...
首页> 外文期刊>Computer networks >Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme
【24h】

Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme

机译:保留前缀的IP地址匿名化:基于度量的安全评估和基于密码学的新方案

获取原文
获取原文并翻译 | 示例
           

摘要

Real-world traffic traces are crucial for Internet research, but only a very small percentage of traces collected are made public. One major reason why traffic trace owners hesitate to make the traces publicly available is the concern that confidential and private information may be inferred from the trace. In this paper we focus on the problem of anonymizing IP addresses in a trace. More specifically, we are interested in prefix-preserving anonymization in which the prefix relationship among IP addresses is preserved in the anonymized trace, making such a trace usable in situations where prefix relationships are important. The goal of our work is two fold. First, we develop a cryptography-based, prefix-preserving anonymization technique that is provably as secure as the existing well-known TCPdpriv scheme, and unlike TCPdpriv, provides consistent prefix-preservation in large scale distributed setting. Second, we evaluate the security properties inherent in all prefix-preserving IP address anonymization schemes (including TCPdpriv). Through the analysis of Internet backbone traffic traces, we investigate the effect of some types of attacks on the security of any prefix-preserving anonymization algorithm. We also derive results for the optimum manner in which an attack should proceed, which provides a bound on the effectiveness of attacks in general.
机译:现实世界中的流量跟踪对于Internet研究至关重要,但是收集到的跟踪中只有很小一部分是公开的。交通跟踪所有者不愿公开公开跟踪的一个主要原因是担心可能从跟踪中推断出机密信息和私人信息。在本文中,我们关注于跟踪中的IP地址匿名化问题。更具体地说,我们对保留前缀的匿名化感兴趣,在匿名化跟踪中,IP地址之间的前缀关系被保留在匿名跟踪中,使得这种跟踪在前缀关系很重要的情况下可用。我们工作的目标是两个方面。首先,我们开发了一种基于加密的,保留前缀的匿名化技术,该技术可证明与现有的众所周知的TCPdpriv方案一样安全,并且与TCPdpriv不同,它在大规模分布式环境中提供了一致的前缀保留。其次,我们评估所有保留前缀的IP地址匿名方案(包括TCPdpriv)固有的安全性。通过分析Internet骨干网流量跟踪,我们研究了某些类型的攻击对任何保留前缀的匿名化算法的安全性的影响。我们还得出了进行攻击的最佳方式的结果,这总体上限制了攻击的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号