Academia.eduAcademia.edu

Confidential Guarantee in Network Flow using Obfuscation Scheme

Large datasets of real network flows acquired from the Internet are an invaluable resource for the research community. Unfortunately, network flows carry extremely sensitive information, and this discourages the publication of those datasets. Indeed, existing techniques for network flow sanitization are vulnerable to different kinds of attacks, and solutions proposed for micro data anonymity cannot be directly applied to network traces. In our previous research, we proposed an obfuscation technique for network flows, providing formal confidentiality guarantees under realistic assumptions about the adversary's knowledge. To identify the threats posed by the incremental release of network flows and by using SHA-3 algorithm and formally prove the achieved confidentiality guarantees. To partition hosts in homogeneous groups by Fingerprint based group creation algorithm, we use system details: OS, RAM, Processor, User, IP address.

IJSTE - International Journal of Science Technology & Engineering | Volume 2 | Issue 10 | April 2016 ISSN (online): 2349-784X Confidential Guarantee in Network Flow using Obfuscation Scheme Rahumathun Kamila.K Department of Computer Science & Engineering Christian College of Engineering & Technology Oddanchatram, Dindigul, Tamilnadu-624619, India Sathya.R Department of Computer Science & Engineering Christian College of Engineering & Technology Oddanchatram, Dindigul, Tamilnadu-624619, India Vasanthi.G Department of Computer Science & Engineering Christian College of Engineering & Technology Oddanchatram, Dindigul, Tamilnadu-624619, India Roy Sudha Reetha.P Department of Computer Science & Engineering Christian College of Engineering & Technology Oddanchatram, Dindigul, Tamilnadu-624619, India Abstract Large datasets of real network flows acquired from the Internet are an invaluable resource for the research community. Unfortunately, network flows carry extremely sensitive information, and this discourages the publication of those datasets. Indeed, existing techniques for network flow sanitization are vulnerable to different kinds of attacks, and solutions proposed for micro data anonymity cannot be directly applied to network traces. In our previous research, we proposed an obfuscation technique for network flows, providing formal confidentiality guarantees under realistic assumptions about the adversary's knowledge. To identify the threats posed by the incremental release of network flows and by using SHA-3 algorithm and formally prove the achieved confidentiality guarantees. To partition hosts in homogeneous groups by Fingerprint based group creation algorithm, we use system details: OS, RAM, Processor, User, IP address. Keywords: Data sharing, network flow analysis, privacy, security ________________________________________________________________________________________________________ I. INTRODUCTION Obfuscation technique is used to make confidential guarantee for IP address, thus securing the sensitive data and it includes identification of security attacks, validation, network modeling and simulation. Obfuscation method is used to obfuscate a source and destination IP address. To provide high security in network flows. To obfuscate the high sensible incremental data in network flows using obfuscation techniques. With respect to our previous work, the original contributions of this paper consist in: 1) The identification of confidentiality threats that may arise from the incremental release of network traces. 2) A novel defense algorithm to apply obfuscation to incremental releases of network traces. 3) A theoretical proof of the confidentiality guarantees provided by the defense algorithms. 4) An extensive experimental evaluation of the algorithm for incremental obfuscation, carried out with billions of Real flows generated by the border router of a commercial autonomous system. In this experiments on traffic diversity, statistical analysis of flow fields, and network flow analysis. II. RELATED WORK Early techniques for network flow obfuscation were based on the encryption of source and destination IP addresses. However,those techniques proved to be ineffective since an adversary might be able to reidentify message source and destination by other values of network flows against network flow sanitization methods these techniques, fall into two main categories. Fingerprinting: Messages reidentification is performed by matching fields’ values to the characteristics of the target environment (knowledge of network topology and settings, OS and services of target hosts, etc.). Typical re-identifying values for network flows are type of service, TCP flags, number of bytes, and number of packets per flow. Injection: The adversary injects a sequence of flows in the target network that are easily recognized due to their specific characteristics; e.g., marked with uncommon TCP flags, or following particular patterns. All rights reserved by www.ijste.org 134 Confidential Guarantee in Network Flow using Obfuscation Scheme (IJSTE/ Volume 2 / Issue 10 / 028) III. ARCHITECTURES Existing System In the existing system, we proposed an obfuscation technique for network