@inproceedings{cf63744d8c37433a8ad1e68d2f7c0559,
title = "Identifying computers hidden behind a NAT using machine learning techniques",
abstract = "Attackers may use computers hidden behind a Network Address Translator (NAT) in order to conduct malicious activities such as denial of service (DoS). In such cases law enforcement agencies are unable in many cases to single out an attacker from all the users hidden behind the NAT. In this paper we present an innovative approach for clustering the sessions emanating from the NAT in order to identify the attacker. Each cluster should ideally include only the sessions emanating from a specific computer. A system that implements the new approach was developed. It was used to evaluate the new approach performance in a real environment that included 24 computers hidden behind the NAT. The preliminary evaluation results have demonstrated the superiority of the new approach over existing solutions and its ability to assist in locating potential attackers hidden behind a NAT.",
keywords = "Network address translator, Security",
author = "Ori Zakin and Metal Levi and Yuval Elovici and Lior Rockach and Nir Shafrir and Guy Sinter and Ofer Pen",
year = "2007",
month = dec,
day = "1",
language = "English",
isbn = "9781622765324",
series = "6th European Conference on Information Warfare and Security 2007, ECIW 2007",
pages = "335--340",
booktitle = "6th European Conference on Information Warfare and Security 2007, ECIW 2007",
note = "6th European Conference on Information Warfare and Security 2007, ECIW 2007 ; Conference date: 02-07-2007 Through 03-07-2007",
}