Catch, Clean, and Release: A Survey of Obstacles and Opportunities for Network Trace Sanitization. Tan, K., Yeo, J., Locasto, M., E., & Kotz, D. Catch, Clean, and Release: A Survey of Obstacles and Opportunities for Network Trace Sanitization, pages 111-141. Chapman and Hall/CRC Press, 1, 2011.
Catch, Clean, and Release: A Survey of Obstacles and Opportunities for Network Trace Sanitization [link]Website  abstract   bibtex   
Network researchers benefit tremendously from access to traces of production networks, and several repositories of such network traces exist. By their very nature, these traces capture sensitive business and personal activity. Furthermore, network traces contain significant operational information about the target network, such as its structure, identity of the network provider, or addresses of important servers. To protect private or proprietary information, researchers must ``sanitize'' a trace before sharing it. In this chapter, we survey the growing body of research that addresses the risks, methods, and evaluation of network trace sanitization. Research on the risks of network trace sanitization attempts to extract information from published network traces, while research on sanitization methods investigates approaches that may protect against such attacks. Although researchers have recently proposed both quantitative and qualitative methods to evaluate the effectiveness of sanitization methods, such work has several shortcomings, some of which we highlight in a discussion of open problems. Sanitizing a network trace, however challenging, remains an important method for advancing network--based research.
@inBook{
 title = {Catch, Clean, and Release: A Survey of Obstacles and Opportunities for Network Trace Sanitization},
 type = {inBook},
 year = {2011},
 keywords = {dartmouth-cs},
 pages = {111-141},
 websites = {http://www.crcpress.com/product/isbn/9781439803653},
 month = {1},
 publisher = {Chapman and Hall/CRC Press},
 chapter = {5},
 editors = {[object Object],[object Object]},
 id = {d03037b8-fcba-34a0-b69d-ddbe519cfbef},
 created = {2018-07-12T21:31:21.791Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:31:21.791Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {tan:survey},
 source_type = {incollection},
 private_publication = {false},
 abstract = {Network researchers benefit tremendously from access to traces of production networks, and several repositories of such network traces exist. By their very nature, these traces capture sensitive business and personal activity. Furthermore, network traces contain significant operational information about the target network, such as its structure, identity of the network provider, or addresses of important servers. To protect private or proprietary information, researchers must ``sanitize'' a trace before sharing it. In this chapter, we survey the growing body of research that addresses the risks, methods, and evaluation of network trace sanitization. Research on the risks of network trace sanitization attempts to extract information from published network traces, while research on sanitization methods investigates approaches that may protect against such attacks. Although researchers have recently proposed both quantitative and qualitative methods to evaluate the effectiveness of sanitization methods, such work has several shortcomings, some of which we highlight in a discussion of open problems. Sanitizing a network trace, however challenging, remains an important method for advancing network--based research.},
 bibtype = {inBook},
 author = {Tan, Keren and Yeo, Jihwang and Locasto, Michael E and Kotz, David},
 book = {Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques}
}

Downloads: 0