flows, providing formal confidentiality guarantees under realistic assumptions about the adversary’s knowledge. We have presented (k , j ) obfuscation, an obfuscation technique for network flows, which provides formal confidentiality guarantees under realistic assumptions the adversary's knowledge, while preserving the utility of released data. Moreover, the incremental release provides important technical advantages. Indeed, the computational costs and the memory requirements for obfuscating a large dataset could be strongly reduced by partitioning the dataset in smaller subsets and by running the obfuscation process independently on each subset. Network flow initializing. Creating Network Flows and generates following fingerprints (id, hostname, memory, IP address etc) of that network and with help of Admin maintaining all Network Flows in one path. (k , j) Obfuscation: Each IP-group contains at least different IP addresses that appear in. Formally, for each group-ID appearingin a flow , there exists a set of at least IP addresses appearing in a flow in such that, for each group-ID . p2: Each flow is fp-indistinguishable in a set of at leastflows in originated by distinct IP addresses belongingto the same IP-group.is undefined if the above properties cannot be satisfied—i.e., if involves less than different IP addresses(it is impossible to enforce p1) or if contains less than flows(it is impossible to enforce p2). Data Flow Diagram Fig. 1: Proposed System To identify the threats posed by the incremental release of network flows and by using SHA-3 algorithm and formally prove the achieved confidentiality guarantees. To partition hosts in homogeneous groups by Fingerprint based group creation algorithm, we use system details: OS, RAM, Processor, User, IP address. In order to evaluate the effectiveness of our grouping method, To measure the homogeneity of hosts of the same group according to their fingerprint vectors.In network flow obfuscation to obfuscate a source and destination IP address. Using fingerprint the data will be send to router. Router sends that fingerprint to Host Identity. If finger print is matching in any group then host ID send the data to that fingerprint. All rights reserved by www.ijste.org 135 Confidential Guarantee in Network Flow using Obfuscation Scheme (IJSTE/ Volume 2 / Issue 10 / 028) System architecture: Fig. 2: Focus Of Our Work: Fig. 3: Fingerprint Based Group Creation Fingerprint is based on OS, RAM, Processor, Username and IP address on each node. Creating fingerprint for each nodes and mapping the nodes. For the nodes having similar values we create group for that nodes. The goal of our fingerprint-based IPgroups creation method is to enforce property obfuscation while preserving the quality of obfuscated data. In order to reach this goal, IP-groups are created by grouping together IPs whose hosts have a similar fingerprint . Group Identity and Group Intimation To identify the group, we create a group ID for each at means nodes in which group and id that information is send to all nodes. Markov models are used to create groups of hosts having similar network behavior. In order to enforce anonymity, the real IP address of each flow is substituted by its group ID before being released. However, there is neither experimental evidence nor a formal guarantee that, with this statistically driven approach, an adversary applying available domain knowledge cannot reidentify hosts by their fingerprint. Obfuscation of Sensitive Data in Network Flow IP-groups are created by their fingerprint values. By this, the real IPs in network flows is substituted by the identifier of the IPgroup they belongs to one host. After initializing the set of obfuscated flows, for each IP-group, the flows generated by the hosts of its IP address are taken and fp-indistinguish ability is enforced and the obfuscated flows is added to all networks. All rights reserved by www.ijste.org 136 Confidential Guarantee in Network Flow using Obfuscation Scheme (IJSTE/ Volume 2 / Issue 10 / 028) IV. CONCLUSION To addressed the challenging research issue of network flow obfuscation. A proposed a novel defense algorithm to enforce obfuscation to incremental releases, and SHA-3 proved the confidentiality guarantees. All network flow is maintained in one path and making high confidential for source and destination IP addresses. REFERENCES [1] [2] [3] [4] [5] J. King, K. Lakkaraju, and A. J. Slagell, “A taxonomy and adversarial model for attacks against network log anonymization,” in Proc. ACM SAC, 2009, pp. 1286–1293. S. E. Coull, C. V. Wright, F. Monrose, M. P. Collins, and M. K. Reiter, “Playing devil's advocate: Inferring sensitive information from anonymized network traces,” in Proc. NDSS, 2007. S. E. Coull, M. P. Collins, C. V. Wright, F. Monrose, and M. K. Reiter, “On Web browsing privacy in anonymized NetFlows,” in Proc. USENIX Security, 2007, pp. 339–352. F. McSherry and R. Mahajan, “Differentially-private network trace analysis,” in Proc. ACM SIGCOMM, 2010, pp. 123–134 A. Villani, D. Vitali, D. Riboni, C. Bettini, and L. V. Mancini, “Obsidian:a scalable and efficient framework for NetFlow obfuscation,”in Proc. IEEE INFOCOM, 2013, pp. 7–8. All rights reserved by www.ijste.org 137