = f/ 狼 Mean 亮 =0 f =sensitivity of the function 狼= Privacy parameter Probability density plots of Laplace distributions
  • 24. 24 息 Nokia Solutions and Networks 2014 Noise addition through Differential Privacy Original Distribution 狼 =0.01狼 =0.1 Packet length field
  • 25. 25 息 Nokia Solutions and Networks 2014 Noise addition through Differential Privacy 狼 =0.01狼 =0.1Original Distribution Timestamp field
  • 26. 26 息 Nokia Solutions and Networks 2014 Comparison between original and noisy data Packet Length Time stamp
  • 27. 27 息 Nokia Solutions and Networks 2014 -diversity: Anonymisation of discrete fields
  • 28. 28 息 Nokia Solutions and Networks 2014 -diversity A q-block is -diverse if contains at least well-represented values for the sensitive attribute (in other words, diversity in the sensitive attributes).
  • 29. 29 息 Nokia Solutions and Networks 2014 Example on network data set Sample Data set 3-diverse Data set
  • 30. 30 息 Nokia Solutions and Networks 2014 -diversity technique <Change information classification in footer>
  • 31. 31 息 Nokia Solutions and Networks 2014 Equivalence class creation Equivalence class name Protocol name Protocol name Protocol name Protocol name Transport Protocols TCP UDP * * Management Protocols DNS ICMP DHCP ARP Security Protocols TLS SSL SSH HTTPS Mobile Networks Protocols SSMP GTP GTPv2 UCP Other Protocols * * * *
  • 32. 32 息 Nokia Solutions and Networks 2014 5-diverse data set <Change information classification in footer>
  • 33. 33 息 Nokia Solutions and Networks 2014 Other Noise addition techniques
  • 34. 34 息 Nokia Solutions and Networks 2014 Zero Mean noise addition
  • 35. 35 息 Nokia Solutions and Networks 2014 Noise addition by summing LSBs technique Example: 1414 1414+9= 1423 LSBs
  • 36. 36 息 Nokia Solutions and Networks 2014 IP address Anonymisation
  • 37. 37 息 Nokia Solutions and Networks 2014 Anonymising IP addresses Method: 1. Last octet Obfuscation Method: 2. Transformation to IP class Goal is to anonymise IP addresses but also preserve network topology information
  • 38. 38 息 Nokia Solutions and Networks 2014 Final Anonymised data set
  • 39. 39 息 Nokia Solutions and Networks 2014 Anonymised network trace <Change information classification in footer>
  • 40. 40 息 Nokia Solutions and Networks 2014 Conclusion and Future Work
  • 41. 41 息 Nokia Solutions and Networks 2014 Conclusion Preserving user privacy in a network trace. Analyzing Functional dependencies between the fields. Packet length and timestamp anonymisation by Differential Privacy and -diversity technique. Deciding the best values of privacy parameter 竜 IP addresses anonymisation by last octet obfuscation method .
  • 42. 42 息 Nokia Solutions and Networks 2014 Future work Framework for calculating best value of epsilon Re-identification testing Feature extraction/Clustering Anomaly detection/Malware Analysis <Change information classification in footer>
  • 43. 43 息 Nokia Solutions and Networks 2014 Thank you Questions?