Abstract

Network trace data provide valuable information which contributes to model the network behaviors, defend network attacks and develop new protocols, so releasing the data of network trace is highly demanded by researchers and organizations to promote the development of the network technologies. However, due to the sensitive nature of network trace data, it is a potential risk for organizations to publish the original data which may expose their commercial confidentiality and the customers' privacy within their networks. Several methods to defend the network trace attacks such as statistical fingerprinting and injection have been proposed, unfortunately, they are not enough to protect the privacy because the correspondence between the source and destination IP addresses can also help the adversary to identify the target host. In this paper, we extract the inherent graph structure between the source and destination IP addresses in network trace data, and use k-anonymity to prevent the target host from being identified. Combined with other protection techniques, our method can also prevent the fingerprinting and injection attacks.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.