skip to main content
survey

A Survey of Network Traffic Anonymisation Techniques and Implementations

Published: 23 May 2018 Publication History
  • Get Citation Alerts
  • Abstract

    Many networking research activities are dependent on the availability of network captures. Even outside academic research, there is a need for sharing network captures to cooperate on threat assessments or for debugging. However, most network captures cannot be shared due to privacy concerns.
    Anonymisation of network captures has been a subject of research for quite some time, and many different techniques exist. In this article, we present an overview of the currently available techniques and implementations for network capture anonymisation.
    There have been many advances in the understanding of anonymisation and cryptographic methods, which have changed the perspective on the effectiveness of many anonymisation techniques. However, these advances, combined with the increase of computational abilities, may have also made it feasible to perform anonymisation in real time. This may make it easier to collect and distribute network captures both for research and for other applications.
    <?tight?>This article surveys the literature over the period of 1998–2017 on network traffic anonymisation techniques and implementations. The aim is to provide an overview of the current state of the art and to highlight how advances in related fields have shed new light on anonymisation and pseudonimisation methodologies. The few currently maintained implementations are also reviewed. Last, we identify future research directions to enable easier sharing of network traffic, which in turn can enable new insights in network traffic analysis.

    References

    [1]
    Sebastian Abt and Harald Baier. 2016. Correlating network events and transferring labels in the presence of IP address anonymisation. In Proceedings of the 2016 12th International Conference on Network and Service Management (CNSM’16). IEEE, 64--72.
    [2]
    Shane Alcock, Perry Lorier, and Richard Nelson. 2012. Libtrace: A packet capture and analysis library. SIGCOMM Comput. Commun. Rev. 42, 2 (Mar. 2012), 42--48.
    [3]
    Mark Allman and Vern Paxson. 2007. Issues and etiquette concerning use of shared measurement data. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC’07). ACM, New York, NY, 135--140.
    [4]
    E. Blanton. 2008. TCPurify. Retrieved November 7, 2017 from http://web.archive.org/web/20110820174616/http://masaka.cs.ohiou.edu/&sim;eblanton/tcpurify/.
    [5]
    Jasper Bongertz. 2013. Trace File Sanitization NG. Retrieved July 7, 2015 from URL: https://sharkfest.wireshark.org/sharkfest.13/presentations/SEC-04_Trace-File-Sanitization-NG_Jasper-Bongertz.pdf.
    [6]
    J. Bongertz. 2017. TraceWrangler. Retrieved November 7, 2017 from https://www.tracewrangler.com/.
    [7]
    S. Bortzmeyer. 2015. DNS Privacy Considerations. RFC 7626 (Informational). http://www.ietf.org/rfc/rfc7626.txt.
    [8]
    Tønnes Brekne and André Årnes. 2005. Circumventing IP-address pseudonymization. In Proceedings of the 3rd IASTED International Conference on Communications and Computer Networks. 43--48.
    [9]
    Tønnes Brekne, André Årnes, and Arne Øslebø. 2005. Anonymization of IP traffic monitoring data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies. In Proceedings of the 5th International Workshop on Privacy Enhancing Technologies (PET’05). 179--196.
    [10]
    Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomas Hruby, Li Xu, and Herbert Bos. 2006. SafeCard: A gigabit IPS on the network carsd. In Recent Advances in Intrusion Detection, Diego Zamboni and Christopher Kruegel (Eds.). Lecture Notes in Computer Science, Vol. 4219. Springer, Berlin, 311--330.
