α-MON: Traffic Anonymizer for Passive Monitoring

Packet measurements at scale are essential for several applications, such as cyber-security, accounting and troubleshooting. They, however, threaten users’ privacy by exposing sensitive information. Anonymization has been the answer to this challenge, i.e., replacing sensitive information with obfuscated copies. Anonymization of packet traces, however, comes with some challenges and drawbacks:

  • It reduces the value of data;
  • It requires to consider diverse protocols because information may leak from many non-encrypted fields;
  • It must be performed at high speeds directly at the monitor, to prevent private data from leaking, calling for real-time solutions.

We present α-MON, a flexible tool for privacy-preserving packet monitoring. It replicates input packet streams to different consumers while anonymizing protocol fields according to flexible policies that cover all protocol layers. Beside classic anonymization mechanisms such as IP address obfuscation, α-MON supports z-anonymization, a novel solution to obfuscate rare values that can be uniquely traced back to limited sets of users. Differently from classic anonymization approaches, z-anonymization works on a streaming fashion, with zero delay, operating at high-speed links on a packet-by-packet basis. We quantify the impact of α-MON on traffic measurements, finding that it introduces minimal error when it comes to finding heavy-hitter services. We evaluate α-MON performance using packet traces collected from an ISP network and show that it achieves a sustainable rate of 40~Gbit/s on a Commercial Off-the Shelf server.


Pubblications:

The complete project is opensource and available at https://github.com/IngegnerLightyear/Alpha-MON/