2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007 2007
DOI: 10.1109/seccom.2007.4550304
|View full text |Cite
|
Sign up to set email alerts
|

Flexible and high-performance anonymization of NetFlow records using anontool

Abstract: Abstract-Netflow is a protocol widely adopted by the security and performance measurements community. Nowadays, many distributed applications and architectures base their functionality on Netflow data collected at diverse environments. However, communities and administrators are reluctant to share exported Netflow data for privacy reasons. As a consequence, the effectiveness of distributed approaches is limited due to lack of input data. To overcome this limitation, anonymization on Netflow data is proposed fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Work in data sanitization for computer and network logs to date has focused almost entirely upon development of tools [20,9,27,13,5,17] and anonymization algorithms [26], with little to no work doing any formal analysis of the effects of anonymization. This is an important aspect missing from the research body since without it, we just have a lot of tools to haphazardly anonymize data without knowing how to do it wisely or effectively.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Work in data sanitization for computer and network logs to date has focused almost entirely upon development of tools [20,9,27,13,5,17] and anonymization algorithms [26], with little to no work doing any formal analysis of the effects of anonymization. This is an important aspect missing from the research body since without it, we just have a lot of tools to haphazardly anonymize data without knowing how to do it wisely or effectively.…”
Section: Related Workmentioning
confidence: 99%
“…The burgeoning field of data sanitization has helped address this tension by providing organizations, who wish to share their data, with new tools to anonymize computer and network logs [4,5,12,16,18,20,21,22,22,26,27]. However, little has been done to help users negotiate the difficult trade-off between the data owner's need for security and privacy, and the data analyst's need for high quality data-what is called the utility vs. security trade-off [20].…”
Section: Introductionmentioning
confidence: 99%
“…In the context of anonymization of network traces, as surveyed in Reference [37], many solutions have been proposed [1][2][3][22][23][24][25][26][27][28][29]. In Figure 23, we have summarized the scope (e.g., accepted input data, anonymization fields, etc.)…”
Section: Related Workmentioning
confidence: 99%
“…This technique was implemented in the Crypto-PAn [5] tool. The Anontool allows perfield anonymization and provides various anonymization algorithms [6]. The FLAIM anonymization tool has an application program interface [4].…”
Section: Introductionmentioning
confidence: 99%