Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme

  • Authors:
  • Jinliang Fan;Jun Xu;Mostafa H. Ammar;Sue B. Moon

  • Affiliations:
  • College of Computing, Georgia Institute of Technology, 801 Atlantic Drive, Atlanta, GA;College of Computing, Georgia Institute of Technology, 801 Atlantic Drive, Atlanta, GA;College of Computing, Georgia Institute of Technology, 801 Atlantic Drive, Atlanta, GA;Department of Computer Science, KAIST, Guseong-Dong, Yuseong-Gu, Daejeon 305-701, South Korea and Sprint Advanced Technology Laboratories

  • Venue:
  • Computer Networks: The International Journal of Computer and Telecommunications Networking
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Real-world traffic traces are crucial for Internet research, but only a very small percentage of traces collected are made public. One major reason why traffic trace owners hesitate to make the traces publicly available is the concern that confidential and private information may be inferred from the trace. In this paper we focus on the problem of anonymizing IP addresses in a trace. More specifically, we are interested in prefix-preserving anonymization in which the prefix relationship among IP addresses is preserved in the anonymized trace, making such a trace usable in situations where prefix relationships are important. The goal of our work is two fold. First, we develop a cryptography-based, prefix-preserving anonymization technique that is provably as secure as the existing well-known TCPdpriv scheme, and unlike TCPdpriv, provides consistent prefix-preservation in large scale distributed setting. Second, we evaluate the security properties inherent in all prefix-preserving IP address anonymization schemes (including TCPdpriv). Through the analysis of Internet backbone traffic traces, we investigate the effect of some types of attacks on the security of any prefix-preserving anonymization algorithm. We also derive results for the optimum manner in which an attack should proceed, which provides a bound on the effectiveness of attacks in general.