Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme

Cited 52 time in webofscience Cited 0 time in scopus
  • Hit : 1038
  • Download : 156
DC FieldValueLanguage
dc.contributor.authorFan, JLko
dc.contributor.authorXu, Jko
dc.contributor.authorAmmar, MHko
dc.contributor.authorMoon, Sue Bokko
dc.date.accessioned2008-02-22T07:56:35Z-
dc.date.available2008-02-22T07:56:35Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2004-10-
dc.identifier.citationCOMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.46, no.2, pp.253 - 272-
dc.identifier.issn1389-1286-
dc.identifier.urihttp://hdl.handle.net/10203/3161-
dc.description.abstractReal-world traffic traces are crucial for Internet research, but only a very small percentage of traces collected are made public. One major reason why traffic trace owners hesitate to make the traces publicly available is the concern that confidential and private information may be inferred from the trace. In this paper we focus on the problem of anonymizing IP addresses in a trace. More specifically, we are interested in prefix-preserving anonymization in which the prefix relationship among IP addresses is preserved in the anonymized trace, making such a trace usable in situations where prefix relationships are important. The goal of our work is two fold. First, we develop a cryptography-based, prefix-preserving anonymization technique that is provably as secure as the existing well-known TCPdpriv scheme, and unlike TCPdpriv, provides consistent prefix-preservation in large scale distributed setting. Second, we evaluate the security properties inherent in all prefix-preserving IP address anonymization schemes (including TCPdpriv). Through the analysis of Internet backbone traffic traces, we investigate the effect of some types of attacks on the security of any prefix-preserving anonymization algorithm. We also derive results for the optimum manner in which an attack should proceed, which provides a bound on the effectiveness of attacks in general. (C) 2004 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherELSEVIER SCIENCE BV-
dc.titlePrefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme-
dc.typeArticle-
dc.identifier.wosid000224147000007-
dc.identifier.scopusid2-s2.0-4444266989-
dc.type.rimsART-
dc.citation.volume46-
dc.citation.issue2-
dc.citation.beginningpage253-
dc.citation.endingpage272-
dc.citation.publicationnameCOMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING-
dc.identifier.doi10.1016/j.comnet.2004.03.033-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorMoon, Sue Bok-
dc.contributor.nonIdAuthorFan, JL-
dc.contributor.nonIdAuthorXu, J-
dc.contributor.nonIdAuthorAmmar, MH-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorprefix-preserving address anonymization-
dc.subject.keywordAuthorTCPdpriv-
dc.subject.keywordAuthorcryptography-based anonymization-
dc.subject.keywordAuthortraffic measurement-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorprivacy-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 52 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0