2006 IEEE International Conference on Communications 2006
DOI: 10.1109/icc.2006.255113
|View full text |Cite
|
Sign up to set email alerts
|

A Generic Anonymization Framework for Network Traffic

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0
1

Year Published

2007
2007
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(26 citation statements)
references
References 11 publications
0
25
0
1
Order By: Relevance
“…Its functionality is based on the Anonymization API (AAPI), described thoroughly in [15]. AAPI allows a user to write his own anonymization applications.…”
Section: Anontoolmentioning
confidence: 99%
“…Its functionality is based on the Anonymization API (AAPI), described thoroughly in [15]. AAPI allows a user to write his own anonymization applications.…”
Section: Anontoolmentioning
confidence: 99%
“…Privacy protection in network monitoring is typically thought of as the anonymisation of traffic traces, an area where several works have been proposed [17][18] [19][20] [21]. Although such frameworks are aimed to be quite generic, a significant drawback is that they base on quite "static" anonymisation policies specification; in all cases, the policies that will regulate the execution of the underlying anonymisation APIs must be defined in an explicit manner.…”
Section: Related Workmentioning
confidence: 99%
“…Over the past decade, there has been a marked increase in the number of proposals for anonymizing network data (e.g., [16,12,31,26,25,10]). For the most part, these works attempt to sanitize network data by applying various transformations to fields within packet headers (e.g., using prefix-preserving anonymization [25]), by using domain knowledge to search for specific patterns (such as URLs or bytecode) using regular expressions [17,11,26], by shuffling payloads while preserving the ability to search for short substrings [27], or by deleting the payloads altogether.…”
Section: Related Workmentioning
confidence: 99%