AASC: Anonymizing Network Addresses based on Subnet Clustering

被引:1
|
作者
Tang, Yi [1 ]
Wu, Yuanyuan [1 ]
Zhou, Quan [1 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Guangdong, Peoples R China
来源
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1 | 2010年
关键词
subnet clustering; address anonymization; information entropy;
D O I
10.1109/WCINS.2010.5541864
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The network packet trace dataset plays an important role in networking research. Publishing those traces publicly faces how to protect the providers' sensitive privacy, especially the internal IP addresses. In this paper, we propose a subnet-clustering based method, AASC, to anonymize those internal addresses. According to AASC, three parts of a whole IP address are anonymized by different methods. The network part is anonymized by a prefix-preserved anonymization method, the subnet part is generalized by clustering based on a predefined set of port numbers, and the host address is randomized. We also define two entropy based metrics, the simple measure and the co-existence measure, to measure the degree of privacy preserved in anonymized addresses. The defined metrics can reflect some dependencies among trace records. We develop a local-search based, measure-guided algorithm to search subnet clusters with more utilities. We have conducted some experiments to validate our proposed method.
引用
收藏
页码:672 / 676
页数:5
相关论文
共 50 条
  • [1] Features Linear Fusion based on AP Clustering and AASC Algorithm
    Li, Limin
    Wang, Zhongsheng
    MECHANICAL ENGINEERING, MATERIALS AND ENERGY III, 2014, 483 : 583 - 586
  • [2] Heuristic Approaches Based Clustering of Bitcoin Addresses
    Mao H.-L.
    Wu Z.
    He M.
    Tang J.-Q.
    Shen M.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2018, 41 (02): : 27 - 31
  • [3] Anonymizing graphs: measuring quality for clustering
    Jordi Casas-Roma
    Jordi Herrera-Joancomartí
    Vicenç Torra
    Knowledge and Information Systems, 2015, 44 : 507 - 528
  • [4] Anonymizing graphs: measuring quality for clustering
    Casas-Roma, Jordi
    Herrera-Joancomarti, Jordi
    Torra, Vicenc
    KNOWLEDGE AND INFORMATION SYSTEMS, 2015, 44 (03) : 507 - 528
  • [5] Star-subnet-based-mesh network on chip
    Xitong Fangzhen Xuebao, 2007, 22 (5336-5338+5341):
  • [6] On Anonymizing Social Network Graphs
    Kayem, Anne V. D. M.
    Deshai, Azhar
    Hammer, Stuart
    2012 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2012,
  • [7] A Clustering Approach for Anonymizing Distributed Data Streams
    Mohamed, Mona A.
    Nagi, Magdy H.
    Ghanem, Sahar M.
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2016, : 9 - 16
  • [8] Efficient AS Network Topology Measurement Based on Ingress to Subnet Reachability
    Coskun, Ibrahim Ethem
    Canbaz, Muhammed Abdullah
    Gunes, Mehmet Hadi
    PROCEEDINGS OF THE 2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS - LCN WORKSHOPS 2016, 2016, : 87 - 95
  • [9] A Generalization Based Approach for Anonymizing Weighted Social Network Graphs
    Liu, Xiangyu
    Yang, Xiaochun
    WEB-AGE INFORMATION MANAGEMENT, 2011, 6897 : 118 - 130
  • [10] Anonymizing Path Nodes in Social Network
    Song Wenlue
    Zhang Yan
    Bai Wenyang
    2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,