2013
DOI: 10.1007/978-3-642-38998-6_18
|View full text |Cite
|
Sign up to set email alerts
|

Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow

Abstract: Network Address Translation (NAT) is a technique commonly employed in today's computer networks. NAT allows multiple devices to hide behind a single IP address. From a network management and security point of view, NAT may not be desirable or permitted as it allows rogue and unattended network access. In order to detect rogue NAT devices, we propose a novel passive remote source NAT detection approach based on behavior statistics derived from NetFlow. Our approach utilizes 9 distinct features that can directly… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Their algorithm exhibited an accuracy of 75%. Abt et al [10] proposed a C4.5 DT algorithm based on flow information such as the IP addresses and port numbers of sender and receiver, protocol, and number of bytes and packets exchanged on an IP address. The method resulted in an accuracy of 89%.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Their algorithm exhibited an accuracy of 75%. Abt et al [10] proposed a C4.5 DT algorithm based on flow information such as the IP addresses and port numbers of sender and receiver, protocol, and number of bytes and packets exchanged on an IP address. The method resulted in an accuracy of 89%.…”
Section: Related Workmentioning
confidence: 99%
“…In [8], a method to detect NATDs and the NATHs behind them by using IP TTLs and HTTP user-agent strings is proposed. Methods to identify NATDs and NATHs using machine learning techniques based on packet sequences are proposed in [9][10][11][12]. Most of these passive methods presented their NATD identification methods as parts of techniques for counting the NATHs behind an NATD.…”
Section: Introductionmentioning
confidence: 99%
“…To the best of our knowledge, there is a lack of literature on flow-based host identification. There is literature on user identification [13] and on means for passive OS fingerprinting or NAT detection [11,1], though. Further, we consider to implement some results of host classification research, such as detecting type of the host [9].…”
Section: Research Questions and Proposed Approachmentioning
confidence: 99%