analyzing privacy in enterprise packet trace
play

Analyzing Privacy in Enterprise Packet Trace Anonymization - PowerPoint PPT Presentation

Bruno Ribeiro, Gerome Miklau, Don Towsley UMass Amherst Weifeng Chen California University of Pennsylvania Analyzing Privacy in Enterprise Packet Trace Anonymization Motivation Internet Enterprise (university) Packets Monitor Packet


  1. Bruno Ribeiro, Gerome Miklau, Don Towsley UMass Amherst Weifeng Chen California University of Pennsylvania Analyzing Privacy in Enterprise Packet Trace Anonymization

  2. Motivation Internet Enterprise (university) Packets Monitor Packet header traces Used for networking research Many public repositories (UMass, CAIDA, LBNL, …) Raw trace may violate user privacy If enterprise IP addresses can be tied to individuals src address dest address src port dest port … 14.1.1.1 11.0.0.3 6738 80 … 18.0.0.1 11.0.0.1 2434 22 … 11.0.0.1 20.0.0.3 6913 80 … 2 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  3. Motivation Trace repositories Anonymize IP addresses Two most widely used schemes Full prefix preservation (Xu et al. , 2001) Partial prefix preservation (Pang et al. 2006) src addr. dest addr. src port dest port … Original trace 14.1.1.1 11.0.0.3 6738 80 … 11.0.0.1 20.0.0.3 7913 22 … anonymization mapping src addr. dest addr. src port dest port … Anonymized 200.0.1.2 128.0.64.2 6738 80 … trace 128.0.64.0 5.0.4.5 7913 22 … 3 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  4. Adversary Adversarial model: De-anonymize enterprise IP addresses in the trace 1. Probes (scan) enterprise network 2. Collects similar information from the trace De-anonymizes trace IPs matching (1) with (2) 4 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  5. Outline Our contributions New attack on IP anonymization: Attack overview Defined as a tree editing distance problem Worst-case analysis: From a set of trace labels (information) Assesses worst-case attack Related work Conclusions 5 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  6. Proposed attack overview Adversary provides: Labeled tree constructed using anonymized trace Labeled tree constructed from probing enterprise A cost (or distance) function (to deal with “mismatched” labels) Our algorithm finds: All de-anonymizations that comply with prefix preservation restrictions and have minimum total cost An instance of the tree edit distance problem 6 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  7. Full prefix preserving anonymization Full prefix preservation If two real addresses share first X bits, then the same two anonymized addresses share first X bits It imposes restrictions on the real IP → Anonymized IP mapping 7 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  8. Labeled trees Trace tree Probed tree Probed IP leaf labels Trace IP leaf labels Web server Traffic on port 80 Not a Web server No traffic on port 80 0 1 0 1 1 0 00 01 10 11 00 01 10 11 � Match sets: � Match set: � 00 maps to { 01 } � 00 maps to { 00, 01, 10 , 11 } � 10 maps to { 10 , 11 } � 10 maps to { 00, 01, 10 , 11 } 8 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  9. Imperfect information Trace tree Probed tree Probed IP leaf labels Trace IP leaf labels Web server Traffic on port 80 Not a Web server No traffic on port 80 00 01 10 11 00 01 10 11 Backup Web server Correct mapping � Other sources of imperfect labels: Dynamic IP addresses, host shutdown, etc. 9 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  10. Mapping costs Assign a cost to map two IPs with different labels Is zero if labels are equal Mapping cost Sum of all individual costs Example: Trace tree Probed tree Total cost = 1 Cost = 1 0 0 0 Cost = 0 Cost = 1 1 10 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  11. Proposed attack All minimum cost mappings (over the whole network) Because it is prefix-preserving Every de-anonymization limits future de-anonymizations Probed tree Trace tree 00 01 10 11 00 01 10 11 ? And our algorithm is fast 10 seconds (on this laptop) for all mappings of a network with 2 16 addresses 11 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  12. Experiment Network: class B (64K addresses) Labels “Active host” Active ports: FTP, SSH, Telnet, E-mail, Time, DNS, Web, POP3, SOCKS Trace IP labels “Active host” label – recorded any outgoing traffic “Active ports” – Recorded traffic from ports 80, 22, …. Probed IP labels Probed over all network “Active host” label – PING “Active ports” – TCP SYN ACK reply from ports 80, 22, … Naïve cost function: Zero is labels are equal, one otherwise 12 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  13. Experiment results Trace collected: 2007, June 18 th (9097 active IPs) Network probed: 2007, June 18 th 60% Incorrect 50% cumulative fraction of matches Data publisher’s view hosts in the trace 40% 30% Correct BAD 20% matches 10% 0% 1 2 3 4 5 6 7 8 size of matching set Uniquely re-identified 13 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  14. Worst-case analysis Given a labeled trace tree Find best de-anonymization We provide an algorithm that Obtains worst attack matching set size For each IP address in the trace For any label mismatch cost function For any labeled probed tree 14 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  15. Worst-case experiment Full prefix preservation June 18 th experiment Naïve attack Worst-case cumulative fraction of 100% attack hosts in the trace 80% Data publisher’s view 60% 40% BAD 20% 0% 1 2 3 4 5 6 7 8 size of matching set Uniquely re-identified 15 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  16. Partial prefix preservation Does not retain part of the address structure Used in Pang et al., 2006 Solution also formulated as an instance of the tree edit distance problem Anonymization Probed tree root mapping Anonymized tree root Probed tree root Anonymized tree root … … 8 bits 8 bits 8 bits 8 bits 8 bits 8 bits 8 bits 8 bits Up to 256 addresses 16 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  17. Partial vs. Full prefix preservation Intuition: Partial is much safer than full prefix preservation Worst case: Partial prefix preservation 100% cumulative fraction of Worst case: Full prefix hosts in the trace 80% preservation Data publisher’s view 60% BAD 40% 20% 0% 1 2 3 4 5 6 7 8 size of matching set 17 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  18. Worst-case analysis (II) Uniquely re-identified Full prefix preservation: 2713 active IP addresses in the trace Partial prefix preservation: 113 active IP addresses in the trace Partial prefix preservation is safer but not completely safe 18 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  19. Related work “Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Traces”, Scott Coull, Charles Wright, Fabian Monrose, Michael Collins and Michael Reiter, NDSS 2007 An attack on partial prefix preservation “Taming the Devil: Techniques for Evaluating Anonymized Network Data”, Scott Coull, Charles Wright, Fabian Monrose, Angelos Keromytis and Michael Reiter, NDSS 2008 Comes right after this talk ☺ 19 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  20. Conclusions Attack Include global mapping restrictions An instance of the tree edit distance problem Indicates that full prefix preservation has flaws Impact of late probing on the de-anonymization Worst-case analysis Can help future anonymization schemes A tool for data publishers Experiments indicate that: Partial is much safer than full prefix preservation But still not completely safe 20 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

  21. Thanks Jim Kurose , UMass Amherst Edmundo de Souza e Silva , Federal University of Rio de Janeiro Kyoungwon Suh , Illinois State University Anonymous NDSS’08 reviewers Neils Provos , Google Inc. 21 Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley, Analyzing Privacy in Enterprise Packet Trace Anonymization

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend