A Survey of Network Traffic Anonymisation Techniques and Implementations

被引:7
|
作者
van Dijkhuizen, Niels [1 ]
van der Ham, Jeroen [2 ,3 ]
机构
[1] Netherlands Minist Def, POB 20701, NL-2500 ES The Hague, Netherlands
[2] Natl Cyber Secur Ctr, The Hague, Netherlands
[3] Univ Amsterdam, POB 117, NL-2501 CC The Hague, Netherlands
关键词
Anonymisation; cryptography; framework; identification; network capture; sensitive data; transformation; IP ADDRESS ANONYMIZATION;
D O I
10.1145/3182660
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
\ Many networking research activities are dependent on the availability of network captures. Even outside academic research, there is a need for sharing network captures to cooperate on threat assessments or for debugging. However, most network captures cannot be shared due to privacy concerns. Anonymisation of network captures has been a subject of research for quite some time, and many different techniques exist. In this article, we present an overview of the currently available techniques and implementations for network capture anonymisation. There have beenmany advances in the understanding of anonymisation and cryptographic methods, which have changed the perspective on the effectiveness of many anonymisation techniques. However, these advances, combined with the increase of computational abilities, may have also made it feasible to perform anonymisation in real time. This may make it easier to collect and distribute network captures both for research and for other applications. This article surveys the literature over the period of 1998-2017 on network traffic anonymisation techniques and implementations. The aim is to provide an overview of the current state of the art and to highlight how advances in related fields have shed new light on anonymisation and pseudonimisation methodologies. The few currently maintained implementations are also reviewed. Last, we identify future research directions to enable easier sharing of network traffic, which in turn can enable new insights in network traffic analysis.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Promising new Techniques for Computer Network Traffic Classification: A Survey
    Konopa, Michal
    Fesl, Jan
    Janecek, Jan
    [J]. 2020 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT), 2020, : 418 - 421
  • [2] A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures
    Papadogiannaki, Eva
    Ioannidis, Sotiris
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (06)
  • [3] Procedures, Criteria, and Machine Learning Techniques for Network Traffic Classification: A Survey
    Sheikh, Muhammad Sameer
    Peng, Yinqiao
    [J]. IEEE ACCESS, 2022, 10 : 61135 - 61158
  • [4] A survey on encrypted network traffic: A comprehensive survey of identification/classification techniques, challenges, and future directions
    Sharma, Adit
    Lashkari, Arash Habibi
    [J]. Computer Networks, 2025, 257
  • [5] Tor De-anonymisation Techniques
    Nurmi, Juha
    Niemela, Mikko S.
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 657 - 671
  • [6] RECENT IMPLEMENTATIONS AND CHALLENGES OF AN IP NETWORK FOR AIR TRAFFIC MANAGEMENT IN COLOMBIA
    Pico Ortiz, Oscar Fernando
    Guzman Cuesta, Oscar
    [J]. 2017 INTEGRATED COMMUNICATIONS, NAVIGATION AND SURVEILLANCE CONFERENCE (ICNS), 2017,
  • [7] De-Anonymisation Attacks on Tor: A Survey
    Karunanayake, Ishan
    Ahmed, Nadeem
    Malaney, Robert
    Islam, Rafiqul
    Jha, Sanjay K.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04): : 2324 - 2350
  • [8] Hierarchical Summarization Techniques for Network Traffic
    Mahmood, A. N.
    Leckie, C.
    Islam, R.
    Tari, Z.
    [J]. 2011 6TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2011, : 2474 - 2479
  • [9] TECHNIQUES FOR PREDICTING FLOW IN A TRAFFIC NETWORK
    FOULDS, LR
    [J]. NEW ZEALAND OPERATIONAL RESEARCH, 1983, 11 (02): : 165 - 178
  • [10] Network Traffic Classification Techniques and Challenges
    Al Khater, Noora
    Overill, Richard E.
    [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2015, : 109 - 114