Reference models for network trace anonymization

dc.contributor.advisor Thomas E. Daniels
dc.contributor.advisor Douglas W. Jacobson
dc.contributor.advisor Brett M. Bode
dc.contributor.author Gattani, Shantanu
dc.contributor.department Department of Electrical and Computer Engineering
dc.date 2018-08-22T14:00:42.000
dc.date.accessioned 2020-06-30T07:43:28Z
dc.date.available 2020-06-30T07:43:28Z
dc.date.copyright Tue Jan 01 00:00:00 UTC 2008
dc.date.issued 2008-01-01
dc.description.abstract <p>Network security research can benefit greatly from testing environments that are capable of generating realistic, repeatable and configurable background traffic. In order to conduct network security experiments on systems such as Intrusion Detection Systems and Intrusion Prevention Systems, researchers require isolated testbeds capable of recreating actual network environments, complete with infrastructure and traffic details. Unfortunately, due to privacy and flexibility concerns, actual network traffic is rarely shared by organizations as sensitive information, such as IP addresses, device identity and behavioral information can be inferred from the traffic. Trace data anonymization is one solution to this problem. The research community has responded to this sanitization problem with anonymization tools that aim to remove sensitive information from network traces, and attacks on anonymized traces that aim to evaluate the efficacy of the anonymization schemes. However there is continued lack of a comprehensive model that distills all elements of the sanitization problem in to a functional reference model.;In this thesis we offer such a comprehensive functional reference model that identifies and binds together all the entities required to formulate the problem of network data anonymization. We build a new information flow model that illustrates the overly optimistic nature of inference attacks on anonymized traces. We also provide a probabilistic interpretation of the information model and develop a privacy metric for anonymized traces. Finally, we develop the architecture for a highly configurable, multi-layer network trace collection and sanitization tool. In addition to addressing privacy and flexibility concerns, our architecture allows for uniformity of anonymization and ease of data aggregation.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/rtd/15304/
dc.identifier.articleid 16303
dc.identifier.contextkey 7019447
dc.identifier.doi https://doi.org/10.31274/rtd-180813-16536
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath rtd/15304
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/68924
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/rtd/15304/1453120.PDF|||Fri Jan 14 20:39:09 UTC 2022
dc.subject.disciplines Computer Sciences
dc.subject.disciplines Library and Information Science
dc.subject.keywords Electrical and computer engineering;Computer engineering;Information assurance;
dc.title Reference models for network trace anonymization
dc.type thesis
dc.type.genre thesis
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.discipline Information Assurance
thesis.degree.level thesis
thesis.degree.name Master of Science
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
1453120.PDF
Size:
1.38 MB
Format:
Adobe Portable Document Format
Description: