skip to main content
10.1145/2663876.2663886acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Critter: Content-Rich Traffic Trace Repository

Published:03 November 2014Publication History

ABSTRACT

Access to current application and network data is vital to cybersecurity and networking research. Intrusion detection, steganography, traffic camouflaging, traffic classification and modeling all benefit from real-world data. Such data provides training, testing, and evaluation as well as furthers efforts to reach ground truth. Currently available network data--especially data with application-level information--is often outdated and is either private or customized to specific, narrow research needs. The biggest hurdle to obtaining such content-rich data is addressing the huge privacy risks associated with sharing such complex and open-ended data. In this paper we present a data sharing system called Critter-at-Home which addresses these challenges. Critter connects end-users willing to share data with researchers and strikes a balance between privacy risks for a data contributor and utility for a researcher.

References

  1. S. Hansell, "AOL removes search data on vast group of web users.," New York Times, August 2006.Google ScholarGoogle Scholar
  2. A. Narayanan and V. Shmatikov, "Robust De-anonymization of Large Sparse Datasets," in Proceedings of IEEE Security and Privacy 2008, pp. "111--125", IEEE, May 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Sweeney, "Weaving technology and policy together to maintain confidentiality," in "Journal of Law, Medicine and Ethics", vol. 25, pp. 98--110, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  4. J. Xu, J. Fan, M. H. Ammar, , and S. B. Moon, "Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based Scheme," in Proceedings of the IEEE International Conference on Network Protocols, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu, "Statistical Identification ofEncrypted Web Browsing Traffic," in Proceedings of the IEEE Symposium on Security and Privacy, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. Kohno, A. Broido, and kc Claffy, "Remote Physical Device Fingerprinting," in Proceedings of the IEEE Symposium on Security and Privacy, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter, "Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces," in Proceedings of the Network and Distributed System Security Symposium, February 2007.Google ScholarGoogle Scholar
  8. "LANDER: Los Angeles Network Data Exchange and Repository." http://www.isi.edu/ant/lander/.Google ScholarGoogle Scholar
  9. R. International, "PREDICT Project Web Page." http://www.predict.org.Google ScholarGoogle Scholar
  10. J. Mirkovic, "Privacy-Safe Network Trace Sharing via Secure Queries," in Proceedings of ACM CCS Workshop on Network Data Anonymization, October 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Dingledine, N. Mathewson, and P. Syverson, "Tor: the second-generation onion router," in Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, SSYM'04, (Berkeley, CA, USA), pp. 21--21, USENIX Association, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. "Tor Project: Anonymity Online." https://www.torproject.org/.Google ScholarGoogle Scholar
  13. "Request for comments: 1928." https://www.ietf.org/rfc/rfc1928.txt.Google ScholarGoogle Scholar
  14. S. Gebert, R. Pries, D. Schlosser, and K. Heck, "Internet access traffic measurement and analysis," in Proceedings of the 4th International Conference on Traffic Monitoring and Analysis, TMA'12, (Berlin, Heidelberg), pp. 29--42, Springer-Verlag, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Sweeney, "k-anonymity: a model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557--570, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. "pyinstaller." http://www.pyinstaller.org/.Google ScholarGoogle Scholar
  17. R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization," ACM SIGCOMM Computer Communications Review, vol. 36, no. 1, pp. 29--38, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Pang and V. Paxson, "A High-level Programming Environment for Packet Trace Anonymization and Transformation," in Proceedings of ACM SIGCOMM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Lippmann, J. Haines, D. Fried, J. Korba, and K. Das, "The 1999 darpa off-line intrusion detection evaluation.," Computer Networks, vol. 34, no. 4, pp. 579--595, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. L. Laboratory, "DARPA Intrusion Detection Evaluation." http://www.ll.mit.edu/IST/ideval/.Google ScholarGoogle Scholar
  21. M. Mahoney and P. Chan, "An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection," in In Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection, pp. 220--237, Springer-Verlag, 2003.Google ScholarGoogle Scholar
  22. J. McHugh, "Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262--294, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Thomas, V. Sharma, and N. Balakrishnan, "Usefulness of darpa dataset for intrusion detection system evaluation," in Proceedings of SPIE, vol. 6973, pp. 69730G--69730G-8, Spie, 2008.Google ScholarGoogle Scholar
  24. R. Chen, I. E. Akkus, and P. Francis, "Splitx: High-performance private analytics," SIGCOMM Comput. Commun. Rev., vol. 43, pp. 315--326, Aug. 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. K. P. N. Puttaswamy, R. Bhagwan, and V. N. Padmanabhan, "Anonygator: Privacy and integrity preserving data aggregation," in Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, Middleware '10, (Berlin, Heidelberg), pp. 85--106, Springer-Verlag, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. Nandi, A. Aghasaryan, and I. Chhabra, "On the use of decentralization to enable privacy in web-scale recommendation services," in Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, WPES '13, (New York, NY, USA), pp. 25--36, ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. "The Internet Traffic Archive." http://ita.ee.lbl.gov/.Google ScholarGoogle Scholar
  28. "MAWI Working Group Traffic Archive." http://tracer.csl.sony.co.jp/mawi/.Google ScholarGoogle Scholar
  29. CAIDA, "Internet Measurement Data Catalog." http://www.datcat.org/.Google ScholarGoogle Scholar
  30. "Cooperative Association for Internet Data Analysis." http://www.caida.org.Google ScholarGoogle Scholar
  31. U. of Dartmouth, "CRAWDAD -- a Community Resource for Archiving Wireless Data At Dartmouth." http://crawdad.cs.dartmouth.edu/.Google ScholarGoogle Scholar
  32. E. Kenneally and k. Claffy, "Dialing privacy and utility: A proposed data-sharing framework to advance internet research," Security Privacy, IEEE, vol. 8, pp. 31--39, july-aug. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. "Lobster web page." http://www.ist-lobster.org/ publications/deliverables/D1.1a.pdf.Google ScholarGoogle Scholar
  34. G. Iannacone, "CoMo: An Open Infrastructure for Network Monitoring-Research Agenda." http://como. intel-research.net/pubs/como.agenda.pdf.Google ScholarGoogle Scholar
  35. G. Tech and U. of Napoli Ferderico II, "Project BISmark." http://projectbismark.net/.Google ScholarGoogle Scholar
  36. P. Eckersley, "How unique is your web browser?," in Proceedings of the The 10th Privacy Enhancing Technologies Symposium (PETS 2010), (Berlin, Germany), pp. 1--18, Springer-Verlag, July 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Critter: Content-Rich Traffic Trace Repository

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WISCS '14: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security
      November 2014
      110 pages
      ISBN:9781450331517
      DOI:10.1145/2663876

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 November 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      WISCS '14 Paper Acceptance Rate9of18submissions,50%Overall Acceptance Rate23of58submissions,40%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader