Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns
<p>Architecture of supervised learning-based network address translation device (NATD) identification.</p> "> Figure 2
<p>Receiver operating characteristic (ROC) curves for the classification models.</p> "> Figure 3
<p>Average elapsed times for the training and test phases by classification models.</p> "> Figure 4
<p>Average elapsed times to scan all targets (<b>a</b>) TCP and (<b>b</b>) UDP ports.</p> "> Figure 5
<p>Default packets per second (PPS) values of intrusion detection systems (IDSs) and firewalls to detect TCP-SYN and UDP flooding attacks.</p> "> Figure 6
<p>Detection ratio of decision tree (DT)-based fast algorithm by varying the number of probe packets for various dataset environments.</p> "> Figure 7
<p>Passive NATD behavior detection by conventional methods.</p> "> Figure 8
<p>Use of proposed method in an organization.</p> ">
Abstract
:1. Introduction
- The proposed method provides a robust identification of NATDs independent of algorithms because it operates based on supervised learning.
- The proposed method operates in an active manner. It sends probe packets to the target hosts and collects the responses from them.
- In order to reduce the computational complexity and to solve the security issue in the collection of port response patterns, we propose a fast and stealthy identification method using the decision tree (DT) classification model.
- The proposed method can operate remotely, unlike conventional methods that should operate in the same network as the targets.
- With the fast, stealthy, and remote features, we also recommend a few practical use cases for secure network operation and management of an organization utilizing the proposed method.
- The NATD identification and stealthy active scan methods proposed in this paper have a symmetry feature applicable to a single subnet, small and medium-sized organization-level networks, and the Internet.
2. Background
2.1. Nat Overview
2.2. Related Work
3. Supervised Learning-Based Active Natd Identification Using Port Response Patterns
3.1. Port Response Patterns
3.2. Architecture of Supervised Learning-Based Natd Identification
3.2.1. Training Phase
3.2.2. Identification Phase
Algorithm 1 Training Phase | |
Input: Training Host Set = {, , ⋯, } | // |
Output: Classification Model | |
1: for i = 1 to N do | |
2: = PortScan ( ); | // Port Scanner (Equation (1)) |
3: Append to ; | // Feature Extractor (Equation (2)) |
4: Append to ; | |
5: end for | |
6: repeat | |
7: =optimizeModel(); | // CMO (Equation (3)) |
8: until converge | |
9: return |
3.3. Selection of Target Ports
4. Evaluation
4.1. Dataset and Environment
4.2. Classification Models and Metrics
4.3. Performance Evaluation
5. Decision Tree-Based Fast and Stealthy Natd Identification
5.1. Limitation of Supervised Learning-Based Approach
5.2. Dt-Fs: Dt-Based Fast and Stealthy Natd Identification
Algorithm 2 DT-FS Algorithm | |
Input: and h | // = , h is a target host |
Output: boolean value | // true or false |
functionDT-FS: | |
1: if c == TBD then | |
2: r = SendProbePacket ; | // get port response |
3: DT-FS ( , h ); | // branch to child node |
4: else if c == true OR false then | |
5: return c; | // identification result |
6: end if | |
end function |
6. Discussion: Practical Use Cases
6.1. Remote Natd Identification for Organization Networks
6.2. Counting NATHs behind NATDs and Detecting Their Abnormal Behaviors
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Srisuresh, P.; Holdrege, M. IP Network Address Translator (NAT) Terminology and Considerations. RFC 2663, IETF. 1999. Available online: https://www.hjp.at/doc/rfc/rfc2663.html (accessed on 10 October 2019).
- Smith, M.; Hunt, R. Network security using NAT and NAPT. In Proceedings of the ICON’2002, Singapore, 27–30 August 2002; IEEE: Piscataway, NJ, USA, 2002. [Google Scholar]
- Wicherski, G.; Weingarten, F.; Meyer, U. IP agnostic real-time traffic filtering and host identification using TCP timestamps. In Proceedings of the LCN’2013, Sydney, Australia, 21–24 October 2013; IEEE: Piscataway, NJ, USA, 2013. [Google Scholar]
- Bellovin, S.M. A technique for counting NATted hosts. In Proceedings of the IMW’2002, Marseille, France, 6–8 November 2002; ACM: New York, NY, USA, 2002. [Google Scholar]
- Phaal, P. Detecting NAT Devices Using sFlow. sFlow.org. 2009. Available online: https://ci.nii.ac.jp/naid/10019397892/ (accessed on 10 October 2019).
