Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1658997.1659010acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
poster

Netflow based system for NAT detection

Published: 01 December 2009 Publication History

Abstract

Revealing the misuse of network resources is one of the important fields in the network security, especially for the network administrators. One of them is the use of unauthorized NAT (Network Address Translation) devices (e.g. small office routers or wireless access points) inside the network which introduces serious security issues. There are several techniques proposed on how to detect NAT devices in the computer networks, but all these methods suffer from high false positive rate. Also there is no study how to perform NAT detection using NetFlow data, often used for monitoring and forensics analysis in large networks. The contribution of our work consists of the following: i) we have transformed existing NAT detection techniques to work with NetFlow data, ii) we propose three new NAT detection approaches, iii) we have designed a prototype of NAT detection system, which aggregates the results from various NAT detection techniques in order to minimize false positive and false negative rates.

References

[1]
S. M. Bellovin. A technique for counting natted hosts. In IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pages 267--272, New York, NY, USA, 2002. ACM.
[2]
Cisco Systems. Cisco IOS NetFlow. http://www.cisco.com/go/netFlow, 2009.
[3]
INVEA-TECH. Standard FlowMon Probe. http://www.invea-tech.com/, 2009.
[4]
Peter Phaal. Detecting NAT Devices using sFlow, http://www.sflow.org/detectNAT/, 2003.
[5]
J. Zhang and A. W. Moore. Traffic trace artifacts due to monitoring via port mirroring. In Proceedings of the Fifth IEEE/IFIP E2EMON, pages 1--8, 2007.

Cited By

View all
  • (2021)IPvest: Clustering the IP Traffic of Network Entities Hidden Behind a Single IP Address Using Machine LearningIEEE Transactions on Network and Service Management10.1109/TNSM.2021.306248818:3(3647-3661)Online publication date: Sep-2021
  • (2021)Identifying NAT Devices to Detect Shadow IT: A Machine Learning Approach2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)10.1109/AICCSA53542.2021.9686910(1-7)Online publication date: Nov-2021
  • (2019)Data-Driven Emulation of Mobile Access Networks2019 15th International Conference on Network and Service Management (CNSM)10.23919/CNSM46954.2019.9012691(1-6)Online publication date: Oct-2019
  • Show More Cited By
  1. Netflow based system for NAT detection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    Co-Next Student Workshop '09: Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
    December 2009
    68 pages
    ISBN:9781605587516
    DOI:10.1145/1658997

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 December 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. detection
    2. netflow
    3. network address translation
    4. network security

    Qualifiers

    • Poster

    Conference

    Co-NEXT '09
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 198 of 789 submissions, 25%

    Upcoming Conference

    CoNEXT '24

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)13
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 03 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)IPvest: Clustering the IP Traffic of Network Entities Hidden Behind a Single IP Address Using Machine LearningIEEE Transactions on Network and Service Management10.1109/TNSM.2021.306248818:3(3647-3661)Online publication date: Sep-2021
    • (2021)Identifying NAT Devices to Detect Shadow IT: A Machine Learning Approach2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)10.1109/AICCSA53542.2021.9686910(1-7)Online publication date: Nov-2021
    • (2019)Data-Driven Emulation of Mobile Access Networks2019 15th International Conference on Network and Service Management (CNSM)10.23919/CNSM46954.2019.9012691(1-6)Online publication date: Oct-2019
    • (2019)Exploring NAT Detection and Host Identification Using Machine Learning2019 15th International Conference on Network and Service Management (CNSM)10.23919/CNSM46954.2019.9012684(1-8)Online publication date: Oct-2019
    • (2019)Counting Devices: Revisiting Existing Approaches in Today’s Settings2019 IEEE International Conference on Big Data (Big Data)10.1109/BigData47090.2019.9006482(4032-4037)Online publication date: Dec-2019
    • (2017)Internet Data Center IP Identification and Connection Relationship Analysis Based on Traffic Connection Behavior AnalysisIEICE Transactions on Communications10.1587/transcom.2016EBP3273E100.B:4(510-517)Online publication date: 2017
    • (2017)Leveraging SDN and WebRTC for Rogue Access Point SecurityIEEE Transactions on Network and Service Management10.1109/TNSM.2017.271062314:3(756-770)Online publication date: Sep-2017
    • (2016)HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingEURASIP Journal on Information Security10.1186/s13635-016-0030-72016:1(1-14)Online publication date: 1-Dec-2016
    • (2016)A Multi-perspective Analysis of Carrier-Grade NAT DeploymentProceedings of the 2016 Internet Measurement Conference10.1145/2987443.2987474(215-229)Online publication date: 14-Nov-2016
    • (2016)A Fine-Grained Large-Scale NAT Detection MethodAdvanced Multimedia and Ubiquitous Engineering10.1007/978-981-10-1536-6_64(493-499)Online publication date: 30-Aug-2016
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media