Online trace anonymization based on anonymous flow table

被引:0
|
作者
Han C.-J. [1 ,2 ,3 ]
Ge J.-G. [3 ]
Xie G.-G. [1 ]
Li L.-X. [3 ]
Li T. [3 ]
Liu Y.-J. [1 ]
机构
[1] Institute of Computing Technology, Chinese Academy of Sciences, Beijing
[2] University of Chinese Academy of Sciences, Beijing
[3] Institute of Information Engineering, Chinese Academy of Sciences, Beijing
来源
Tongxin Xuebao | / 11卷 / 11-22期
基金
国家高技术研究发展计划(863计划);
关键词
AFT; DPDK; Fad-Pan; Network trace anonymization;
D O I
10.11959/j.issn.1000-436x.2016214
中图分类号
学科分类号
摘要
A real-time network packet anonymous method named Fad-Pan (online trace anonymization based on the anonymous flow table) was proposed. The Fad-Pan algorithm was studied and an online trace anonymization prototype system based on DPDK library was developed. The experimental results prove that the Fad-Pan algorithm is faster more than 20 times than the existing method, and a single server can handle the real-time IPv4 and IPv6 traffic of the 10 Gbit/s link used by the Fad-Pan. © 2016, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:11 / 22
页数:11
相关论文
共 34 条
  • [1] Jain S., Kumar A., Mandal S., Et al., B4: experience with a globally-deployed software defined WAN, ACM SIGCOMM Computer Communication Review, 43, 4, pp. 3-14, (2013)
  • [2] Mckeown N., Anderson T., Balakrishnan H., Et al., Openflow: enabling innovation in campus networks, ACM SIGCOMM Computer Communication Review, 38, 2, pp. 69-74, (2008)
  • [3] Zhang L., Estrin D., Burke J., Et al., Named data networking (NDN) project, (2010)
  • [4] Han D., Anand A., Dogar F.R., Et al., XIA: efficient support for evolvable internetworking, Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12), pp. 309-322, (2012)
  • [5] Pang R., Allman M., Paxson V., Et al., The devil and packet trace anonymization, ACM SIGCOMM Computer Communication Review, 36, 1, pp. 29-38, (2006)
  • [6] Fuentes F., Kar D.C., Ethereal vs tcpdump: a comparative study on packet sniffing tools for educational purpose, Journal of Computing Sciences in Colleges, 20, 4, pp. 169-176, (2005)
  • [7] Li Y., Slagell A., Luo K., Et al., Canine: a combined conversion and anonymization tool for processing netflows for security, International Conference on Telecommunication Systems Modeling and Analysis, (2005)
  • [8] Pang R., Allman M., Paxson V., Et al., The devil and packet trace anonymization, ACM SIGCOMM Computer Communication Review, 36, 1, pp. 29-38, (2006)
  • [9] Slagell A.J., Lakkaraju K., Luo K., FLAIM: a multi-level anonymization framework for computer and network logs, LISA, 6, pp. 3-8, (2006)
  • [10] Farah T., Trajkovic L., Anonym: a tool for anonymization of the Internet traffic, IEEE International Conference on Cybernetics (CYBCONF), pp. 261-266, (2013)