Circumventing IP-Address Pseudonymization

T. Brekne and A. Årnes (Norway)

Keywords

Network Security, Network Monitoring, Anonymity, Traf fic Analysis

Abstract

This paper presents an attack that circumvents anonymiza tion of IP addresses in IP network traffic data in O(n2 ) time, or O(n) time under certain circumstances. The attack is based on packet injection, and circumvents all anonymization techniques that assign a static and unique pseudonym to an IP address. It turns out that the packet injection itself, as well as the extraction of the correspond ing anonymized header data, are the most time-consuming steps.

Important Links:



Go Back