It is shown in the literature that network address translation devices have become a convenient way to hide the source of malicious behaviors. In this research, we explore how far we can push a machine learning (ML) approach to identify such behaviors using only network flows. We evaluate our proposed approach on different traffic data sets against passive fingerprinting approaches and show that the performance of a machine learning approach is very promising even without using any payload (application layer) information.
CITATION STYLE
Gokcen, Y., Foroushani, V. A., & Heywood, A. N. Z. (2014). Can we identify NAT behavior by analyzing traffic flows? In Proceedings - IEEE Symposium on Security and Privacy (Vol. 2014-January, pp. 132–139). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SPW.2014.28
Mendeley helps you to discover research relevant for your work.