- Kohno, T.; Broido, A.; Claffy, K.C. Remote physical device fingerprinting. IEEE Trans. Dependable Secur. Comput. 2005, 2, 93–108. [Google Scholar] [CrossRef] [Green Version]
- Park, H.; Shin, S.; Roh, B.; Lee, C. Identification of hosts behind a NAT device utilizing multiple fields of IP and TCP. In Proceedings of the ICTC’2016, Jeju Island, Korea, 19–21 October 2016; IEEE: Piscataway, NJ, USA, 2016. [Google Scholar]
- Maier, G.; Schneider, F.; Feldmann, A. Advertising power consumption of bluetooth low energy systems. In Proceedings of the PAM’2011; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2011; Volume 6519, pp. 32–41. [Google Scholar]
- Li, R.; Zhu, H.; Xin, Y.; Yang, Y.; Wang, C. Remote NAT Detect Algorithm Based on Support Vector Machine. In Proceedings of the ICIES’2009, Wuhan, China, 19–20 December 2009; IEEE: Piscataway, NJ, USA, 2009. [Google Scholar]
- Abt, S.; Dietz, C.; Baier, H.; Petrović, S. Passive remote source NAT detection using behavior statistics derived from netflow. In Proceedings of the AIMS’2013, UPC Barcelona, Spain, 25–28 June 2013; IFIP: Amsterdam, The Netherlands, 2013. [Google Scholar]
- Gokcen, Y.; Foroushani, V.A.; Heywood, A. Can we identify NAT behavior by analyzing Traffic Flows? In Proceedings of the SPW’2014, San Jose, CA, USA, 17–18 May 2014; IEEE: Piscataway, NJ, USA, 2014. [Google Scholar]
- Komarek, T.; Grill, M.; Pevny, T. Passive NAT detection using HTTP access logs. In Proceedings of the WIFS’2016, Abu Dhabi, UAE, 4–7 December 2016; IEEE: Piscataway, NJ, USA, 2016. [Google Scholar]
- Ford, B.; Srisuresh, P.; Kegel, D. Peer-to-Peer Communication Across Network Address Translators. In Proceedings of the USENIX Annual Technical Conference, Anaheim, CA, USA, 10–15 April 2005. [Google Scholar]
- Murakami, R.; Yamai, N.; Okayama, K. A MAC-address Relaying NAT Router for PC Identification from Outside of a LAN. In Proceedings of the SAINT’2010, Seoul, Korea, 19–23 July 2010; IEEE: Piscataway, NJ, USA, 2010. [Google Scholar]
- Ishikawa, Y.; Yamai, N.; Okayama, K.; Nakamura, M. An identification method of PCs behind NAT router with proxy authentication on HTTP communication. In Proceedings of the SAINT’2011, Munich, Bavaria, Germany, 18–21 July 2011; IEEE: Piscataway, NJ, USA, 2011. [Google Scholar]
- Rytilahti, T.; Holz, T. On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways. In Proceedings of the Network and Distributed System Security Symposium (NDSS) 2020, San Diego, CA, USA, 23–26 February 2020. [Google Scholar]
- Cox, J.H.; Clark, R.; Owen, H. Leveraging SDN and WebRTC for Rogue Access Point Security. IEEE Trans. Netw. Serv. Manag. 2017, 14, 756–770. [Google Scholar] [CrossRef]
- Vratonjic, N.; Huguenin, K.; Bindschaedler, V.; Hubaux, J. A Location-Privacy Threat Stemming from the Use of Shared Public IP Addresses. IEEE Trans. Mob. Comput. 2014, 13, 2445–2457. [Google Scholar] [CrossRef] [Green Version]
- Orevi, L.; Herzberg, A.; Zlatokrilov, H. DNS-DNS: DNS-Based De-NAT Scheme. In Proceedings of the Cryptology and Network Security (CANS 2018), Naples, Italy, 30 September–3 October 2018; Springer: Cham, Switzerland, 2018; Volume 11124, pp. 69–88. [Google Scholar]
- Zhang, L. Exploring NAT Detection and Host Identification. Master’s Thesis, Dalhousie University, Halifax, NS, Canada, 2018. [Google Scholar]
- Meidan, Y.; Sachidananda, V.; Elovici, Y.; Shabtai, A. Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup. arXiv 2019, arXiv:1905.13430. Available online: https://arxiv.org/abs/1905.13430 (accessed on 15 May 2020).
