DocumentCode :
2404780
Title :
Netshuffle: Improving Traffic Trace Anonymization through Graph Distortion
Author :
Valgenti, Victor C. ; Paul, Ruma R. ; Kim, Min Sik
Author_Institution :
Sch. of Electr. Eng. & Comput. Sci., Washington State Univ., Pullman, WA, USA
fYear :
2011
fDate :
5-9 June 2011
Firstpage :
1
Lastpage :
6
Abstract :
Traffic traces provide valuable data to researchers and organizations alike. However, organizations that provide this information do not wish to expose the internal workings of their networks to potential attack. Traffic trace anonymization attempts to mitigate this concern by hiding sensitive information while preserving most of the empirical value of the trace. Unfortunately, many attacks such as statistical fingerprinting, known-plaintext, and port evaluation can serve to identify communications within a trace which can lead an attacker to the real-world identities of anonymized devices. The inherent graph structure embedded in network traffic stands as a primary lever in achieving such de-anonymization. We propose Netshuffle, a method that distorts the graph structure in the anonymized trace such that an attacker cannot rely on the edges (communications) to identify a particular end-node (device). In essence, we shuffle the edges of the graph like a deck of cards so that even if an attacker can identify an edge, that edge does not necessarily connect to the intended target. Thus, inferences based on features of communications will either lead an attacker astray, or force the attacker to guess as to the identity of the targeted node from several indistinguishable candidates. Netshuffle provides a complimentary vector of protection to current anonymization techniques at limited cost in data utility.
Keywords :
IP networks; computer network security; Netshuffle; anonymized devices; deanonymization; graph distortion; inherent graph structure; known-plaintext; network traffic; port evaluation; statistical fingerprinting; traffic trace anonymization; Equations; IEEE Communications Society; IP networks; Image edge detection; Merging; Peer to peer computing; Topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications (ICC), 2011 IEEE International Conference on
Conference_Location :
Kyoto
ISSN :
1550-3607
Print_ISBN :
978-1-61284-232-5
Electronic_ISBN :
1550-3607
Type :
conf
DOI :
10.1109/icc.2011.5962451
Filename :
5962451
Link To Document :
بازگشت