A Self-adaptive and Secure Approach to Share Network Trace Data
No Thumbnail Available
Links to Files
Permanent Link
Date
2023-10-20
Type of Work
Department
Program
Citation of Original Publication
Antonios Xenakis, Sabrina Mamtaz Nourin, Zhiyuan Chen, George Karabatis, Ahmed Aleroud, and Jhancy Amarsingh. 2023. A Self-adaptive and Secure Approach to Share Network Trace Data. Digital Threats 4, 4, Article 50 (December 2023), 20 pages. https://doi.org/10.1145/3617181
Rights
This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
Subjects
Abstract
A large volume of network trace data are collected by the government and public and private organizations and can be
analyzed for various purposes such as resolving network problems, improving network performance, and understanding user
behavior. However, most organizations are reluctant to share their data with any external experts for analysis, because they
contain sensitive information deemed proprietary to the organization, thus raising privacy concerns. Even if the payload
of network packets is not shared, header data may disclose sensitive information that adversaries can exploit to perform
unauthorized actions. So network trace data need to be anonymized before being shared. Most of the existing anonymization
tools have two major shortcomings: (1) they cannot provide provable protection, and (2) their performance relies on setting
the right parameter values such as the degree of privacy protection and the features that should be anonymized, but there
is little assistance for a user to optimally set these parameters. This article proposes a self-adaptive and secure approach to
anonymize network trace data and provides provable protection and automatic optimal settings of parameters. A comparison
of the proposed approach with existing anonymization tools via experimentation demonstrated that the proposed method
outperforms the existing anonymization techniques.