Leveraging SDN and WebRTC for rogue access point security

JH Cox, R Clark, H Owen - IEEE Transactions on Network and …, 2017 - ieeexplore.ieee.org
Rogue access points (RAPs) are unauthorized devices connected to a network, providing
unauthorized wireless access to one or more clients. Such devices pose significant risk to …

Exploring nat detection and host identification using machine learning

AS Khatouni, L Zhang, K Aziz, I Zincir… - … on Network and …, 2019 - ieeexplore.ieee.org
The usage of Network Address Translation (NAT) devices is common among end users,
organizations, and Internet Service Providers. NAT provides anonymity for users within an …

Detecting internet-scale NATs for IoT devices based on Tri-net

Z Yan, N Yu, H Wen, Z Li, H Zhu, L Sun - … 13–15, 2020, Proceedings, Part I …, 2020 - Springer
Due to the lack of available labeled Network Address Translation (NAT) samples, it is still
difficult to actively detect the large-scale NATs on the Internet. In this paper, we propose an …

Identifying NAT Devices to Detect Shadow IT: A Machine Learning Approach

R Nassar, I Elhajj, A Kayssi… - 2021 IEEE/ACS 18th …, 2021 - ieeexplore.ieee.org
Network Address Translation (NAT) is an address remapping technique placed at the
borders of stub domains. It is present in almost all routers and CPEs. Most NAT devices …

Identification and counting of hosts behind nat using machine learning

S Shukla, H Gupta - SN Computer Science, 2022 - Springer
NAT is a process of deploying a large number of hosts (typically in a LAN) to use a single or
group of limited public IP address. The anonymity that NAT provides is a privilege for …

Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns

S Lee, SJ Kim, J Lee, B Roh - Symmetry, 2020 - mdpi.com
Although network address translation (NAT) provides various advantages, it may cause
potential threats to network operations. For network administrators to operate networks …

[PDF][PDF] 基于TCP 流RTT 测量的Tethering 行为检测架构

戴显龙, 程光, 陆广垠, 金斌磊 - Journal of Beijing University of …, 2021 - researchgate.net
Tethering 行为是一种移动设备通过自身传输介质共享其互联网连接服务的行为,
其不仅对移动互联网造成运营压力和收益影响, 还对移动互联网隐藏其内部网络结构 …

Counting Malicious Host Behind NAT Using Ensemble Machine Learning Approach

S Shukla, M Misra, G Varshney - 2024 6th World Symposium …, 2024 - ieeexplore.ieee.org
Network Address Translation (NAT) is widely used to map private IP addresses to public
ones, offering anonymity that not only benefits legitimate users by protecting their internal IP …

Graph-based detection of malicious network communities

J Jusko - 2017 - search.proquest.com
Doctoral Thesis Page 1 Czech Technical University in Prague Faculty of Electrical Engineering
Doctoral Thesis August 2017 Jan Jusko Page 2 Page 3 Czech Technical University in Prague …

Client device tracking

M Grill, J Kohout, M Kopp - US Patent 10,805,377, 2020 - Google Patents
A computing device having connectivity to a network stores one or more existing device
models, where each of the one or more existing device models is a representation of a …