skip to main content
10.1145/863955.863994acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

A high-level programming environment for packet trace anonymization and transformation

Published:25 August 2003Publication History

ABSTRACT

Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive information. Current trace anonymization technology leaves only the packet headers intact, completely stripping the contents; to our knowledge, there are no publicly available traces of any significant size that contain packet payloads. We describe a new approach to transform and anonymize packet traces. Our tool provides high-level language support for packet transformation, allowing the user to write short policy scripts to express sophisticated trace transformations. The resulting scripts can anonymize both packet headers and payloads, and can perform application-level transformations such as editing HTTP or SMTP headers, replacing the content of Web items with MD5 hashes, or altering filenames or reply codes that match given patterns. We discuss the critical issue of verifying that anonymizations are both correctly applied and correctly specified, and experiences with anonymizing FTP traces from the Lawrence Berkeley National Laboratory for public release.

References

  1. S. Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3(3):186--205, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Capture the capture the flag. http://www.shmoo.com/cctf/.Google ScholarGoogle Scholar
  3. G. Combs. The Ethereal Network Analyzer. http://www.ethereal.com/.Google ScholarGoogle Scholar
  4. Federal Committee on Statistical Methodology. Report on statistical disclosure limitation methodology (statistical policy working paper 22), 1994. http://www.fcsm.gov/working-papers/spwp22.html.Google ScholarGoogle Scholar
  5. A. Feldmann. BLT: Bi-layer tracing of HTTP and TCP/IP. In Proceedings of WWW-9, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Anonymized FTP traces. http://www-nrg.ee.lbl.gov/anonymized-traces.html.Google ScholarGoogle Scholar
  7. S. D. Gribble and E. A. Brewer. System design issues for Internet middleware services: Deductions from a large client trace. In Proc. USENIX Symp. on Internet Technologies and Systems, December 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. The honeypot challenge. http://project.honeynet.org/misc/chall.html.Google ScholarGoogle Scholar
  9. C. Kreibich. NetDuDe (NETwork DUmp data Displayer and Editor). http://netdude.sourceforge.net/.Google ScholarGoogle Scholar
  10. R. Lippmann, S. Webster, and D. Stetson. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In Proceedings of Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. R. Malan and F. Jahanian. An extensible probe architecture for network protocol performance measurement. In Proceedings of ACM SIGCOMM, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. Minshall. TCPdpriv: Program for Eliminating Confidential Information from Traces. Ipsilon Networks, Inc. http://ita.ee.lbl.gov/html/contrib/tcpdpriv.html.Google ScholarGoogle Scholar
  13. J. Mogul. Trace anonymization misses the point. Presentation on WWW 2002 Panel on Web Measurements.Google ScholarGoogle Scholar
  14. S. Patarin and M. Makpangou. Pandora: A flexible network monitoring platform. In Proceedings of the USENIX 2000 Annual Technical Conference, San Diego, June 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. http://www.icir.org/vern/bro-info.html.Google ScholarGoogle Scholar
  16. V. Paxson. Bro: A system for detecting network intruders in real time. Computer Networks, December 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Peuhkuri. A method to compress and anonymize packet traces. In Proceedings of the ACM SIGCOMM Internet Measurement Workshop, November 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Savage. Private communication.Google ScholarGoogle Scholar
  19. Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical identification of encrypted web browsing traffic. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. WildPackets, Inc. EtherPeek. http://www.etherpeek.com/.Google ScholarGoogle Scholar
  21. J. Xu, J. Fan, M. Ammar, and S. B. Moon. On the design and performance of prefix preserving IP traffic trace anonymization. In Proceedings of the ACM SIGCOMM Internet Measurement Workshop, November 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. T. Ylonen. Thoughts on how to mount an attack on tcpdpriv's "-a50" option. http://ita.ee.lbl.gov/html/contrib/attack50/attack50.html.Google ScholarGoogle Scholar

Index Terms

  1. A high-level programming environment for packet trace anonymization and transformation

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
          August 2003
          432 pages
          ISBN:1581137354
          DOI:10.1145/863955

          Copyright © 2003 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 August 2003

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          SIGCOMM '03 Paper Acceptance Rate34of319submissions,11%Overall Acceptance Rate554of3,547submissions,16%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader