A Fast and Secure Method for Anonymizing Packet Traffic and Call Traces

نویسنده

  • Kari Seppänen
چکیده

Various kinds of traffic traces, containing, e.g., packet headers, signaling messages, or authorization log-files, are needed to examine the status and performance of packet switching networks. In most cases, traces contain information that can be used identify subscribers and what kind of services they have been using. This kind of information can be usually handled only by network operator and only for certain reasons, i.e., troubleshooting and accounting. However, there is an increasing trend that many network management tasks are being outsourced and thus a method, that would allow for an external staff to monitor a public network, is needed. There have been some methods for anonymizing traffic traces but they are usually not fast enough, not suitable for on-line measurements, or not secure enough. The method proposed in this paper is based on using normal symmetric block coding encryption methods in cipher block chaining mode. The advantages of the supposed method are that it is cryptographically strong, suitable for multi-site on-line measurements and very fast. Furthermore, it supports existing hardware based encryption engines without any needs for modifications. The proposed method can be also extented to prefix-preserving IP address anonymization. This extension differs form earlier proposals by using IP address lookup to determine the real network part of the address. It is also resistant to known attacks to compromise prefix-preserving anonymization methods. Key–Words: IP address anonymization, prefix-preserving anonymization, distributed measurements

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification

Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...

متن کامل

Accelerating network security services with fast packet classification

To protect a network, secure network systems such as intrusion detection system (IDS) and firewall are often installed to control or monitor network traffic. These systems often incur substantial delay for analyzing network packets. The delay can be reduced with fast packet classification, which can effectively classify network traffic, and consequently accelerate the analysis of network packet...

متن کامل

Feature Extraction to Identify Network Traffic with Considering Packet Loss Effects

There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008