2011
DOI: 10.17487/rfc6235
|View full text |Cite
|
Sign up to set email alerts
|

IP Flow Anonymization Support

Abstract: This document describes anonymization techniques for IP flow data and the export of anonymized data using the IP Flow Information Export (IPFIX) protocol. It categorizes common anonymization schemes and defines the parameters needed to describe them. It provides guidelines for the implementation of anonymized data export and storage over IPFIX, and describes an information model and Optionsbased method for anonymization metadata export within the IPFIX protocol or storage in IPFIX Files.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…When exporting MIB objects that may be considered sensitive or vulnerable in some network environments (as mentioned in the Security Considerations section of the RFC containing the MIB module), the Exporter should consider using anonymization techniques per [RFC6235] if the information is anonymizable. Consumers of exported data should therefore be able to handle the kinds of data modifications that are described in [RFC6235].…”
Section: Security Considerationsmentioning
confidence: 99%
“…When exporting MIB objects that may be considered sensitive or vulnerable in some network environments (as mentioned in the Security Considerations section of the RFC containing the MIB module), the Exporter should consider using anonymization techniques per [RFC6235] if the information is anonymizable. Consumers of exported data should therefore be able to handle the kinds of data modifications that are described in [RFC6235].…”
Section: Security Considerationsmentioning
confidence: 99%
“…"IP Flow Anonymization Support", [RFC6235], which describes anonymization techniques for IP flow data and the export of anonymized data using the IPFIX protocol.…”
Section: Ipfix Mediator Documents Overviewmentioning
confidence: 99%
“…Aggregation may also be combined with anonymization within a Mediator, or as part of a chain of Mediators, to further leverage this effect. In any case in which an Intermediate Aggregation Process is applied as part of a data anonymization or protection scheme, or is used together with anonymization as described in [RFC6235], the Security Considerations in Section 9 of [RFC6235] apply.…”
Section: Examplesmentioning
confidence: 99%