skip to main content
10.1145/1298306.1298327acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
Article

Issues and etiquette concerning use of shared measurement data

Authors Info & Claims
Published:24 October 2007Publication History

ABSTRACT

In this note we discuss issues surrounding how to provide and use network measurement data made available for sharing among researchers. While previous work has focused on the technical details of enabling sharing via traffic anonymization, we focus on higher-level aspects of the process such as potential harm to the provider (e.g., by de-anonymizing a shared dataset) or interactions to strengthen subsequent research (e.g., helping to establish ground truth). We believe the community would benefit from a dialog regarding expectations and responsibilities of data providers, and the etiquette involved with using others' measurement data. To this end, we provide a set of guidelines that aim to aid the process of sharing measurement data. We present these not as specific rules, but rather a framework under which providers and users can better attain a mutual understanding about how to treat particular datasets.

References

  1. Community Resource for Archiving Wireless Data At Dartmouth (CRAWDAD). http://crawdad.cs.dartmouth.edu/.Google ScholarGoogle Scholar
  2. Enterprise tracing project. http://www.icir.org/linebreak{0}enterprise-tracing/.Google ScholarGoogle Scholar
  3. Protected Repository for the Defense of Infrastructure against CyberThreats. http://www.predict.org/.Google ScholarGoogle Scholar
  4. M. Allman, E. Blanton, and W. Eddy. A Scalable System for Sharing Internet Measurements. In Passive and Active Measurement Workshop, Mar. 2002.Google ScholarGoogle Scholar
  5. E. Blanton. tcpurify, May 2004. http://irg.cs.ohiou.edu/~eblanton/tcpurify/.Google ScholarGoogle Scholar
  6. E. Blanton. Personal communication, Apr. 2007.Google ScholarGoogle Scholar
  7. S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter. Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. In Proceedings of the Network and Distributed System Security Symposium, Feb. 2007.Google ScholarGoogle Scholar
  8. J. Heidemann. Personal communication, Apr. 2007.Google ScholarGoogle Scholar
  9. k. claffy, M. Crovella, T. Friedman, C. Shannon, and N. Spring. Community-Oriented Network Measurement Infrastructure (CONMI) Workshop Report. ACM Computer Communication Review, 36(2):41--48, Apr. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. G. Minshall. tcpdpriv, Aug. 1997. http://ita.ee.lbl.gov/html/contrib/tcpdpriv.html.Google ScholarGoogle Scholar
  11. F. Monrose and M. Reiter. Personal communication, Apr. 2007.Google ScholarGoogle Scholar
  12. R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney. A First Look at Modern Enterprise Traffic. In ACM SIGCOMM/USENIX Internet Measurement Conference, Oct. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Pang, M. Allman, V. Paxson, and J. Lee. The Devil and Packet Trace Anonymization. ACM Computer Communication Review, 36(1), Jan. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Pang and V. Paxson. A High-Level Programming Environment for Packet Trace Anonymization and Transformation. In ACM SIGCOMM, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. V. Paxson. Internet Traffic Archive.http://ita.ee.lbl.gov/.Google ScholarGoogle Scholar
  16. V. Paxson. Strategies for Sound Internet Measurement. In ACM SIGCOMM Internet Measurement Conference, Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C. Shannon, D. Moore, K. Keys, M. Fomenkov, B. Huffaker, and k. c. claffy. The Internet Measurement Data Catalog. ACM Computer Communication Review, 35(5), Oct. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Xu, J. Fan, M. H. Ammar, and S. B. Moon. Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based Scheme. In Proc. of the 10th IEEE International Conference on Network Protocols, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Issues and etiquette concerning use of shared measurement data

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IMC '07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
        October 2007
        390 pages
        ISBN:9781595939081
        DOI:10.1145/1298306

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 24 October 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate277of1,083submissions,26%

        Upcoming Conference

        IMC '24
        ACM Internet Measurement Conference
        November 4 - 6, 2024
        Madrid , AA , Spain

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader