Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 323-327.

• Network & Communication • Previous Articles     Next Articles

NAT Device Detection Method Based on C5.0 Decision Tree

SHI Zhi-kai1,ZHU Guo-sheng1,2,LEI Long-fei1,CHEN Sheng1,ZHEN Jia1,WU Shan-chao1,WU Meng-yu1   

  1. School of Computer and Information Engineering,Hubei University,Wuhan 430062,China1
    Hubei Province Engineering Technology Research Center for Education Informationization,Wuhan 430062,China2
  • Online:2018-06-20 Published:2018-08-03

Abstract: NAT hides the internal network structure to the external network.On the one hand,it offers access to the illicit terminal facilitates,causing potential threats to the network.On the other hand,users can also privately share networks through NAT,which directly harm the interests of network operators.Effective detecting NAT devices plays an important role in network security and controlling,network operation and management.This article analyzed and compared the current NAT detection technologies.The advantages,disadvantages and the applicable conditions of each technologies were described.A C5.0 decision tree based NAT device detection method using features of the upper-level applications and training data was proposed in this paper.The experiments with real network traffic data show that the model can identify NAT device effectively.

Key words: C5.0 decision tree, NAT, NAT detection

CLC Number: 

  • TP181
[1]STATISTA.Internet of Things (IoT) connected devices in- stalled base worldwide from 2015 to 2025 (in billions)[OL].
[2017-05-14].https://www.statista.com/statistics/471264/iot-numberof-connected-devices-worldwide.
[2]Internet Live Stats.Internet Users[OL].
[2017-0514].http://www.internetlivestats.com/ internet-users/#trend.
[3]NESSETT D M,GRABELSKY D,BORELLA M S,et al.Me- thod and system for locating network services with distributed network address translation:U.S. Patent 6,055,236.2000-4-25.
[4]BELLOVIN S M.A technique for counting NATted hosts[C]∥Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment.ACM,2002:267-272.
[5]STRAKA K,MANES G. Passive detection of nat routers and client counting∥Advances in Digital Forensics II.Springer,Boston,MA,2006:239-246.
[6]MAIER G,SCHNEIDER F,FELDMANN A.NAT usage in residential broadband networks[C]∥International Conference on Passive and Active Network Measurement.Springer,Berlin,Heidelberg,2011:32-41.
[7]MONGKOLLUKSAMEE S,FUKUDA K,PONGPAIBOOL P.Counting NATted hosts by observing TCP/IP field behaviors[C]∥2012 IEEE International Conference on Communications (ICC).IEEE,2012:1265-1270.
[8]ZHANG B,GUAN Y,NIU W,et al.A hybrid packet clustering approach for NAT host analysis[C]∥2015 IEEE International Conference on Communication Software and Networks(ICCSN).IEEE,2015:432-438.
[9]RUI L,HONGLIANG Z,YANG X,et al.Remote NAT detect algorithm based on support vector machine[C]∥2009 International Conference on Information Engineering and Computer Science.2009.
[10]ABT S,DLETZ C,BAIER H,et al.Passive remote source nat detection using behavior statistics derived from netflow[C]∥IFIP International Conference on Autonomous Infrastructure,Management and Security.Springer,Berlin,Heidelberg,2013:148-159.
[11]GOKCEN Y,FOROUSHANI V A,HEYWOOD A N Z.Can we identify NAT behavior by analyzing Traffic Flows?[C]∥Security and Privacy Workshops (SPW),2014 IEEE.IEEE,2014:132-139.
[12]KOMREK T,GRILL M,PEVNY T.Passive NAT detection using HTTP access logs[C]∥2016 IEEE International Workshop on Information Forensics and Security (WIFS).IEEE,2016:1-6.
[13]BI J,ZHAO L,ZHANG M.Application presence fingerprinting for NAT-aware router[C]∥Knowledge-Based Intelligent Information and Engineering Systems.Springer Berlin/Heidelberg,2006:678-685.
[14]The Bro Network Security Monitor[OL].http://www.bro. org.
[15]HOLMES G,DONKIN A,WITTEN I H.Weka:A machine learning workbench∥Proceedings of the 1994 Second Australian and New Zealand Conference on Intelligent Information Systems.IEEE,1994:357-361.
[1] WANG Ming, WU Wen-fang, WANG Da-ling, FENG Shi, ZHANG Yi-fei. Generative Link Tree:A Counterfactual Explanation Generation Approach with High Data Fidelity [J]. Computer Science, 2022, 49(9): 33-40.
[2] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[3] YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236.
[4] HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163.
[5] LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339.
[6] LI Xiao-wei, SHU Hui, GUANG Yan, ZHAI Yi, YANG Zi-ji. Survey of the Application of Natural Language Processing for Resume Analysis [J]. Computer Science, 2022, 49(6A): 66-73.
[7] JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479.
[8] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[9] CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66.
[10] ZHANG Hu, BAI Ping. Graph Convolutional Networks with Long-distance Words Dependency in Sentences for Short Text Classification [J]. Computer Science, 2022, 49(2): 279-284.
[11] FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327.
[12] LI Zhao-qi, LI Ta. Query-by-Example with Acoustic Word Embeddings Using wav2vec Pretraining [J]. Computer Science, 2022, 49(1): 59-64.
[13] CHEN Zhi-yi, SUI Jie. DeepFM and Convolutional Neural Networks Ensembles for Multimodal Rumor Detection [J]. Computer Science, 2022, 49(1): 101-107.
[14] WU Lin, BAI Lan, SUN Meng-wei, GOU Zheng-wei. Algal Bloom Discrimination Method Using SAR Image Based on Feature Optimization Algorithm [J]. Computer Science, 2021, 48(9): 194-199.
[15] WANG Li-mei, ZHU Xu-guang, WANG De-jia, ZHANG Yong, XING Chun-xiao. Study on Judicial Data Classification Method Based on Natural Language Processing Technologies [J]. Computer Science, 2021, 48(8): 80-85.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!