Sciweavers

CCR
2010

The role of network trace anonymization under attack

13 years 4 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data and successfully de-anonymize objects with distinctive signatures. However, analyses of these attacks still underestimate the real risk of publishing anonymized data, as the most powerful attack against anonymization is traffic injection. We demonstrate that performing live traffic injection attacks against anonymization on a backbone network is not difficult, and that potential countermeasures against these attacks, such as traffic aggregation, randomization or field generalization, are not particularly effective. We then discuss tradeoffs of the attacker and defender in the so-called injection attack space. An asymmetry in the attack space significantly increases the chance of a successful de-anonymization through lengthening the injected traffic pattern. This leads us to re-examine the role of network dat...
Martin Burkhart, Dominik Schatzmann, Brian Trammel
Added 09 Dec 2010
Updated 09 Dec 2010
Type Journal
Year 2010
Where CCR
Authors Martin Burkhart, Dominik Schatzmann, Brian Trammell, Elisa Boschi, Bernhard Plattner
Comments (0)