Can we identify NAT behavior by analyzing traffic flows?

22Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

It is shown in the literature that network address translation devices have become a convenient way to hide the source of malicious behaviors. In this research, we explore how far we can push a machine learning (ML) approach to identify such behaviors using only network flows. We evaluate our proposed approach on different traffic data sets against passive fingerprinting approaches and show that the performance of a machine learning approach is very promising even without using any payload (application layer) information.

Cite

CITATION STYLE

APA

Gokcen, Y., Foroushani, V. A., & Heywood, A. N. Z. (2014). Can we identify NAT behavior by analyzing traffic flows? In Proceedings - IEEE Symposium on Security and Privacy (Vol. 2014-January, pp. 132–139). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SPW.2014.28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free