- Beverly, R. A robust classifier for passive TCP/IP fingerprinting. In Proceedings of the PAM’2004, Antibes Juan-les-Pins, France, 19–20 April 2004. [Google Scholar]
- Postel, J. Internet Control Message Protocol. RFC 792, IETF. 1981. Available online: https://www.hjp.at/doc/rfc/rfc792.html (accessed on 10 October 2019).
- Lyon, G.F. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning; Insecure: Sunnyvale, CA, USA, 2009. [Google Scholar]
- Rumelhart, D.E.; Hinton, G.E.; Williams, R.J. Learning Internal Representations by Error Propagation; Technical Report; California Univ San Diego La Jolla Inst for Cognitive Science: La Jolla, CA, USA, 1985. [Google Scholar]
- Pedregosa, F.; Varoquaux, G.; Gramfort, A.; Michel, V.; Thirion, B.; Grisel, O.; Blondel, M.; Prettenhofer, P.; Weiss, R.; Dubourg, V.; et al. Scikit-learn: Machine Learning in Python. J. Mach. Learn. Res. 2011, 12, 2825–2830. [Google Scholar]
- SL Based NAT Identification. GitHub. Available online: https://github.com/combatreadiness/SL-based_NAT_identification (accessed on 15 August 2020).
- Boser, B.E.; Guyon, I.M.; Vapnik, V.N. A training algorithm for optimal margin classifiers. In Proceedings of the COLT’92, Pittsburgh, PA, USA, 27–29 July 1992; ACM: New York, NY, USA, 1992. [Google Scholar]
- Fix, E.; Hodges, J.L., Jr. Discriminatory analysis. Nonparametric discrimination: Consistency properties. Int. Stat. Rev. 1989, 57, 238–247. [Google Scholar] [CrossRef]
- Cover, T.M.; Hart, P.E. Nearest neighbor pattern classification. IEEE Trans. Inf. Theory 1967, 13, 21–27. [Google Scholar] [CrossRef]
- Quinlan, J.R. C4.5: Programs for Machine Learning; Morgan Kaufmann Publishers Inc.: San Francisco, CA, USA, 1993. [Google Scholar]
- Breiman, L. Random forests. Mach. Learn. 2001, 45, 5–32. [Google Scholar] [CrossRef] [Green Version]
- Trabelsi, Z.; Alketbi, L. Using network packet generators and snort rules for teaching denial of service attacks. In Proceedings of the ITiCSE’13, Canterbury, UK, 1–3 July 2013; ACM: New York, NY, USA, 2013. [Google Scholar]
- Thermos, P.; Takanen, A. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures; Pearson Education: London, UK, 2007. [Google Scholar]
- Cisco. Security Configuration Guide: Denial of Service Attack Prevention; Cisco Systems, Inc.: San Jose, CA, USA, 2014. [Google Scholar]
- Juniper Networks. Attack Detection and Prevention Feature Guide for Security Devices; Juniper Networks, Inc.: Sunnyvale, CA, USA, 2019. [Google Scholar]
- Hashida, H.; Kawamoto, Y.; Kato, N. Efficient Delay-Based Internet-Wide Scanning Method for IoT Devices in Wireless LAN. IEEE Internet Things J. 2020, 7, 1364–1374. [Google Scholar] [CrossRef]
- Kim, H.; Kim, T.; Jang, D. An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices. Symmetry 2018, 10, 151. [Google Scholar] [CrossRef] [Green Version]
- Jung, Y.; Agulto, R. Integrated Management of Network Address Translation, Mobility and Security on the Blockchain Control Plane. Sensors 2019, 20, 69. [Google Scholar] [CrossRef] [Green Version]
