2018
DOI: 10.1007/978-3-030-00434-7_4
|View full text |Cite
|
Sign up to set email alerts
|

DNS-DNS: DNS-Based De-NAT Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…with IPv6 ID [11]. Client de-NATting based on the IPv4 ID of outbound DNS queries over UDP was described in [41]. This attack relies on the incremental nature of the IP ID for a fixed (IP SRC , IP DST ) tuple, and thus cannot be applied to server de-NATting where a single host may use multiple source IP addresses.…”
Section: Host Alias Detection and De-nattingmentioning
confidence: 99%
“…with IPv6 ID [11]. Client de-NATting based on the IPv4 ID of outbound DNS queries over UDP was described in [41]. This attack relies on the incremental nature of the IP ID for a fixed (IP SRC , IP DST ) tuple, and thus cannot be applied to server de-NATting where a single host may use multiple source IP addresses.…”
Section: Host Alias Detection and De-nattingmentioning
confidence: 99%
“…Once NATed, it becomes difficult to correlate each packet to its packet stream from the outside. As described by [19], deNATing is the reverse of NATing, and it aims at re-identifying the communication flowing through a NAT. In Section 4, we survey existing deNATing methods and illustrate their shortcomings with regard to our use case.…”
Section: Nating Denating and Iot Identification Behind A Natmentioning
confidence: 99%
“…We empirically evaluate our method on genuine NetFlow records collected in our lab for a period of ten days from numerous commercial smart home IoT devices. We also compare our NetFlow-based method to two existing deNATing methods: (1) a domain-based method [11] and (2) a method which is based on DNS IP-ID [19]; we evaluate them empirically on packet-level data collected simultaneously from the same network. Unlike some past studies which applied their methods to partially, questionably, or completely unlabeled datasets, our datasets are explicitly labeled with the device model.…”
Section: Introductionmentioning
confidence: 99%
“…Other operating systems, such as new Linux versions, use unpredictable IP ID assignment. For instance, Linux and MacOS to use local counters and OpenBSD use pseudo-random IP ID assignment [21]. In this work we focus on servers with global incremental IP ID counters.…”
Section: Introductionmentioning
confidence: 99%