    [11]
    Martin Burkhart, Dominik Schatzmann, Brian Trammell, Elisa Boschi, and Bernhard Plattner. 2010. The role of network trace anonymization under attack. Comput. Commun. Rev. 40, 1 (2010), 5--11.
    [12]
    CAIDA. 2004. Anonymization Tools Taxonomy. Retrieved November 7, 2017 from https://www.caida.org/tools/taxonomy/anonymization.xml.
    [13]
    Chris Clark, Wenke Lee, David Schimmel, Didier Contis, Mohamed Koné, and Ashley Thomas. 2003. A hardware platform for network intrusion detection and prevention. In Proceedings of the 3rd Workshop on Network Processors and Applications (NP3’03). 178.
    [14]
    CoralReef dev. Team. 2014. CoralReef. Retrieved November 7, 2017 from https://www.caida.org/tools/measurement/coralreef/status.xml.
    [15]
    M. Cotton, L. Vegoda, R. Bonica, and B. Haberman. 2013. Special-Purpose IP Address Registries. RFC 6890. Retrieved from http://www.ietf.org/rfc/rfc6890.txt.
    [16]
    Scott E. Coull and Erin Kenneally. 2012. A qualitative risk assessment framework for sharing computer network data. SSRN Electronic Journal. Elsevier BV.
    [17]
    Scott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, and Michael K. Reiter. 2008. Taming the devil: Techniques for evaluating anonymized network data. In Proceedings of the Network and Distributed System Security Symposium (NDSS’08) (2009-06-18). The Internet Society.
    [18]
    Scott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, and Michael K. Reiter. 2007. Playing devils advocate: Inferring sensitive information from anonymized network traces. In Proceedings of the Network and Distributed System Security Symposium. 35--47.
    [19]
    Department of Homeland Security. 2016. The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT). Retrieved November 7, 2017 from https://www.impactcybertrust.org/.
    [20]
    Morris Dworkin. 2016. Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption. Technical Report 800-38G. National Institute of Standards and Technology (NIST).
    [21]
    W. Yurcik et. al. 2007. SCRUB-tcpdump. Retrieved November 7, 2017 from http://scrub-tcpdump.sourceforge.net/.
    [22]
    J. Fan and et al. 2006. Crypto-PAn. Retrieved November 7, 2017 from http://www.cc.gatech.edu/computing/Telecomm/projects/cryptopan/.
    [23]
    Jinliang Fan, Jun Xu, Mostafa H. Ammar, and Sue B. Moon. 2004. Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. Comput. Netw. 46, 2 (2004), 253--272.
    [24]
    T. Farah and L. Trajkovi. 2015. Anonym. Retrieved November 7, 2017 from http://www2.ensc.sfu.ca/&sim;ljilja/cnl/projects/AnonymTool/anonym.html.
    [25]
    T. Farah and L. Trajkovic. 2013. Anonym: A tool for anonymization of the internet traffic. In Proceedings of the 2013 IEEE International Conference on Cybernetics (CYBCONF’13). 261--266.
    [26]
    M. Foukarakis. 2006. anontool. Retrieved November 7, 2017 from http://www.ics.forth.gr/dcs/Activities/Projects/anontool.html.
    [27]
    Michael Foukarakis, Demetres Antoniades, and Michalis Polychronakis. 2009. Deep packet anonymization. In Proceedings of the 2nd European Workshop on System Security (EUROSEC’09). ACM, New York, NY, 16--21.
    [28]
    Thomas Gamer, Christoph P. Mayer, and Marcus Schller. 2008. PktAnon—A generic framework for profile-based traffic anonymization. Praxis Inf. Kommun. 31, 2 (2008), 76--81. http://dblp.uni-trier.de/db/journals/pik/pik31.html#GamerMS08
    [29]
    Shantanu Gattani. 2008. Reference Models for Network Trace Anonymization. Master’s thesis. Iowa State University. Retrospective Theses and Dissertations. Paper 15304.
