Abstract
Real world traffic traces are important for Internet research, but public available traffic traces are rare for privacy concerns. IP address anonymization may serve to avoid privacy issues. There are many IP address anonymization schemes according to different requirements and trustworthy levels of the expected users. However, anonymized traces often have to address several groups of researchers at the same time, each with a distinct trustworthy level. Previously known IP address anonymization schemes have to be applied separately to form multiple copies each corresponding to a scheme. In this paper, we propose a scheme which will anonymize the original trace into one single trace, and with different knowledge (secret key) users may recover different traces from it.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
McGregor, T., Braun, H., Brown, J.: The NLANR network analysis infrastructure. IEEE Communications Magazine 38(5), 122–128 (2000)
The Internet traffic archive (April 2000), http://ita.ee.lbl.gov/
Peuhkuri, M.: A Method to Compress and Anonymize Packet Traces. In: SIGCOMM IMW (2001)
Pang, R., Paxson, V.: A high-level programming environment for packet trace anonymization and transformation. In: SIGCOMM (2003)
Slagell, A., Yurcik, W.: Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization. In: SECOVAL: The Workshop on the Value of Security through Collaboration, held in conjunction with SecureComm, Athens, Greece (September 2005)
Li, Y., Slagell, A., Luo, K., Yurcik, W.: CANINE: A Combined Converter and Anonymizer Tool for Processing NetFlows for Security. In: International Conference on Telecommunication Systems - Modeling and Analysis (ICTSM), Dallas, Texas, November 17-20 (2005)
Minshall, G.: TCPdpriv Command Manual (1996)
Cho, K., Mitsuya, K., Kato, A.: Traffic data repository at the wide project. In: Proceedings of USENIX 2000 Annual Technical Conference: FREENIX Track, San Diego, CA (June 2000)
Xu, J., Fan, J., Ammar, M.H., Moon, S.B.: On the design and performance of prefix-preserving IP traffic trace anonymization. In: SIGCOMM IMW (2001)
Slagell, A., Wang, J., Yurcik, W.: Network Log Anonymization: Application of Crypto-PAn to Cisco NetFlows. In: Secure Knowledge Management Workshop, Buffalo, NY (2004)
Xu, J., Fan, J., Ammar, M.H., Moon, S.B.: Prefix-preserving IP address anonymization: measurement based security evaluation and a new cryptography-based scheme. In: ICNP (2002)
Daemen, J., Rijmen, V.: AES proposal: Rijndael, Tech. Rep., Computer Security Resource Center, National Institute of Standards and Technology (February 2001), http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf
Krawczyk, H., Bellare, M., Canetti, R.: RFC 2104: HMAC: Keyed-Hashing for Message Authentication (February 1997)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, p. 269. CRC Press, New York (1997)
Ylonen, T.: Thoughts on how to mount an attack on tpcpdriv’s ”-50” option. In: TCPpdpriv source distribution (1996)
Zalewski, M.: http://lcamtuf.coredump.cx/p0f.shtml
Fyodor: nmap manual page, http://www.insecure.org/nmap/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, Q., Li, X. (2006). An IP Address Anonymization Scheme with Multiple Access Levels. In: Chong, I., Kawahara, K. (eds) Information Networking. Advances in Data Communications and Wireless Networks. ICOIN 2006. Lecture Notes in Computer Science, vol 3961. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11919568_79
Download citation
DOI: https://doi.org/10.1007/11919568_79
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48563-6
Online ISBN: 978-3-540-48564-3
eBook Packages: Computer ScienceComputer Science (R0)