纳特
NAT穿越
网络地址转换
计算机网络
计算机科学
互联网
TCP打孔
Ip地址
时间戳
计算机安全
服务拒绝攻击
因特网协议
鉴定(生物学)
传输控制协议
操作系统
网络数据包
Zeta TCP
植物
生物
作者
Hanbyeol Park,Seunghun Shin,Byeong‐hee Roh,Cheolho Lee
标识
DOI:10.1109/ictc.2016.7763518
摘要
NAT provides a function to translate private IP addresses into a public IP address. With NAT functions, hosts with private IP addresses can be connected to the Internet, but they are hidden on the Internet. When malicious hosts behind a NAT device attack service providers on the Internet, firewalls attached on the services may detect the attack. After the attacks are detected, they may block all the traffic including the malicious hosts and other normal ones from the NAT, since all the traffic from the NAT have a same source IP address and the hosts behind the NAT cannot be identified individually by them. In this paper, we propose an effective method to identify hosts behind a NAT device by utilizing multiple fields of IP and TCP such as IPID, TTL, SYN flag, and timestamp. The proposed method can identify the number of hosts behind a NAT device, and their OSs with very high accuracy compared to existing works utilizing only one field.
科研通智能强力驱动
Strongly Powered by AbleSci AI