    [30]
    Peter Haag. 2005. Watch your flows with NfSen and NFDUMP. In Proceedings of the 50th RIPE Meeting. Retrieved November 7, 2017 from http://meetings.ripe.net/ripe-50/presentations/ripe50-plenary-tue-nfsen-nfdump.pdf.
    [31]
    P. Haag. 2014. NFDump. Retrieved November 7, 2017 from http://nfdump.sourceforge.net/.
    [32]
    S. Hanks, T. Li, D. Farinacci, and D. Meyer. 2000. RFC2784: Generic Routing Encapsulation (GRE). Retrieved November 7, 2017 from https://www.ietf.org/rfc/rfc2784.txt.
    [33]
    M. Harvan and J. Schönwälder. 2006. Prefix- and lexicographical-order-preserving IP address anonymization. In Proceedings of the 10th IEEE/IFIP Network Operations and Management Symposium 2006 (NOMS’06). 519--526.
    [34]
    Cristian Hesselman, Jelte Jansen, Maarten Wullink, Karin Vink, and Maarten Simon. 2014. A Privacy Framework for DNS Big Data Applications. Technical Report. SIDNlabs.
    [35]
    Douglas J. Kelly, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, and Barry E. Mullins. 2008. A survey of state-of-the-art in anonymity metrics. In Proceedings of the 1st ACM Workshop on Network Data Anonymization. ACM, 31--40.
    [36]
    Justin King, Kiran Lakkaraju, and Adam Slagell. 2009. A taxonomy and adversarial model for attacks against network log anonymization. In Proceedings of the 2009 ACM Symposium on Applied Computing (SAC’09). ACM, New York, NY, 1286--1293.
    [37]
    Fred Klassen and AppNeta. 2017. Tcpreplay - Pcap editing and replaying utilities. Retrieved November 7, 2017 from http://tcpreplay.appneta.com/.
    [38]
    E. Kohler. 2001. IPSummaryDump. Retrieved November 7, 2017 from http://www.read.seas.harvard.edu/&sim;kohler/ipsumdump/man.html.
    [39]
    Eddie Kohler. 2006. Click for Measurement. Technical Report. UCLA Computer Science Department.
    [40]
    Tadayoshi Kohno, Andre Broido, and K. C. Claffy. 2005. Remote physical device fingerprinting. IEEE Trans. Depend. Sec. Comput. 2, 2 (Apr. 2005), 93--108.
    [41]
    D. Koukis, S. Antonatos, D. Antoniades, and E. P. Markatos. 2006. A generic anonymization framework for network traffic. In Proceedings of the IEEE International Conference on Communications (ICC’06). IEEE.
    [42]
    Christian Kreibich. 2004. Design and implementation of netdude, a framework for packet trace manipulation. In Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference. University of Cambridge Computer Laboratory.
    [43]
    C. Kreibich. 2006. NetDude. Retrieved November 7, 2017 from http://netdude.sourceforge.net/.
    [44]
    J. Kristoff. 2005. IP::Anonymous. Retrieved November 7, 2017 from http://search.cpan.org/dist/IP-Anonymous/.
    [45]
    Kiran Lakkaraju and Adam J. Slagell. 2008. Evaluating the utility of anonymized network traces for intrusion detection. In Proceedings of the EAI International Conference on Security and Privacy in Communication Networks (SecureComm’08), Albert Levi, Peng Liu 0005, and Refik Molva (Eds.). ACM, 17.
    [46]
    LIAM Group. 2008. FLAIM Core Users Guide.
    [47]
    LIAM Working group. 2008. FLAIM. Retrieved November 7, 2017 from http://web.archive.org/web/20120722155401/http://flaim.ncsa.illinois.edu/.
    [48]
    Po-Ching Lin and Yi-Wen Lin. 2012. Towards packet anonymization by automatically inferring sensitive application fields. In Proceedings of the 2012 14th International Conference on Advanced Communication Technology (ICACT’12). 87--92.
    [49]
    Ying-Dar Lin and et al. 2012. PCAPAnon. Retrieved November 7, 2017 from https://sourceforge.net/projects/pcaplib/.
    [50]
    Y.-D. Lin, P.-C. Lin, S.-H. Wang, I.-W. Chen, and Y.-C. Lai. 2014. PCAPLib: A system of extracting, classifying, and anonymizing real packet traces. IEEE Syst. J. 10, 2 (2014), 520–531.
