2006
DOI: 10.1007/11767831_12
|View full text |Cite
|
Sign up to set email alerts
|

Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(40 citation statements)
references
References 9 publications
0
35
0
Order By: Relevance
“…users. However, prefix-preserving schemes [6], [7] are used in permutation, i.e. if an IP address a.b.c.d is permuted to w.x.y.z then another IP address a.b.c.d is mapped to w.x.y.z.…”
Section: Overview Of Yahoo! Datasetsmentioning
confidence: 99%
“…users. However, prefix-preserving schemes [6], [7] are used in permutation, i.e. if an IP address a.b.c.d is permuted to w.x.y.z then another IP address a.b.c.d is mapped to w.x.y.z.…”
Section: Overview Of Yahoo! Datasetsmentioning
confidence: 99%
“…These techniques ensure that subnet of the anonymized address match too. They are considered weak and prone to attacks [16] For these reasons, good encryption techniques are to be chosen for data anonymization that preserve the length and formats of the data fields too.…”
Section: ) Preserving Lengths and Formatsmentioning
confidence: 99%
“…However, those techniques proved to be ineffective, since an adversary might be able to re-identify message source and destination by other values in a network flow, or in a sequence of flows (see, e.g., [3], [8], [9], [10]). King et al in [2] propose an extensive taxonomy of attacks against network flow sanitization methods; techniques fall into two main categories:…”
Section: Related Workmentioning
confidence: 99%
“…Roughly speaking, defenses that can be found in the literature (e.g., [3], [4] among many others) take a "reactionary" approach: typically, in those works, a new kind of attack is identified, and a defense technique is proposed for that attack, which is generally based on the permutation/generalization of some fields' values. However, proposed techniques do not provide a general solution.…”
Section: A Defenses Tailored To Network Flowsmentioning
confidence: 99%
See 1 more Smart Citation