Anonymization method for reserving network address prefix combining bit string and hash function

A technology of hash function and network address, which is applied in the field of anonymization of network address prefix reserved by the combination of bit string and hash function. Effect

Active Publication Date: 2010-07-14
HAIAN CHANGDA TECH TRANSFER CENT +1
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the calculation formula of s, we can know that in order to match the 32-bit hash value, the length of the bit string S needs to b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymization method for reserving network address prefix combining bit string and hash function
  • Anonymization method for reserving network address prefix combining bit string and hash function
  • Anonymization method for reserving network address prefix combining bit string and hash function

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0039] An anonymization method for network address prefix retention combining a bit string and a hash function, characterized by defining an address prefix hash function that takes the decimal integer corresponding to the IP address prefix bit string as input, and a random bit string, address The prefix hash function generates a hash value from the IP address prefix bit string whose IP address prefix length is i, and then finds the bit value at the corresponding hash value position on the random bit string, and matches the bit value with the IP address that needs to be anonymized. The i-th bit of the address is XORed, and the result after the XOR is taken as the anonymized bit of the i-th bit of the IP address. The specific technical steps for anonymizing IP addresses are as follows:

[0040] Step 1: Set parameters

[0041] Set a random bit string S of length L, where L is a positive integer greater than or equal to 32, define an address prefix hash function as (λ·a) mod m, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anonymization method for reserving a network address prefix combining a bit string and the hash function. The anonymization method is characterized by defining an address prefix hash function which takes a decimal integer corresponding to an IP address prefix bit string as input and a random bit string, wherein the IP address prefix bit string with the length of i of the IP address prefixes is generated to a hash value by the address prefix hash function; then searching for a bit value on hash value position corresponding to the random bit string; carrying out XOR operation on the bit value and the number i bit of the IP address which needs to be anonymized; taking the result after the XOR operation as an anonymization bit of the number i bit of the IP address; and adopting the method for processing each bit of the IP address so as to realize anonymization processing to the entire IP address. The invention separates an encryption function and a mapping function, enhances the execution efficiency of the method when being compared with traditional methods, and reduces the memory space needed by the random bit string at the same time.

Description

technical field [0001] The invention relates to an anonymization method for network addresses, in particular to an anonymization method for preserving network address prefixes combined with a bit string and a hash function. Background technique [0002] The network address in the present invention refers to the IP address. The IP address includes an IPv4 address with a length of 32 bits and an IPv6 address with a length of 128 bits. The IP address discussed in the present invention refers to an IPv4 address with a length of 32 bits. [0003] IP flow data based on high-speed backbone Internet is indispensable in the research of traffic engineering, performance evaluation, security testing and network behavior. Network IP flow data, if these valuable IP flow data resources can be shared with researchers, it will play a great role in network research. With the continuous improvement of network speed and bandwidth, the difficulty of collecting network traffic data is also incre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/12
Inventor 程光丁伟臧宁宁王松
Owner HAIAN CHANGDA TECH TRANSFER CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products