    [51]
    Richard P. Lippmann, David J. Fried, Isaac Graf, Joshua W. Haines, Kristopher R. Kendall, David McClung, Dan Weber, Seth E. Webster, Dan Wyschogrod, Robert K. Cunningham, and others. 2000. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of the DARPA Information Survivability Conference and Exposition 2000 (DISCEX’00), Vol. 2. IEEE, 12--26.
    [52]
    P. Lorier and et al. 2010. TraceAnon. Retrieved November 7, 2017 from http://www.wand.net.nz/trac/libtrace/wiki/TraceAnon.
    [53]
    Michael Luby and Charles Rackoff. 1986. Pseudo-random permutation generators and cryptographic composition. In Proceedings of the 18th Annual ACM Symposium on Theory of Computing. ACM, 356--363.
    [54]
    Gordon Lyon. 2009. Nmap Network Scanning. Insecure Press.
    [55]
    Christoph P. Mayer, Thomas Gamer, and Marcus Schöller. 2008. PktAnon Manual. Retrieved from http://www.tm.uka.de/software/pktanon.
    [56]
    C. Mazzariello and et al. 2013. Tcpdump Anonymizer. Retrieved November 7, 2017 from https://sourceforge.net/projects/anonymizer/.
    [57]
    John McHugh. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3, 4 (2000), 262--294.
    [58]
    Greg Minshall. 2005. Tcpdpriv project page. Retrieved November 7, 2017 from http://ita.ee.lbl.gov/html/contrib/tcpdpriv.html.
    [59]
    David Moore, Ken Keys, Ryan Koga, Edouard Lagache, and K. C. Claffy. 2001. The coralreef software suite as a tool for system and network administrators. In Proceedings of the 15th USENIX Conference on System Administration (LISA’01). USENIX Association, Berkeley, CA, 133--144.
    [60]
    Y. Nakamura, S. Sawaguchi, and H. Nishi. 2017. Implementation and evaluation of an FPGA-based network data anonymizer. IEEJ Trans. Elect. Electron. Eng. 12, 134--140.
    [61]
    Network Sorcery Inc. 2012. IP Options. Retrieved November 7, 2017 from http://www.networksorcery.com/enp/protocol/ip.htm#Options.
    [62]
    Ruoming Pang, Mark Allman, Vern Paxson, and Jason Lee. 2006. The devil and packet trace anonymization. SIGCOMM Comput. Commun. Rev. 36, 1 (Jan. 2006), 29--38.
    [63]
    R. Pang and et al. 2005. tcpmkpub. Retrieved November 7, 2017 from http://www.icir.org/enterprise-tracing/tcpmkpub.html.
    [64]
    Ruoming Pang and Vern Paxson. 2003. A high-level programming environment for packet trace anonymization and transformation. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM’03). ACM, New York, NY, 339--351.
    [65]
    Andreas Pfitzmann and Marit Köhntopp. 2001. Anonymity, unobservability, and pseudonymity a proposal for terminology. In Designing Privacy Enhancing Technologies. Springer, 1--9.
    [66]
    Thomas H. Ptacek and Timothy N. Newsham. 1998. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Secure Networks Inc. Retrieved November 7, 2017 from http://insecure.org/stf/secnet_ids/secnet_ids.html.
    [67]
    Ramaswamy Ramaswamy, Ning Weng, and Tilman Wolf. 2004. An IXA-based network measurement node. In Proceedings of the Intel IXA University Summit, 2004.
    [68]
    D. Riboni, A. Villani, D. Vitali, C. Bettini, and L. V. Mancini. 2015. Obfuscation of sensitive data for incremental release of network flows. IEEE/ACM Trans. Netw. 23, 2 (Apr. 2015), 672--686.
    [69]
    Malcolm Scott. 2010. A wire-speed packet classification and capture module for NetFPGA. In Proceedings of the 1st European NetFPGA Developers’ Workshop.
    [70]
    V. E. Seeberg and S. Petrovic. 2007. A new classification scheme for anonymization of real data used in IDS benchmarking. In Proceedings of the 2nd International Conference on Availability, Reliability and Security 2007 (ARES’07). 385--390.
    [71]
    A. J. Slagell, Yifan Li, and K. Luo. 2005. Sharing network logs for computer forensics: A new tool for the anonymization of netflow records. In Proceedings of the Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks. 37--42.
    [72]
    Adam J. Slagell, Kiran Lakkaraju, and Katherine Luo. 2006. FLAIM: A multi-level anonymization framework for computer and network logs. CoRR abs/cs/0606063 (2006). http://arxiv.org/abs/cs/0606063
    [73]
    Michael Sobirey, Simone Fischer-Hübner, and Kai Rannenberg. 1997. Pseudonymous Audit for Privacy Enhanced Intrusion Detection. Springer, Boston, MA, 151--163.
    [74]
    David Stott. 2006. Lucent’s extensions to Crypto-PAn. Retrieved November 7, 2017 from http://www.cc.gatech.edu/computing/Networking/projects/cryptopan/lucent.shtml.
    [75]
    S. Ubik, P. Zejdl, and J. Halaffik. 2007. Real-time anonymization in passive network monitoring. In Proceedings of the 3rd International Conference on Networking and Services 2007 (ICNS’07). 100--100.
    [76]
    Universita degli Studi di Brescia. 2009. tcpanon. Retrieved November 7, 2017 from http://netweb.ing.unibs.it/&sim;ntw/tools/tcpanon/index.php
    [77]
    Jeroen van der Ham and Roland van Rijswijk-Deij. 2017. Ethics and internet measurements. J. Cyber Secur. Mobil. 5, 4 (2017), 287--308.
    [78]
    Roland van Rijswijk-Deij. 2015. Ethical NREN data sharing. In Proceedings of the Terena Networking Conference 2015.
    [79]
    Roland van Rijswijk-Deij. 2015. Ethics in data sharing—A best practice for NRENs.
    [80]
    Tran Huy Vu, Nguyen Quoc Tuan, Tran Ngoc Thinh, and Nguyen Tran Huu Nguyen. 2011. Memory-efficient TCP reassembly using FPGA. In Proceedings of the 2nd Symposium on Information and Communication Technology (SoICT’11). ACM, New York, NY, 238--243.
    [81]
    Sheng-Hao Wang and Ying-Dar Lin. 2010. Extracting, Classifying and Anonymizing Packet Traces with Case Studies on False Positive/Negative Assessment. Master’s thesis.
    [82]
    Jun Xu, Jinliang Fan, Mostafa Ammar, and Sue B. Moon. 2001. On the design and performance of prefix-preserving IP traffic trace anonymization. In Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement (IMW’01). ACM, New York, NY, 263--266.
    [83]
    Addy Yeow and Chin Heng. 2012. Bit-Twist: Libpcap-bassed Ethernet packet generator. Retrieved November 7, 2017 from http://bittwist.sourceforge.net/.
    [84]
    Tatu Ylonen. 2001. Thoughts on How to Mount an Attack on tcpdpriv’s “-A50” Option. Retrieved November 7, 2017 from http://ita.ee.lbl.gov/html/contrib/attack50/attack50.html.
    [85]
    W. Yurcik, C. Woolam, G. Hellings, Latifur Khan, and Bhavani Thuraisingham. 2007. SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs. In Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops 2007 (SecureComm’07). 49--56.
    [86]
    William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, and Bhavani M. Thuraisingham. 2007. Toward trusted sharing of network packet traces using anonymization: Single-field privacy/analysis tradeoffs. CoRR abs/0710.3979 (2007). http://arxiv.org/abs/0710.3979.
    [87]
    Pei Zhang, Xiao hong Huang, Min qi Luo, Chun yu Ning, and Yan Ma. 2010. Fast restorable prefix-preserving IP address anonymization for IPv4/IPv6. J. Chin. Univ. Posts Telecommun. 17, Suppl. 2, 0 (2010), 93--98.
    [88]
    Bin Zhou, Jian Pei, and WoShun Luk. 2008. A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM SIGKDD Explor. Newslett. 10, 2 (2008), 12--22.
    [89]
    Noa Zilberman, Yury Audzevich, G. Adam Covington, and Andrew W. Moore. 2014. Netfpga sume: Toward 100 gbps as research commodity. IEEE Micro 5 (2014), 32--41.

