privacy preserving log file processing in mobile network environment

44
1 © Nokia Solutions and Networks 2014 Privacy Preserving Log File Processing in Mobile Network Environment Shankar Lal 16-06-2015

Upload: shankar-lal

Post on 26-Jan-2017

364 views

Category:

Data & Analytics


1 download

TRANSCRIPT

Page 1: Privacy Preserving Log File Processing in Mobile Network Environment

1 © Nokia Solutions and Networks 2014

Privacy Preserving Log File Processing in Mobile Network EnvironmentShankar Lal16-06-2015

Page 2: Privacy Preserving Log File Processing in Mobile Network Environment

2 © Nokia Solutions and Networks 2014

Presentation outline•Introduction and background review•Cases of privacy breach•Statistical analysis over Network trace•Continuous fields anonymisation through Differential Privacy•Discrete fields anonymisation through ℓ-diversity•IP address anonymisation•Future work and conclusion

Page 3: Privacy Preserving Log File Processing in Mobile Network Environment

3 © Nokia Solutions and Networks 2014

Introduction and Objectives of this work

Page 4: Privacy Preserving Log File Processing in Mobile Network Environment

4 © Nokia Solutions and Networks 2014

Background review

•Data Privacy

•Need of privacy in user data

•Sharing of network trace data

•Tradeoff between data utility and data privacy

Page 5: Privacy Preserving Log File Processing in Mobile Network Environment

5 © Nokia Solutions and Networks 2014

Privacy Laws

•PII (Personally Identifying Information) US privacy law

•Personal Data EU Data protection Directive

Page 6: Privacy Preserving Log File Processing in Mobile Network Environment

6 © Nokia Solutions and Networks 2014

IP address as Personal Data

•Arguments on both sides

•EU consider it personal (UK is exception)

•US consider it non-personal

Page 7: Privacy Preserving Log File Processing in Mobile Network Environment

7 © Nokia Solutions and Networks 2014

Cases of privacy breach from anonymised data sets

Page 8: Privacy Preserving Log File Processing in Mobile Network Environment

8 © Nokia Solutions and Networks 2014

There's No Such Thing As An Anonymized Dataset

Page 9: Privacy Preserving Log File Processing in Mobile Network Environment

9 © Nokia Solutions and Networks 2014

Netflix anonymous data set and user privacy breach

Page 10: Privacy Preserving Log File Processing in Mobile Network Environment

10 © Nokia Solutions and Networks 2014

AOL anonymous data set of user queries

Page 11: Privacy Preserving Log File Processing in Mobile Network Environment

11 © Nokia Solutions and Networks 2014

Identification of medical record of former governor of Massachusetts

William WeldFormer governor of Massachusetts

Page 12: Privacy Preserving Log File Processing in Mobile Network Environment

12 © Nokia Solutions and Networks 2014

Statistical analysis over Network traces

Page 13: Privacy Preserving Log File Processing in Mobile Network Environment

13 © Nokia Solutions and Networks 2014

Sample of a Network Log file

Page 14: Privacy Preserving Log File Processing in Mobile Network Environment

14 © Nokia Solutions and Networks 2014

Statistical Analysis on network trace I

Page 15: Privacy Preserving Log File Processing in Mobile Network Environment

15 © Nokia Solutions and Networks 2014

Statistical Analysis on network trace II

Most used protocols

Most used packet lengths

Source and destination IP class count

IP class packet length distribution

Page 16: Privacy Preserving Log File Processing in Mobile Network Environment

16 © Nokia Solutions and Networks 2014

Functional dependencies between fields

Page 17: Privacy Preserving Log File Processing in Mobile Network Environment

17 © Nokia Solutions and Networks 2014

Why packet length and timestamp fields are sensitive?

Certain security incidents have fixed packet length

• Slammer worm 404 bytes • Nachi worm 92 bytes

Timestamp along with IP address reveals communication existed between parties.

Page 18: Privacy Preserving Log File Processing in Mobile Network Environment

18 © Nokia Solutions and Networks 2014

Privatizing network trace

Page 19: Privacy Preserving Log File Processing in Mobile Network Environment

19 © Nokia Solutions and Networks 2014

Privacy Enhancing Technologies (PETs)•Hashing•Encryption•Randomization and Tokenization•k-anonymity

New Inclusions:•Differential Privacy•ℓ-diversity

Page 20: Privacy Preserving Log File Processing in Mobile Network Environment

20 © Nokia Solutions and Networks 2014

k-anonymityMain idea: Generalization Suppression Perturbation

Page 21: Privacy Preserving Log File Processing in Mobile Network Environment

21 © Nokia Solutions and Networks 2014

Example on network data set

Sample Data set 2-anonymous data set

Page 22: Privacy Preserving Log File Processing in Mobile Network Environment

22 © Nokia Solutions and Networks 2014

Differential Privacy: Anonymisation of continuous fields

Page 23: Privacy Preserving Log File Processing in Mobile Network Environment

23 © Nokia Solutions and Networks 2014

Differential PrivacyDifferential privacy algorithm states that probability that dataset D1 produces output C is very close to the probability ofdata set D2 producing same output.

