Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymization techniques with respect to the privacy they afford. In fact, recent work suggests that many state-of-the-art anonymization techniques may leak more information than first thought. In this paper, we propose techniques for evaluating the anonymity of network data. Specifically, we simulate the behavior of an adversary whose goal is to deanonymize objects, such as hosts or web pages, within the network data. By doing so, we are able to quantify the anonymity of the data using information theoretic metrics, objectively compare the efficacy of anonymization techniqu...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
Abstract—In this paper, we conduct the first comprehensive quantification on the perfect de-anonymiz...
Collecting network traffic traces from deployed networks is one of the basic steps in under-standing...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Advances in technology have made it possible to collect data about individuals and the connections b...
The availability of realistic network data plays a significant role in fostering collaboration and e...
Network security research can benefit greatly from testing environments that are capable of generati...
Modern network security research has demonstrated a clear necessity for open sharing of traffic data...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Corporate networks are constantly bombarded by malicious actors trying to gain access. The current s...
Measures for anonymity in systems must be on one hand simple and concise, and on the other hand refl...
In modern network measurement research, there exists a clear and demonstrable need for open sharing ...
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intend...
ENGELSK: Most IDS evaluation approaches use simulated network traffic as base for the test data sets...
In modern network measurement research, there exists a clear and demonstrable need for open sharing ...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
Abstract—In this paper, we conduct the first comprehensive quantification on the perfect de-anonymiz...
Collecting network traffic traces from deployed networks is one of the basic steps in under-standing...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Advances in technology have made it possible to collect data about individuals and the connections b...
The availability of realistic network data plays a significant role in fostering collaboration and e...
Network security research can benefit greatly from testing environments that are capable of generati...
Modern network security research has demonstrated a clear necessity for open sharing of traffic data...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Corporate networks are constantly bombarded by malicious actors trying to gain access. The current s...
Measures for anonymity in systems must be on one hand simple and concise, and on the other hand refl...
In modern network measurement research, there exists a clear and demonstrable need for open sharing ...
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intend...
ENGELSK: Most IDS evaluation approaches use simulated network traffic as base for the test data sets...
In modern network measurement research, there exists a clear and demonstrable need for open sharing ...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
Abstract—In this paper, we conduct the first comprehensive quantification on the perfect de-anonymiz...
Collecting network traffic traces from deployed networks is one of the basic steps in under-standing...