The contents of this legacy page are no longer maintained nor supported, and are made available only for historical purposes.

Bibliography Details

B. Ribeiro, W. Chen, G. Miklau, and D. Towsley, "Analyzing Privacy in Enterprise Packet Trace Anonymization", Tech. Rep. 48-07, UMass Amherst, September 2007.

Analyzing Privacy in Enterprise Packet Trace Anonymization
Authors: B. Ribeiro
W. Chen
G. Miklau
D. Towsley
Published: UMass Amherst, 2007
Entry Date: 2008-06-09
Abstract: Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network traces to analysts is highly constrained by privacy concerns. Several host anonymization schemes have been proposed to address this issue. Preservation of prefix relationships among anonymized addresses is an important aspect of trace utility, but also causes a number of vulnerabilities in trace anonymization. In this work we present an efficient host fingerprint attack targeting prefix-preserving anonymized traces. The attack is general (encompassing a range of fingerprinting host de-anonymization attacks proposed by others) and flexible (it can be adapted to emerging variants of prefix-preserving anonymization). Perhaps most importantly, we develop analysis tools that allow data publishers to quantify the worst-case vulnerability of their traces given assumptions about the kind of external information that is available to the adversary. Using this analysis we quantify the trade-off between privacy and utility of alternatives to full prefix-preserving anonymization.