A survey of network flow applications

B Li, J Springer, G Bebis, MH Gunes - Journal of Network and Computer …, 2013 - Elsevier
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research
has been conducted since then and many applications have been developed. In this survey …

A survey of network traffic anonymisation techniques and implementations

NV Dijkhuizen, JVD Ham - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Many networking research activities are dependent on the availability of network captures.
Even outside academic research, there is a need for sharing network captures to cooperate …

FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs.

AJ Slagell, K Lakkaraju, K Luo - LISA, 2006 - usenix.org
Abstract FLAIM (Framework for Log Anonymization and Information Management)
addresses two important needs not well addressed by current log anonymizers. First, it is …

A generic anonymization framework for network traffic

D Koukis, S Antonatos, D Antoniades… - 2006 IEEE …, 2006 - ieeexplore.ieee.org
Lack of trust is one of the main reasons for the limited cooperation between different
organizations. The privacy of users is of paramount importance to administrators and …

On Web Browsing Privacy in Anonymized NetFlows.

SE Coull, MP Collins, CV Wright, F Monrose… - USENIX Security …, 2007 - usenix.org
Anonymization of network traces is widely viewed as a necessary condition for releasing
such data for research purposes. For obvious privacy reasons, an important goal of trace …

Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization

A Slagell, W Yurcik - … of the 1st International Conference on …, 2005 - ieeexplore.ieee.org
Logs are one of the most fundamental resources to any security professional. It is widely
recognized by the government and industry that it is both beneficial and desirable to share …

Anonymization of network traces data through condensation-based differential privacy

A Aleroud, F Yang, SC Pallaprolu, Z Chen… - … Threats: Research and …, 2021 - dl.acm.org
Network traces are considered a primary source of information to researchers, who use them
to investigate research problems such as identifying user behavior, analyzing network …

A taxonomy and adversarial model for attacks against network log anonymization

J King, K Lakkaraju, A Slagell - … of the 2009 ACM symposium on Applied …, 2009 - dl.acm.org
In recent years, it has become important for researchers, security incident responders and
educators to share network logs, and many log anonymization tools and techniques have …

Evaluating the utility of anonymized network traces for intrusion detection

K Lakkaraju, A Slagell - Proceedings of the 4th international conference …, 2008 - dl.acm.org
To intelligently create policies governing the anonymization of network logs, one must
analyze the effects of anonymization on both the security and utility of sanitized data. In this …

Mitigating iot privacy-revealing features by time series data transformation

F Wang, Y Tang, H Fang - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
As the Internet of Things (IoT) continues to expand, billions of IoT devices are now
connected to the internet, producing vast quantities of data. Collecting and sharing this data …