2014 IEEE 34th International Conference on Distributed Computing Systems 2014
DOI: 10.1109/icdcs.2014.30
|View full text |Cite
|
Sign up to set email alerts
|

No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone

Abstract: Abstract-It is generally recognized that the traffic generated by an individual connected to a network acts as his biometric signature. Several tools exploit this fact to fingerprint and monitor users. Often, though, these tools assume to access the entire traffic, including IP addresses and payloads. This is not feasible on the grounds that both performance and privacy would be negatively affected. In reality, most ISPs convert user traffic into NetFlow records for a concise representation that does not inclu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
37
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 35 publications
(37 citation statements)
references
References 34 publications
0
37
0
Order By: Relevance
“…To achieve user profiling, we use web transaction logs that provide more fine grained information than e.g. IP flow records used in most state-of-the-art solutions [3], [5], [11], [13]. While few other techniques rely on full packet payload analysis for traffic modelling [12], [14], we are the first to use web transaction logs augmented with service specific knowledge for profiling user.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…To achieve user profiling, we use web transaction logs that provide more fine grained information than e.g. IP flow records used in most state-of-the-art solutions [3], [5], [11], [13]. While few other techniques rely on full packet payload analysis for traffic modelling [12], [14], we are the first to use web transaction logs augmented with service specific knowledge for profiling user.…”
Section: Related Workmentioning
confidence: 99%
“…They use 802.11 traffic characteristics such as SSID probes or broadcast packet sizes, which limit the application of their technique to WiFi connected devices. Closer to our work is the identification of individual users behind a NAT service using IP flow data [11]. Verde et al extract features including the direction of a flow, the gap between two flows, the number of packets and bytes, etc.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations