skip to main content
10.1145/1998412.1998416acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization

Published:14 June 2011Publication History

ABSTRACT

Anonymization is critical prior to sharing wireless-network traces within the research community, to protect both personal and organizational sensitive information from disclosure. One difficulty in anonymization, or more generally, sanitization, is that users lack information about the quality of a sanitization result, such as how much privacy risk a sanitized trace may expose, and how much research utility the sanitized trace may retain. We propose a framework, NetSANI, that allows users to analyze and control the privacy/utility tradeoff in network sanitization. NetSANI can accommodate most of the currently available privacy and utility metrics for network trace sanitization. This framework provides a set of APIs for analyzing the privacy/utility tradeoff by comparing the changes in privacy and utility levels of a trace for a sanitization operation. We demonstrate the framework with an quantitative evaluation on wireless-network traces.

References

  1. M. Balazinska and P. Castro. Characterizing mobility and network usage in a corporate wireless local-area network. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 303--316, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Brekne, A. Årnes, and A. Øslebø. Anonymization of IP traffic monitoring data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies. In Proceedings of the International Symposium on Privacy Enhancing Technologies (PET), volume 3856 of Lecture Notes in Computer Science, pages 179--196, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Brickell and V. Shmatikov. The cost of privacy: destruction of data-mining utility in anonymized data publishing. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pages 70--78, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cooperative Association for Internet Data Analysis (CAIDA). www.caida.org, 2008.Google ScholarGoogle Scholar
  5. S. Clauß. A framework for quantification of linkability within a privacy-enhancing identity management system. In Proceedings Emerging Trends in Information and Communication Security, volume 3995 of Lecture Notes in Computer Science, pages 191--205, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Coull, C. Wright, F. Monrose, A. Keromytis, and M. Reiter. Taming the Devil: Techniques for evaluating anonymized network data. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS), February 2008.Google ScholarGoogle Scholar
  7. S. E. Coull, F. Monrose, M. K. Reiter, and M. D. Bailey. The Challenges of Effectively Anonymizing Network Data. In Proceedings of the Cybersecurity Applications & Technology Conference For Homeland Security (CATCH), pages 230--236, March 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Community Resource for Archiving Wireless Data At Dartmouth (CRAWDAD). www.crawdad.org, 2010.Google ScholarGoogle Scholar
  9. Internet measurement data catalog (DatCat). www.datcat.org, 2010.Google ScholarGoogle Scholar
  10. D. J. Kelly, R. A. Raines, M. R. Grimaila, R. O. Baldwin, and B. E. Mullins. A survey of state-of-the-art in anonymity metrics. In Proceedings of the ACM Workshop on Network Data Anonymization (NDA), pages 31--40, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Koukis, S. Antonatos, and K. G. Anagnostakis. On the privacy risks of publishing anonymized IP network traces. In Proceedings of the International Conference on Communications and Multimedia Security (CMS), volume 4237 of Lecture Notes in Computer Science, pages 22--32, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Koukis, S. Antonatos, D. Antoniades, E. P. Markatos, and P. Trimintzios. A generic anonymization framework for network traffic. In Proceedings of the IEEE International Conference on Communications (ICC), volume 5, June 2006.Google ScholarGoogle ScholarCross RefCross Ref
  13. K. Lakkaraju and A. Slagell. Evaluating the utility of anonymized network traces for intrusion detection. In Proceedings of the International Conference on Security and Privacy in Communication Networks (SecureComm), pages 1--8, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Y. Ma, D. K. Yau, N. K. Yip, and N. S. Rao. Privacy vulnerability of published anonymous mobility traces. In Proc. of the International Conference on Mobile Computing and Networking (MobiCom), pages 185--196, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Pang, M. Allman, V. Paxson, and J. Lee. The devil and packet trace anonymization. ACM SIGCOMM Computer Communication Review, 36(1):29--38, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Protected Repository for the Defense of Infrastructure against Cyber Threats (PREDICT). www.predict.org, 2010.Google ScholarGoogle Scholar
  17. A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Proceedings of the International Symposium on Privacy Enhancing Technologies (PET), volume 2482 of Lecture Notes in Computer Science, pages 41--53, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. K. Tan, G. Yan, J. Yeo, and D. Kotz. Privacy analysis of user association logs in a large-scale wireless LAN. In Proceedings of the 30th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) mini-conference, April 2011.Google ScholarGoogle ScholarCross RefCross Ref
  19. K. Tan, J. Yeo, M. E. Locasto, and D. Kotz. Catch, clean, and release: A survey of obstacles and opportunities for network trace sanitization. In Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques. Chapman and Hall/CRC Press, December 2010.Google ScholarGoogle Scholar
  20. M. Woo, J. P. Reiter, A. Oganian, and A. F. Karr. Global measures of data utility in microdata masked for disclosure limitation. Journal of Privacy and Confidentiality, 1:111--124, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  21. J. Yeo, K. Tan, and D. Kotz. User survey regarding the needs of network researchers in trace-anonymization tools. Technical Report TR2009--658, Dartmouth College, 2009.Google ScholarGoogle Scholar

Index Terms

  1. Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WiSec '11: Proceedings of the fourth ACM conference on Wireless network security
          June 2011
          186 pages
          ISBN:9781450306928
          DOI:10.1145/1998412

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 June 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          Overall Acceptance Rate98of338submissions,29%

          Upcoming Conference

          WiSec '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader