Skip to main content

An IP Address Anonymization Scheme with Multiple Access Levels

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3961))

Abstract

Real world traffic traces are important for Internet research, but public available traffic traces are rare for privacy concerns. IP address anonymization may serve to avoid privacy issues. There are many IP address anonymization schemes according to different requirements and trustworthy levels of the expected users. However, anonymized traces often have to address several groups of researchers at the same time, each with a distinct trustworthy level. Previously known IP address anonymization schemes have to be applied separately to form multiple copies each corresponding to a scheme. In this paper, we propose a scheme which will anonymize the original trace into one single trace, and with different knowledge (secret key) users may recover different traces from it.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McGregor, T., Braun, H., Brown, J.: The NLANR network analysis infrastructure. IEEE Communications Magazine 38(5), 122–128 (2000)

    Article  Google Scholar 

  2. The Internet traffic archive (April 2000), http://ita.ee.lbl.gov/

  3. Peuhkuri, M.: A Method to Compress and Anonymize Packet Traces. In: SIGCOMM IMW (2001)

    Google Scholar 

  4. Pang, R., Paxson, V.: A high-level programming environment for packet trace anonymization and transformation. In: SIGCOMM (2003)

    Google Scholar 

  5. Slagell, A., Yurcik, W.: Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization. In: SECOVAL: The Workshop on the Value of Security through Collaboration, held in conjunction with SecureComm, Athens, Greece (September 2005)

    Google Scholar 

  6. Li, Y., Slagell, A., Luo, K., Yurcik, W.: CANINE: A Combined Converter and Anonymizer Tool for Processing NetFlows for Security. In: International Conference on Telecommunication Systems - Modeling and Analysis (ICTSM), Dallas, Texas, November 17-20 (2005)

    Google Scholar 

  7. Minshall, G.: TCPdpriv Command Manual (1996)

    Google Scholar 

  8. Cho, K., Mitsuya, K., Kato, A.: Traffic data repository at the wide project. In: Proceedings of USENIX 2000 Annual Technical Conference: FREENIX Track, San Diego, CA (June 2000)

    Google Scholar 

  9. Xu, J., Fan, J., Ammar, M.H., Moon, S.B.: On the design and performance of prefix-preserving IP traffic trace anonymization. In: SIGCOMM IMW (2001)

    Google Scholar 

  10. Slagell, A., Wang, J., Yurcik, W.: Network Log Anonymization: Application of Crypto-PAn to Cisco NetFlows. In: Secure Knowledge Management Workshop, Buffalo, NY (2004)

    Google Scholar 

  11. Xu, J., Fan, J., Ammar, M.H., Moon, S.B.: Prefix-preserving IP address anonymization: measurement based security evaluation and a new cryptography-based scheme. In: ICNP (2002)

    Google Scholar 

  12. Daemen, J., Rijmen, V.: AES proposal: Rijndael, Tech. Rep., Computer Security Resource Center, National Institute of Standards and Technology (February 2001), http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf

  13. Krawczyk, H., Bellare, M., Canetti, R.: RFC 2104: HMAC: Keyed-Hashing for Message Authentication (February 1997)

    Google Scholar 

  14. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, p. 269. CRC Press, New York (1997)

    MATH  Google Scholar 

  15. Ylonen, T.: Thoughts on how to mount an attack on tpcpdriv’s ”-50” option. In: TCPpdpriv source distribution (1996)

    Google Scholar 

  16. Zalewski, M.: http://lcamtuf.coredump.cx/p0f.shtml

  17. Fyodor: nmap manual page, http://www.insecure.org/nmap/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Q., Li, X. (2006). An IP Address Anonymization Scheme with Multiple Access Levels. In: Chong, I., Kawahara, K. (eds) Information Networking. Advances in Data Communications and Wireless Networks. ICOIN 2006. Lecture Notes in Computer Science, vol 3961. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11919568_79

Download citation

  • DOI: https://doi.org/10.1007/11919568_79

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48563-6

  • Online ISBN: 978-3-540-48564-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics