“…On real time interactive anonymization, Paul, Valgenti, and Kim (2011) proposed the Real-time Netshuffle anonymization technique whereby distortion is done to a complete graph to prevent inference attacks in network traffic [14]. Netshuffle works by employing k-anonymity methodology on network traces, by ensuring that all trace records appear at least k>1, with k being the anonymized record, and then shuffling gets applied on the kanonymized records, making it difficult for an attacker to decipher due to the distortion [14]. A network trace obfuscation methodology, (k, j)-obfuscation, was proposed by Riboni, Villani, Vitali, Bettini, and Mancini (2012), in which a network flow is considered obfuscated if it cannot be linked with greater assurance, to its source and destination IP addresses [15].…”