DNS-DNS: DNS-Based De-NAT Scheme

  • Conference paper
  • First Online:
Cryptology and Network Security (CANS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11124))

Included in the following conference series:

Abstract

Network Address Translation (NAT) routers aggregate the flows of multiple devices behind a single IP address. By doing so, NAT routers masquerade the original IP address, which is often viewed as a privacy feature, making it harder to identify the communication of individuals devices behind the NAT. De-NAT is the reverse process: re-identifying communication flowing into and out of the NAT. De-NAT can be used for traffic management, security, and lawful surveillance.

We show how DNS requests provide an effective De-NAT mechanism by observing queries to open resolver, in addition to ‘classical’ provider-based De-NAT. This new method allows de-NATing in cases where known schemes fail, e.g., in Windows 8 and 10, and by remote DNS resolvers. We analyze use cases where the suggested DNS based De-NAT is effective, suggest a De-NAT algorithm and evaluate its performance on real (anonymized) traffic. Another contribution is identifying the phenomena of drum beats, which are periodic DNS requests by popular applications and processes; these can allow long-term de-NATing, and also provide fingerprinting identifying specific devices and users. We conclude with recommendations for mitigating de-NATing.

An updated version of this article, is available at https://tinyurl.com/linktoonline.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 42.79
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 53.49
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Statistics at the front page of https://www.opendns.com/.

References

  1. Bellovin, S.M.: A technique for counting NATted hosts. In: Internet Measurement Workshop, pp. 267–272. ACM (2002)

    Google Scholar 

  2. Beverly, R.: A robust classifier for passive TCP/IP fingerprinting. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 158–167. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24668-8_16

    Chapter  Google Scholar 

  3. Bursztein, E.: Time has something to tell us about network address translation. In: Erlingsson,Ú., Sabelfeld, A. (eds.) Proceedings of the 12th Nordic Workshop on Secure IT Systems (NordSec 2007), Reykjavik, Iceland, October 2007

    Google Scholar 

  4. Danezis, G.: Covert communications despite traffic data retention. In: Christianson, B., Malcolm, J.A., Matyas, V., Roe, M. (eds.) Security Protocols 2008. LNCS, vol. 6615, pp. 198–214. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22137-8_27

    Chapter  Google Scholar 

  5. Gokcen, Y., Foroushani, V.A., Zincir-Heywood, A.N.: Can we identify NAT behavior by analyzing traffic flows? In: 35th IEEE Security and Privacy Workshops, SPW 2014, San Jose, CA, USA, 17–18 May 2014, pp. 132–139 (2014)

    Google Scholar 

  6. Gilad, Y., Herzberg, A.: Spying in the dark: TCP and tor traffic analysis. In: Fischer-Hübner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 100–119. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31680-7_6

    Chapter  Google Scholar 

  7. Gilad, Y., Herzberg, A., Shulman, H.: Off-path hacking: the illusion of challenge-response authentication. IEEE Secur. Priv. 12(5), 68–77 (2014)

    Article  Google Scholar 

  8. Herrmann, D., Banse, C., Federrath, H.: Behavior-based tracking: exploiting characteristic patterns in DNS traffic. Comput. Secur. 39, 17–33 (2013)

    Article  Google Scholar 

  9. Kirchler, M., Herrmann, D., Lindemann, J., Kloft, M.: Tracked without a trace: linking sessions of users by unsupervised learning of patterns in their DNS traffic. In: Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, 28 October 2016, pp. 23–34 (2016)

    Google Scholar 

  10. Mockapetris, P.: Domain names - concepts and facilities, RFC 1034, November 1987

    Google Scholar 

  11. Postel, J.: Internet datagram protocol RFC791. USC/Information Sciences Institute, RFC 791, September 1981

    Google Scholar 

  12. Srisuresh, P., Egevang, K.: Traditional IP network address translator (traditional NAT), RFC 3022, January 2001

    Google Scholar 

  13. Shulman, H.: Pretty bad privacy: pitfalls of DNS encryption. In: Ahn, G.-J., Datta, A. (eds.) WPES, pp. 191–200. ACM (2014)

    Google Scholar 

  14. Wicherski, G., Weingarten, F., Meyer, U.: IP agnostic real-time traffic filtering and host identification using TCP timestamps. In: LCN, pp. 647–654. IEEE Computer Society (2013)

    Google Scholar 

Download references

Acknowledgements

Many thanks to Amit Klein for his helpful comments. Many thanks to Roland van Rijswijk-Deij for his support during this project. This work was supported by the Israeli ministry of Science, grant number 3-11857. Part of the data that led to this research was provided by SURFnet, the National Research and Education Network in the Netherlands, https://www.surfnet.nl/en/.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liran Orevi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Orevi, L., Herzberg, A., Zlatokrilov, H. (2018). DNS-DNS: DNS-Based De-NAT Scheme. In: Camenisch, J., Papadimitratos, P. (eds) Cryptology and Network Security. CANS 2018. Lecture Notes in Computer Science(), vol 11124. Springer, Cham. https://doi.org/10.1007/978-3-030-00434-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00434-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00433-0

  • Online ISBN: 978-3-030-00434-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation