Abstract
Estimating the number of hosts that have been assigned to an Internet address is a challenging problem due to confounding factors such as the dynamic allocation of addresses and the prohibition of access to privacy sensitive data that can reveal user identities and remove anonymity. We propose a probabilistic method that strikes a desired balance between protection of anonymity and accuracy of estimation. By utilising the phenomenon of preferential attachment, we show that the number of hosts corresponding to an address is accurately predicted by the number of times that an address appears in a series of alternating ON and OFF intervals. We validate our method using a four month trace of dynamic address allocations at a campus wireless network. In so doing, we demonstrate the practical significance and utility of such an anonymity preserving method for estimating the number of hosts corresponding to a dynamic address.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anderson, D.G., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., Shenker, S.: Accountable Internet Protocol (AIP). In: Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, pp. 339–350. ACM (August 2008)
Barabasi, A.L., Albert, R.: Emergence of Scaling in Random Networks. Science 286(5439), 509–512 (1999)
Bellovin, S.M.: A Technique for Counting NATted Hosts. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, pp. 267–272. ACM, New York (2002)
Cai, X., Heidemann, J.: Understanding Block-level Address Usage in the Visible Internet. In: Proceedings of the ACM SIGCOMM Conference, pp. 99–110. ACM (August 2010)
Clauset, A., Shalizi, C.R., Newman, M.E.J.: Power-law Distributions in Empirical Data. SIAM Review 51(4), 661–703 (2009)
Droms, R.: RFC 2131: Dynamic Host Configuration Protocol. (March 1997), http://tools.ietf.org/html/rfc2131 (accessed on January 25, 2010)
Fischer, W., Meier-Hellstern, K.: The Markov-modulated Poisson process (MMPP) cookbook. Performance Evaluation 18, 149–171 (1992)
Heidemann, J., Pradkin, Y., Govindan, R., Papadopoulos, C., Bartlett, G., Bannister, J.: Census and Survey of the Visible Internet. In: Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, pp. 169–182. ACM (October 2008)
Holz, T., Gorecki, C., Reick, K., Freiling, F.C.: Measuring and Detecting Fast-Flux Service Networks. In: Proceedings of the 16th Annual Network & Distributed System Security Symposium, ISOC (February 2008)
Information Sciences Institute, University of Southern California: RFC 791: Internet Protocol (September 1981), http://tools.ietf.org/html/rfc791 (accessed on January 25, 2010)
Khadilkar, M., Feamster, N., Sanders, M., Clark, R.: Usage-Based DHCP Lease Time Optimization. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. ACM (2007)
Kreibich, C., Weaver, N., Nechaev, B., Paxson, V.: Netalyzr: Illuminating The Edge Network. In: Proceedings of ACM Internet Measurement Conference. ACM (November 2010)
Le-Ngoc, T., Subramanian, S.: A Pareto-modulated Poisson process (PMPP) model for long-range dependent traffic. Computer Communications 23, 123–132 (2000)
Leland, W.E., Taqqu, M.S., Willinger, W., Wilson, D.: On the Self-Similar Nature of Ethernet Traffic (Extended Version). IEEE/ACM Transactions on Networking 2(1), 1–15 (1994)
Maier, G., Feldmann, A., Paxson, V., Allman, M.: On Dominant Characteristics of Residential Broadband Internet Traffic. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, pp. 90–102. ACM (November 2009)
Mitzenmacher, M.: A Brief History of Generative Models for Power Law and Lognormal Distributions. Internet Mathematics 1(2), 226–251 (2004)
Mockapetris, P.: RFC 1035: Domain Names: Implementation and Specification (November 1987), http://tools.ietf.org/html/rfc1035 (accessed on January 25, 2010)
Osterweil, E., Amante, S., McPherson, D., Massey, D.: The Great IPv4 Land Grab: Resource Certification for the IPv4 Grey Market. In: Proceedings of the Tenth ACM Workshop on Hot Topics in Networks. ACM (November 2011)
Paxson, V., Floyd, S.: Wide-Area Traffic: The Failure of Poisson Modeling. IEEE/ACM Transactions on Networking 3(3), 226–244 (1995)
Rabiner, L.R., Juang, B.H.: An Introduction to Hidden Markov Models. IEEE ASSP Magazine 3(1), 4–16 (1986)
Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: My Botnet is Bigger than Yours (Maybe, Better than Yours): why size estimates remain challenging. In: Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets. USENIX Association (April 2007)
Rigney, C., Willens, S., Rubens, A., Simpson, W.: RFC 2865: Remote Authentication Dial In User Service (June 2000), http://tools.ietf.org/html/rfc2865 (accessed on January 25, 2010)
Taqqu, M.S., Willinger, W., Sherman, R.: Proof of a Fundamental Result in Self-Similar Traffic Modeling. ACM SIGCOMM Computer Communications Review 27(2), 5–23 (1997)
Tsuchiya, P.F., Eng, T.: Extending the IP Internet Through Address Reuse. ACM SIGCOMM Computer Communication Review 23(1), 16–33 (1993)
Victorian Consolidated Legislation: Information Privacy Act 2000 - SCHEDULE 1 (2000), http://goo.gl/PAFdZ (accessed on June 12, 2012)
Hsu, W., Helmy, A.: CRAWDAD trace set usc/mobilib/dhcp (v. 2007-01-08) (January 2007), http://crawdad.cs.dartmouth.edu/usc/mobilib/dhcp (accessed on March 5, 2011)
Wilcox, C., Papadopoulos, C., Heidemann, J.: Correlating Spam Activity with IP Address Characteristics. In: Proceedings of INFOCOM IEEE Conference on Computer Communications. IEEE (2010)
Willinger, W., Taqqu, M.S., Sherman, R., Wilson, D.V.: Self-Similarity Through High Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level. IEEE/ACM Transactions on Networking 5(1), 71–86 (1997)
Xie, Y., Yu, F., Abadi, M.: De-anonymizing the Internet Using Unreliable IDs. In: Proceedings of the 2009 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 75–86. ACM (August 2009)
Xie, Y., Yu, F., Achan, K., Gillum, E., Goldszmidt, M., Wobber, T.: How Dynamic are IP Addresses? In: Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 301–312. ACM (August 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wahid, A., Leckie, C., Zhou, C. (2012). Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-34601-9_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34600-2
Online ISBN: 978-3-642-34601-9
eBook Packages: Computer ScienceComputer Science (R0)