    Cited By

    View all
    • (2023)Capture and Analysis of Traffic Traces on a Wide-Area NDN TestbedProceedings of the 10th ACM Conference on Information-Centric Networking10.1145/3623565.3623707(101-108)Online publication date: 9-Oct-2023
    • (2023)Privacy risk analysis and metrics in capturing and storing network traffic2023 24th International Conference on Control Systems and Computer Science (CSCS)10.1109/CSCS59211.2023.00097(580-585)Online publication date: May-2023
    • (2023)Characterizing Wireless Link Throughput with eBPF and Hardware Timestamps2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)10.1109/CAMAD59638.2023.10478419(302-308)Online publication date: 6-Nov-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Computing Surveys
    ACM Computing Surveys  Volume 51, Issue 3
    May 2019
    796 pages
    ISSN:0360-0300
    EISSN:1557-7341
    DOI:10.1145/3212709
    • Editor:
    • Sartaj Sahni
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 May 2018
    Accepted: 01 January 2018
    Revised: 01 November 2017
    Received: 01 October 2016
    Published in CSUR Volume 51, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Anonymisation
    2. cryptography
    3. framework
    4. identification
    5. network capture
    6. sensitive data
    7. transformation

    Qualifiers

    • Survey
    • Research
    • Refereed

    Funding Sources

    • Dutch National Coordinator for Security and Counterterrorism

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)61
    • Downloads (Last 6 weeks)4

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Capture and Analysis of Traffic Traces on a Wide-Area NDN TestbedProceedings of the 10th ACM Conference on Information-Centric Networking10.1145/3623565.3623707(101-108)Online publication date: 9-Oct-2023
    • (2023)Privacy risk analysis and metrics in capturing and storing network traffic2023 24th International Conference on Control Systems and Computer Science (CSCS)10.1109/CSCS59211.2023.00097(580-585)Online publication date: May-2023
    • (2023)Characterizing Wireless Link Throughput with eBPF and Hardware Timestamps2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)10.1109/CAMAD59638.2023.10478419(302-308)Online publication date: 6-Nov-2023
    • (2021)RICSel21 Data Collection: Attacks in a Virtual Power Network2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)10.1109/SmartGridComm51999.2021.9632328(201-206)Online publication date: 25-Oct-2021
    • (2021)Sec4ML: An approach to support Cybersecurity Data Publishing for Machine Learning tasks2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW)10.1109/EDOCW52865.2021.00053(226-235)Online publication date: Oct-2021
    • (2020)Application and preliminary evaluation of Anontool applied in the anomaly detection module2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)10.1109/WETICE49692.2020.00031(119-123)Online publication date: Sep-2020
    • (2020)Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)10.1109/CyberSecurity49315.2020.9138869(1-8)Online publication date: Jun-2020
    • (2019)Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection SystemProceedings of the 2019 8th International Conference on Software and Computer Applications10.1145/3316615.3316626(569-573)Online publication date: 19-Feb-2019
    • (2019)Architecture of Anomaly Detection Module for the Security Operations Center2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)10.1109/WETICE.2019.00035(126-131)Online publication date: Jun-2019

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media