Laplace noise calculation: Scale parameter b = Δ f/ ϵ

Mean μ =0

Δ f =sensitivity of the functionϵ= Privacy parameter

Probability density plots of Laplace distributions

Page 24: Privacy Preserving Log File Processing in Mobile Network Environment

24 © Nokia Solutions and Networks 2014

Noise addition through Differential Privacy

Original Distribution ϵ =0.01ϵ =0.1

Packet length field

Page 25: Privacy Preserving Log File Processing in Mobile Network Environment

25 © Nokia Solutions and Networks 2014

Noise addition through Differential Privacy

ϵ =0.01ϵ =0.1Original Distribution

Timestamp field

Page 26: Privacy Preserving Log File Processing in Mobile Network Environment

26 © Nokia Solutions and Networks 2014

Comparison between original and noisy data

Packet Length Time stamp

Page 27: Privacy Preserving Log File Processing in Mobile Network Environment

27 © Nokia Solutions and Networks 2014

ℓ-diversity: Anonymisation of discrete fields

Page 28: Privacy Preserving Log File Processing in Mobile Network Environment

28 © Nokia Solutions and Networks 2014

ℓ-diversityA q-block is ℓ-diverse if contains at least ℓ “well-represented” values for the sensitive attribute (in other words, diversity in the sensitive attributes).

Page 29: Privacy Preserving Log File Processing in Mobile Network Environment

29 © Nokia Solutions and Networks 2014

Example on network data set

Sample Data set 3-diverse Data set

Page 30: Privacy Preserving Log File Processing in Mobile Network Environment

30 © Nokia Solutions and Networks 2014

ℓ-diversity technique

<Change information classification in footer>

Page 31: Privacy Preserving Log File Processing in Mobile Network Environment

31 © Nokia Solutions and Networks 2014

Equivalence class creation

Equivalence class name

Protocol name

Protocol name

Protocol name

Protocol name

Transport Protocols

TCP UDP * *

ManagementProtocols

DNS ICMP DHCP ARP

Security Protocols

TLS SSL SSH HTTPS

Mobile Networks Protocols

SSMP GTP GTPv2 UCP

Other Protocols

* * * *

Page 32: Privacy Preserving Log File Processing in Mobile Network Environment

32 © Nokia Solutions and Networks 2014

5-diverse data set

<Change information classification in footer>

Page 33: Privacy Preserving Log File Processing in Mobile Network Environment

33 © Nokia Solutions and Networks 2014

Other Noise addition techniques

Page 34: Privacy Preserving Log File Processing in Mobile Network Environment

34 © Nokia Solutions and Networks 2014

Zero Mean noise addition

Page 35: Privacy Preserving Log File Processing in Mobile Network Environment

35 © Nokia Solutions and Networks 2014

Noise addition by summing LSBs technique

Example: 1414 1414+9= 1423

LSBs

Page 36: Privacy Preserving Log File Processing in Mobile Network Environment

36 © Nokia Solutions and Networks 2014

IP address Anonymisation

Page 37: Privacy Preserving Log File Processing in Mobile Network Environment

37 © Nokia Solutions and Networks 2014

Anonymising IP addresses

Method: 1. Last octet Obfuscation Method: 2. Transformation to IP class

Goal is to anonymise IP addresses but also preserve network topology information

Page 38: Privacy Preserving Log File Processing in Mobile Network Environment

38 © Nokia Solutions and Networks 2014

Final Anonymised data set

Page 39: Privacy Preserving Log File Processing in Mobile Network Environment

39 © Nokia Solutions and Networks 2014

Anonymised network trace

<Change information classification in footer>

Page 40: Privacy Preserving Log File Processing in Mobile Network Environment

40 © Nokia Solutions and Networks 2014

Conclusion and Future Work

Page 41: Privacy Preserving Log File Processing in Mobile Network Environment

41 © Nokia Solutions and Networks 2014

Conclusion

•Preserving user privacy in a network trace.•Analyzing Functional dependencies between the fields.•Packet length and timestamp anonymisation by Differential Privacy and ℓ-diversity technique.•Deciding the best values of privacy parameter ε •IP addresses anonymisation by last octet obfuscation method

.

Page 42: Privacy Preserving Log File Processing in Mobile Network Environment

42 © Nokia Solutions and Networks 2014

Future work

•Framework for calculating best value of epsilon

•Re-identification testing

•Feature extraction/Clustering

•Anomaly detection/Malware Analysis

<Change information classification in footer>

Page 43: Privacy Preserving Log File Processing in Mobile Network Environment

43 © Nokia Solutions and Networks 2014

Thank you

Questions?

Page 44: Privacy Preserving Log File Processing in Mobile Network Environment