- Nugur, A.; Pipattanasomporn, M.; Kuzlu, M.; Rahman, S. Design and Development of an IoT Gateway for Smart Building Applications. IEEE Internet Things J. 2019, 6, 9020–9029. [Google Scholar] [CrossRef]
- Amirante, A.; Romano, S.P. Container NATs and Session-Oriented Standards: Friends or Foe? IEEE Internet Comput. 2019, 23, 28–37. [Google Scholar] [CrossRef]
- Tekeoglu, A.; Altiparmak, N.; Tosun, A.S. Approximating the number of active nodes behind a NAT device. In Proceedings of the ICCCN’2011, Maui, HI, USA, 31 July–4 August 2011; IEEE: Piscataway, NJ, USA, 2011. [Google Scholar]
- Mongkolluksamee, S.; Fukuda, K.; Pongpaibool, P. Counting NATted hosts by observing TCP/IP field behaviors. In Proceedings of the ICC’2012, Ottawa, ON, Canada, 10–15 June 2012; IEEE: Piscataway, NJ, USA, 2012. [Google Scholar]
Index | Response | Protocol | State | Notes |
---|---|---|---|---|
0x00 | SYN/ACK | TCP | open | TCP flag:0x12 |
0x01 | RESET | TCP | closed | TCP flag:0x14 |
0x02 | no response | - | filtered | - |
0x03 | type3,code13 | ICMP | filtered | communication administratively prohibited |
0x04 | type3,code10 | ICMP | filtered | host administratively prohibited |
0x05 | type3,code1 | ICMP | filtered | host unreachable |
Index | Response | Protocol | State | Notes |
---|---|---|---|---|
0x00 | UDP response | UDP | open | - |
0x01 | type3,code 3 | ICMP | closed | port unreachable |
0x02 | no response | - | open or filtered | - |
0x03 | type3,code13 | ICMP | filtered | communication administratively prohibited |
0x04 | type3,code10 | ICMP | filtered | host administratively prohibited |
0x05 | type3,code 1 | ICMP | filtered | host unreachable |
Area (C Class) | Total | NAT | Non-NAT |
---|---|---|---|
- . - . 196 . 0/24 | 31 | 20 | 11 |
- . - . 20 . 0/24 | 76 | 24 | 52 |
- . - . 197 . 0/24 | 114 | 26 | 88 |
- . - . 19 . 0/24 | 122 | 39 | 83 |
- . - . 21 . 0/24 | 167 | 99 | 68 |
public APs | 56 | 56 | 0 |
Total | 566 | 264 | 302 |
Type | NATD | Normal Host | |
---|---|---|---|
Prediction | |||
NATD | TP (True Positive) | FP (False Positive) | |
normal host | FN (False Negative) | TN (True Negative) |
LR | SVM | KNN | MLP | DT | RF | |
---|---|---|---|---|---|---|
Precision | 88.4% | 82.6% | 90.4% | 90.0% | 92.1% | 92.4% |
Recall | 97.5% | 97.4% | 95.2% | 95.8% | 96.7% | 97.3% |
Accuracy | 92.9% | 89.3% | 93.1% | 93.1% | 94.7% | 95.1% |
F1 | 92.6% | 89.2% | 92.5% | 92.7% | 94.2% | 94.7% |
AuC | 0.944 | 0.950 | 0.944 | 0.943 | 0.940 | 0.962 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, S.; Kim, S.J.; Lee, J.; Roh, B.-h. Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns. Symmetry 2020, 12, 1444. https://doi.org/10.3390/sym12091444
Lee S, Kim SJ, Lee J, Roh B-h. Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns. Symmetry. 2020; 12(9):1444. https://doi.org/10.3390/sym12091444
Chicago/Turabian StyleLee, Seungwoon, Si Jung Kim, Jungtae Lee, and Byeong-hee Roh. 2020. "Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns" Symmetry 12, no. 9: 1444. https://doi.org/10.3390/sym12091444
APA StyleLee, S., Kim, S. J., Lee, J., & Roh, B.-h. (2020). Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns. Symmetry, 12(9), 1444. https://doi.org/10.3390/sym12091444