Corpus ID: 654394

Circumventing IP-address pseudonymization

@inproceedings{Brekne2005CircumventingIP,
  title={Circumventing IP-address pseudonymization},
  author={T{\o}nnes Brekne and Andr{\'e} {\AA}rnes},
  booktitle={Communications and Computer Networks},
  year={2005}
}
This paper presents an attack that circumvents anonymization of IP addresses in IP network traffic data in O(n) time, or O(n) time under certain circumstances. The attack is based on packet injection, and circumvents all anonymization techniques that assign a static and unique pseudonym to an IP address. It turns out that the packet injection itself, as well as the extraction of the corresponding anonymized header data, are the most time-consuming steps. 
30 Citations
Correlating network events and transferring labels in the presence of IP address anonymisation
  • S. Abt, H. Baier
  • Computer Science
  • 2016 12th International Conference on Network and Service Management (CNSM)
  • 2016
  • 3
  • PDF
The role of network trace anonymization under attack
  • 59
  • PDF
Netshuffle: Improving Traffic Trace Anonymization through Graph Distortion
  • 4
Obfuscation of sensitive data in network flows
  • 16
  • PDF
Real-time Netshuffle: Graph distortion for on-line anonymization
  • 6
  • PDF
PktAnon – A Generic Framework for Profile-based Traffic Anonymization
  • 11
Preserving Both Privacy and Utility in Network Trace Anonymization
  • 4
  • PDF
Obfuscation of Sensitive Data for Incremental Release of Network Flows
  • 10
On Web Browsing Privacy in Anonymized NetFlows
  • 89
  • PDF
Taming the Devil: Techniques for Evaluating Anonymized Network Data
  • 58
  • PDF
...
1
2
3
...

References

SHOWING 1-10 OF 23 REFERENCES
A method to compress and anonymize packet traces
  • 68
  • PDF
On the design and performance of prefix-preserving IP traffic trace anonymization
  • 93
  • PDF
Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows
  • 35
On Pseudonymization of Audit Data for Intrusion Detection
  • J. Biskup, U. Flegel
  • Computer Science
  • Workshop on Design Issues in Anonymity and Unobservability
  • 2000
  • 39
The dining cryptographers problem: Unconditional sender and recipient untraceability
  • D. Chaum
  • Mathematics, Computer Science
  • Journal of Cryptology
  • 2004
  • 1,399
  • PDF
Untraceable electronic mail, return addresses, and digital pseudonyms
  • 3,052
  • PDF
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
  • 537
  • PDF
An IXA-Based Network Measurement Node
  • 12
Traffic Data Repository at the WIDE Project
  • 212
  • PDF
...
1
2
3
...