The contents of this legacy page are no longer maintained nor supported, and are made available only for historical purposes.

Bibliography Details

S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter, "Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces", in NDSS, feb 2007.

Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Authors: S. Coull
C. Wright
F. Monrose
M. Collins
M. Reiter
Published: NDSS, 2007
URL: http://www.ece.cmu.edu/~reiter/papers/2007/NDSS1.pdf
ENTRY DATE: 2008-06-16
ABSTRACT: Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publishing organization. To address this dilemma, several techniques have been suggested for anonymizing network data by obfuscating sensitive fields. In this paper, we present new techniques for inferring network topology and deanonymizing servers present in anonymized network data, using only the data itself and public information. Via analyses on three different network datasets, we quantify the effectiveness of our techniques, showing that they can uncover significant amounts of sensitive information. We also discuss prospects for preventing these deanonymization attacks.