scholarly journals Beware: NAT Traversal is a Simple and Efficient Approach to Open Firewall Holes

Abakós ◽  
2020 ◽  
Vol 8 (2) ◽  
pp. 29-41
Author(s):  
Elias P. Duarte Jr. ◽  
Kleber V. Cardoso ◽  
Micael O.M.C. de Mello ◽  
João G.G. Borges

NAT traversal techniques allow processes with private, non-routable IP addresses to communicate with other processes outside the network secured limits. Techniques such as UDP Hole Punching have been standardized by the IETF, and using tunnels based on those techniques it is easy to allow application processes on top of any transport protocol, including TCP, to both start and receive packets from the Internet across NAT devices. However, as a side effect those techniques also freely proceed through firewalls. In this work we describe how it is possible to configure any server running on any port (no firewall configuration required) to establish connections initiated at arbitrary Internet clients, making unauthorized services easily available. We also show that the process is lightweight, in particular after the initial setup is concluded, thus virtually supporting any type of unauthorized applications.

Author(s):  
Laura Carrea ◽  
Raul Almeida

The Internet architecture of today does not seem suited to the current Internet usage, as the application layer is more and more content-centric, while the network layer is ossified around the IP concept. In this chapter, the authors explore a redefinition of the whole Internet architecture where nothing is taken for granted, especially IP addresses. The review focuses on the forwarding and topology components of the EU FP7 PSIRP architecture and on a few of the problematic issues and the ongoing discussions around a pioneering clean-slate design of the way to organize networks.


Author(s):  
Dávid Tegze ◽  
Gábor Hosszú

This article presents the comparison of different transport level congestion control schemes, including variants of the TCP (Postel, 1981). The protocol mechanisms, implemented in various protocols are hard to investigate in a uniform manner (Hosszú, 2005); therefore, the simulator SimCast (Simulator for multicast) is developed for traffic analysis of the unicast (one-to-one communication) and multicast (one-to-many communication) streams. In this article, the TCP and other transport protocol mechanisms will be compared using the SimCast simulator (Orosz & Tegze, 2001). The simulated results are presented through examples.


2015 ◽  
Vol 7 (3) ◽  
pp. 1-23 ◽  
Author(s):  
Benjamin Edelman ◽  
Michael Schwarz

We consider market rules for transferring IP addresses, numeric identifiers required by all computers connected to the Internet. Transfers usefully move resources from lowest- to highest-valuation networks, but transfers tend to cause socially costly growth in the Internet's routing table. We propose a market rule that avoids excessive trading and comes close to achieving social efficiency. We argue that this rule is feasible despite the limited powers of central authorities. We also offer a framework for reasoning about future prices of IP addresses, then explore the role of rentals in sharing information about the value of IP address and assuring allocative efficiency. (JEL D47, D82, D85, L86)


2019 ◽  
Vol 4 (2) ◽  
pp. 137 ◽  
Author(s):  
Nfn Sarip ◽  
Arief Setyanto

The use of the internet today has become a necessity, the most commonly used media to connect to the internet is a Wireless LAN network. For easy access to the network, DHCP service become a standard feature that must exist, because ordinary users no longer need to think about procedures for configuring IP addresses, all of which have been done automatically by the DHCP service. But it turns out that there is a security threat to DHCP service, namely DHCP Starvation attacks that can be exhausting the availability of IP addresses in DHCP service so that the configuration of IP address automatically can no longer be done on the client. Various methods such as authentication, cryptography, and machine learning are used by researchers in preventing DHCP Starvation attacks, but the issue of effectiveness and efficiency still opens up further research opportunities. In this research, packet filtering methods based on DSCP code applied to the Netfilter system are used to do prevention of DHCP Starvation attacks, this method has proven to be very effective in making prevention and more efficient when applied on small scale wireless networks such as at office networks and internet cafe.


Author(s):  
Zubair Nabi

The Internet has become the new battle ground between authoritarian regimes and ordinary individuals who want unimpeded access to information. The immense popularity of online activism and citizen journalism enabled by social media has instigated state level players to partially or completely block access to the Internet. In return, individuals and organizations have been employing various anti-censorship tools to circumvent these restrictions. In this paper, we claim that censorship is futile as not only has it been ineffective in restricting access, it has also had the side effect of popularising blocked content. Using data from Alexa Web rankings, Google Trends, and YouTube Statistics, we quantify the ineffectiveness of state level censorship in Pakistan and Turkey and highlight the emergence of the Streisand Effect. We hope that our findings will, a) prove to governments and other players the futility of their actions, and b) aid citizens around the world in using legal measures to counteract censorship by showing its ineffectiveness.


Author(s):  
Tim Gerhard ◽  
Dennis Schwerdel ◽  
Paul Müller

AbstractThe Internet is a successful network that connects people all over the world. However, it has some fundamental architectural problems which require application developers and service providers to spend a tremendous effort in combating these. Examples for these efforts are content delivery networks or mobile TCP. Thus, it can be said that the Internet is currently not fulfilling the requirements on the global network anymore. The Internet of the future, or its replacement, must solve these problems.There are multiple clean-slate approaches for information-centric networking. However, they are inherently incompatible to the Internet or applications building on it.This work presents a novel resource transport protocol that is optimized for detection by software-defined networks and may be re-routed to in-network processors. Furthermore, it is shown how this protocol can be used to support concepts of ICN even in today’s Internet. Moreover, the resource format that is used in this work is independent from the underlying network, resulting in possible reuse in other networks as well. Applications and protocols building on this resource format can thus easily be re-used in clean-slate networks like NDN.


Author(s):  
Saranya K S

A growing demand for integrated smarter and faster techniques to make work easier and productive leads to the advancement of technologies. This paper entitled “AN IOT BASED WEATHER MONITOR SYSTEM FOR DRYING CLOTHES” proposes a smart way of monitoring the area where we dry out our clothes and upload the data over IoT. This proposed module consists of an IoT based framework that effectively observes the change in weather using sensors, Application that displays weather parameters such as temperature, humidity and clothes moisture obtained from the sensors to cloud by implementing message queuing telemetry transport protocol. The proposed system is portable, affordable and the data can be accessed at any instant. The Internet of Things is implemented to make informed decisions and to optimize the experience of the residents by providing them with real time data and sending customized alert notifications via software application to the right person. The clients can subscribe to the application and get the updates from the implemented system in their smartphone.


Author(s):  
Todd G. Shipley ◽  
Art Bowker
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document