Presentation | 2014/5/15 Detection and Blocking of a host behind NAT in the User Authentication Network MITSUHIRO SUENAGA, HISAHARU TANAKA, MAKOTO OTANI, YOSHIAKI HORI, YASUHISA OKAZAKI, KENZI WATANABE, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In the network which requires user authentication, when hosts exist behind NAT, there is a problem that the authenticated user may differ from an actual user. In this research, we devise a method for detecting NAT by acquiring the actual IP address of the user terminal using a Java applet, and have implemented this method to the system which requires authentication through web browser. Moreover, we have implemented the method that to detect NAT by verifying the TTL value of packets for terminals without Java Applet. As a result, we are able to detect the existence of NAT during authentication, and block the communication through the NAT. In this report, we describe the details of this NAT detection method and the operation verification in the authentication system which have been implemented this method. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Network User Authentication / NAT / NAT detection |
Paper # | Vol.2014-CSEC-65 No.6,Vol.2014-IOT-25 No.6 |
Date of Issue |
Conference Information | |
Committee | ICM |
---|---|
Conference Date | 2014/5/15(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication Management(ICM) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Detection and Blocking of a host behind NAT in the User Authentication Network |
Sub Title (in English) | |
Keyword(1) | Network User Authentication |
Keyword(2) | NAT |
Keyword(3) | NAT detection |
1st Author's Name | MITSUHIRO SUENAGA |
1st Author's Affiliation | Graduate School of Science and Engineering, Saga University() |
2nd Author's Name | HISAHARU TANAKA |
2nd Author's Affiliation | Graduate School of Science and Engineering, Saga University |
3rd Author's Name | MAKOTO OTANI |
3rd Author's Affiliation | Computer and Network Center, Saga University |
4th Author's Name | YOSHIAKI HORI |
4th Author's Affiliation | Organization for General Education, Saga University |
5th Author's Name | YASUHISA OKAZAKI |
5th Author's Affiliation | Graduate School of Science and Engineering, Saga University |
6th Author's Name | KENZI WATANABE |
6th Author's Affiliation | Graduate School of Education, Hiroshima University |
Date | 2014/5/15 |
Paper # | Vol.2014-CSEC-65 No.6,Vol.2014-IOT-25 No.6 |
Volume (vol) | vol.114 |
Number (no) | 43 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |