A Fast and Secure Method for Anonymizing Packet Traffic and Call Traces

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review


    Various kinds of traffic traces are needed to examine the status and performance of packet switching networks. In most cases, traces contain information that can be used identify subscribers and what kind of services they have been using. This kind of information can be usually handled only by network operator. However, there is an increasing trend that many network management tasks are being outsourced and thus a method, that would allow for an external staff to monitor a public network, is needed. The method proposed in this paper is based on using normal symmetric block coding encryption methods in cipher block chaining mode. The advantages of the supposed method are that it is cryptographically strong, suitable for multi-site on-line measurements and very fast. The proposed method can be also extented to prefix-preserving IP address anonymization. This extension differs form earlier proposals by using IP address lookup to determine the real network part of the address. It is also resistant to known attacks to compromise prefix-preserving anonymization methods.
    Original languageEnglish
    Title of host publicationProceedings of the 12th WSEAS International Conference on Communications
    PublisherWSEAS Press
    Pages340 - 346
    ISBN (Print)978-960-6766-84-8
    Publication statusPublished - 2008
    MoE publication typeNot Eligible
    Event12th WSEAS International Conference on Communications - Heraklion, Greece
    Duration: 23 Jul 200825 Jul 2008


    Conference12th WSEAS International Conference on Communications
    Abbreviated titleICCOM '08


    • IP address anonymization
    • prefix-preserving anonymization
    • distributed measurements


    Dive into the research topics of 'A Fast and Secure Method for Anonymizing Packet Traffic and Call Traces'. Together they form a unique fingerprint.

    Cite this