T. Brekne and A. Årnes (Norway)
Network Security, Network Monitoring, Anonymity, Traf fic Analysis
This paper presents an attack that circumvents anonymiza tion of IP addresses in IP network traffic data in O(n2 ) time, or O(n) time under certain circumstances. The attack is based on packet injection, and circumvents all anonymization techniques that assign a static and unique pseudonym to an IP address. It turns out that the packet injection itself, as well as the extraction of the correspond ing anonymized header data, are the most time-consuming steps.
Important Links:
Go Back