Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
A parameterizable methodology for Internet traffic flow profiling
IEEE Journal on Selected Areas in Communications
A high-level programming environment for packet trace anonymization and transformation
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
A probability-guaranteed adaptive timeout algorithm for high-speed network flow detection
Computer Networks and ISDN Systems
Secure distributed data-mining and its application to large-scale network measurements
ACM SIGCOMM Computer Communication Review
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
High-speed prefix-preserving IP address anonymization for passive measurement systems
IEEE/ACM Transactions on Networking (TON)
An information-theoretic approach to network monitoring and measurement
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Privacy-preserving sharing and correction of security alerts
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Sanitization models and their limitations
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
A probability-guaranteed adaptive timeout algorithm for high-speed network flow detection
Computer Networks: The International Journal of Computer and Telecommunications Networking
Structure preserving anonymization of router configuration data
IEEE Journal on Selected Areas in Communications - Special issue on network infrastructure configuration
On the design of fast prefix-preserving IP address anonymization scheme
ICICS'07 Proceedings of the 9th international conference on Information and communications security
An IP address anonymization scheme with multiple access levels
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
Data volume and privacy issues are one of problems related to large-scale packet capture. Utilizing flow nature of Internet traffic can reduce data volume. Removing sensitive information such as IP addresses enchanges privacy. Our method makes possible to have same replacement value for given IP address even if capture location or time is different.