A survey of network flow applications
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research
has been conducted since then and many applications have been developed. In this survey …
has been conducted since then and many applications have been developed. In this survey …
A survey of network traffic anonymisation techniques and implementations
NV Dijkhuizen, JVD Ham - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Many networking research activities are dependent on the availability of network captures.
Even outside academic research, there is a need for sharing network captures to cooperate …
Even outside academic research, there is a need for sharing network captures to cooperate …
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs.
Abstract FLAIM (Framework for Log Anonymization and Information Management)
addresses two important needs not well addressed by current log anonymizers. First, it is …
addresses two important needs not well addressed by current log anonymizers. First, it is …
A generic anonymization framework for network traffic
Lack of trust is one of the main reasons for the limited cooperation between different
organizations. The privacy of users is of paramount importance to administrators and …
organizations. The privacy of users is of paramount importance to administrators and …
On Web Browsing Privacy in Anonymized NetFlows.
Anonymization of network traces is widely viewed as a necessary condition for releasing
such data for research purposes. For obvious privacy reasons, an important goal of trace …
such data for research purposes. For obvious privacy reasons, an important goal of trace …
Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization
A Slagell, W Yurcik - … of the 1st International Conference on …, 2005 - ieeexplore.ieee.org
Logs are one of the most fundamental resources to any security professional. It is widely
recognized by the government and industry that it is both beneficial and desirable to share …
recognized by the government and industry that it is both beneficial and desirable to share …
Anonymization of network traces data through condensation-based differential privacy
Network traces are considered a primary source of information to researchers, who use them
to investigate research problems such as identifying user behavior, analyzing network …
to investigate research problems such as identifying user behavior, analyzing network …
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and
educators to share network logs, and many log anonymization tools and techniques have …
educators to share network logs, and many log anonymization tools and techniques have …
Evaluating the utility of anonymized network traces for intrusion detection
To intelligently create policies governing the anonymization of network logs, one must
analyze the effects of anonymization on both the security and utility of sanitized data. In this …
analyze the effects of anonymization on both the security and utility of sanitized data. In this …
Mitigating iot privacy-revealing features by time series data transformation
As the Internet of Things (IoT) continues to expand, billions of IoT devices are now
connected to the internet, producing vast quantities of data. Collecting and sharing this data …
connected to the internet, producing vast quantities of data. Collecting and sharing this data …