2017
DOI: 10.1016/j.cosrev.2017.07.001
|View full text |Cite
|
Sign up to set email alerts
|

Privacy issues in intrusion detection systems: A taxonomy, survey and future directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(10 citation statements)
references
References 8 publications
0
9
0
1
Order By: Relevance
“…ProDiscover is designed to be a single application allowing forensics examiners to collect, analyze, manage, and report on computer disk evidence 7 . It simplifies computer forensics case management.…”
Section: Prodiscover Basicmentioning
confidence: 99%
See 1 more Smart Citation
“…ProDiscover is designed to be a single application allowing forensics examiners to collect, analyze, manage, and report on computer disk evidence 7 . It simplifies computer forensics case management.…”
Section: Prodiscover Basicmentioning
confidence: 99%
“…The attack lasted for three weeks, disrupting emails, real estate sales, water bills, health alerts, and several other services. The annual cost of suffering is increasing rapidly; in fact, the experts have projected it to rise to $6 trillion by 2021 1 [5], [6], [7]. Computer forensics techniques are used in civil, administrative, and criminal cases; however, an intelligent selection of tools is vital in criminal investigations.…”
Section: Introductionmentioning
confidence: 99%
“…For example, where anonymity is required, anonymous broadcast communications may be necessary even at the expense that these communications can be spoofed or even replayed. Similarly, intrusion detection systems often parse raw and if possible unencrypted data [18]. Access to such systems inevitably leads accessing data that may contain personal communications or otherwise critical communications (e.g., business affairs).…”
Section: Privacy Considerations For Marine Network Protocolsmentioning
confidence: 99%
“…When data is distributed, preserving privacy becomes more challenging. Some of the statistical disclosure control techniques which address risks related to data disclosure [17] and privacy-preserving techniques in the frame of signature-based detection are not really foolproof [18]. In order to preserve data privacy, it becomes imperative to address the issues concerning the balance between false-negative rate, false-positive rate, recall, precision and performance [19].…”
Section: Introductionmentioning
confidence: 99%