Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Privacy-preserving network forensics
Afanasyev M., Kohno T., Ma J., Murphy N., Savage S., Snoeren A., Voelker G. Communications of the ACM54 (5):78-87,2011.Type:Article
Date Reviewed: Jul 18 2011

The Internet offers users some anonymity; at the network level, an Internet protocol (IP) address is only loosely associated with a device, and is not associated with a person. This article proposes the use of group signatures to bind the identity of the device responsible for sending a packet with the contents of the packet.

The group signature allows anyone to check that the signature is valid, but requires a number of cooperating group members to reveal the identity of the device from a signed packet. The authors suggest that manufacturers might include a unique device ID in their products, which could then be linked to the owner via purchase and maintenance records.

The article discusses some of the privacy issues, but does not consider the possible actions of a motivated offender. For example, an offender could hijack a computer and easily send IP packets from a machine that he controls, but that he does not own. In addition, laptops are already among the most coveted items for thieves. A clean device ID would make a laptop an even more attractive target. Finally, the billions of PCs, PDAs, and smartphones in use without device IDs would be preferred tools for offenders.

The clever technology proposed by Afanasyev et al. may help to trace back IP packets in some cases, but it is questionable whether the benefits outweigh the disadvantages.

Reviewer:  Pieter Hartel Review #: CR139251 (1112-1304)
Bookmark and Share
 
Security and Protection (D.4.6 )
 
 
Electronic Commerce (K.4.4 )
 
 
General (C.2.0 )
 
 
Public Policy Issues (K.4.1 )
 
 
Security and Protection (K.6.5 )
 
 
User Interfaces (H.5.2 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy