Impacto da Anonimização do Tráfego em Redes na Identificação de Dispositivos e na Detecção de Anomalias

  • Ariel L. C. Portela UECE
  • Wanderson L. Costa UECE
  • Rafael A. Menezes UECE
  • Rafael L. Gomes UECE

Abstract


Currently, a crucial aspect of networking management is monitoring it’s traffic, where Machine Learning (ML) comes in. ML has been used to perform various tasks, such as loT device identification and detection of network anomalies. However, access to information about network traffic can affect users’ privacy, thus violating existing privacy laws. Within this context, this article analyzes the impact of network traffic anonymization, ensuring privacy when identifying the device and detecting anomaly solutions by basing on feature selection techniques. The carried out experiments, used a real dataset, which results showed that when using the selection and ML techniques combined, the anonymization of traffic reduces the identification capacity. In addition, using those techniques also preserve user’s privacy while maintaining the detection capacity of network anomalies.

References

Alanis, A. Y., Arana-Daniel, N., and Lopez-Franco, C. (2019). Artificial neural networks for engineering applications. Academic Press.

CAIDA (2020). Summary of anonymization best practice techniques. https://www.caida.org/.

Clarke, N., Li, F., and Furnell, S. (2017). A novel privacy preserving user identification approach for network traffic. Computers Security, 70:335–350.

Friedman, J., Hastie, T., and Tibshirani, R. (2010). Regularization paths for generalized linear models via coordinate descent. Journal of statistical software, 33(1):1.

Geurts, P., Ernst, D., and Wehenkel, L. (2006). Extremely randomized trees. Machine learning, 63(1):3–42.

Hwang, W.-J. and Wen, K.-W. (1998). Fast knn classification algorithm based on partial distance search. Electronics letters, 34(21):2062–2063.

Li, H., Ota, K., and Dong, M. (2018). Learning iot in edge: deep learning for the internet of things with edge computing. IEEE Network, 32(1):96–101.

Meurer, W. J. and Tolles, J. (2017). Logistic regression diagnostics: understanding how well a model predicts outcomes. Jama, 317(10):1068–1069.

Pang, R. (2016). The devil and packet trace anonymization. Computer Communication Review, 36(1):29–38.

Sharafaldin, I., Lashkari, A. H., Hakak, S., and Ghorbani, A. A. (2019). Developing realistic distributed denial of service (ddos) attack dataset and taxonomy. In 2019 International Carnahan Conference on Security Technology (ICCST), pages 1–8. IEEE.

Sivanathan, A., Gharakheili, H. H., Loi, F., Radford, A., Wijenayake, C., Vishwanath, A., and Sivaraman, V. (2018). Classifying iot devices in smart environments using network traffic characteristics. IEEE Transactions on Mobile Computing, 18(8):1745–1759.
Published
2022-05-23
PORTELA, Ariel L. C.; COSTA, Wanderson L.; MENEZES, Rafael A.; GOMES, Rafael L.. Impacto da Anonimização do Tráfego em Redes na Identificação de Dispositivos e na Detecção de Anomalias. In: WORKSHOP ON SCIENTIFIC INITIATION AND GRADUATION - BRAZILIAN SYMPOSIUM ON COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS (SBRC), 40. , 2022, Fortaleza/CE. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2022 . p. 217-224. ISSN 2177-9384. DOI: https://doi.org/10.5753/sbrc_estendido.2022.223552.