A Brief Review on Nat Traversals in Cyber Security Networks
Total Page:16
File Type:pdf, Size:1020Kb
JOURNAL OF CRITICAL REVIEWS ISSN- 2394-5125 VOL 7, ISSUE 6, 2020 A BRIEF REVIEW ON NAT TRAVERSALS IN CYBER SECURITY NETWORKS Dr.N. Kalyana Sundaram1*, T. Prabahar Godwin James2, K.E. Lakshmiprabha3, M. Anand4, Dr.M. Anbarasan5 1*Assistant Professor, Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India. 2Associate Professor, Department of Computer Science and Engineering, Sri Sairam Institute of Technology, Chennai, Tamilnadu, India. E-mail: [email protected] 3Associate Professor, Department of Electrical and Electronics Engineering, Karpaga vinayaga College of Engineering and Technology, Tamilnadu, India. 4Assistant Professor(Sr.G), Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India. 5Associate Professor, Department of Computer Science and Engineering, Sri Sairam Institute of Technology, Chennai, Tamilnadu, India. Received: 05.03.2020 Revised: 01.04.2020 Accepted: 25.04.2020 ABSTRACT: Nowadays Cyber security is one of the most competent and inevitable field in the world. Cyber Security is filled with both cyber cases and criminal cases in every part of the world. Most of the cases were solved by the cyber law and IT act. In this paper, we introduce the Network Allocation Translation (NAT) in cyber networks. Network Allocation Translation is the technique where the public IP address is assigned to a computer by a system device. There are various NAT techniques are used in cyber security. One of them is NAT traversals. NAT Traversal is also known as UDP encapsulation which allows traffic to get to specified destination when a device does not have a public address. NAT traversals are required for many network applications especially P2P and VoIP networks. KEYWORDS: Cyber security, Security risks, NAT types, NAT techniques, NAT-T. © 2020 by Advance Scientific Research. This is an open-access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/) DOI: http://dx.doi.org/10.31838/jcr.07.06.228 I. INTRODUCTION Cyber Security is an information technology security designed to protect the online data or information from attack through internet. All the online services are being protected by the cyber security which combines the internet and virtual reality to protect the information from unauthorized access [1]. Cyber Security also refers to the security that offered through the real-time services to protect the real time information. When the people and public authorities were connected to the internet, security threat that causes massive harm are increased. The word “cyber” refers to the combination of information’s from technology, internet and virtual reality. There are so many types of cyber security. They are critical infra structure Security, cloud security, Application Security, Network Security and Internet of Things (IoT) Security. Cyber security is a significant concern these days considering the way that government administration, military, corporate industry, financial sectors related, and hospitals medic al field, etc stores their data or sensitive information related to the latest techniques, procedures and important information with some uncommon measures in their computers and mobile gadgets. Most of this data is very important and is sensitive regardless of whether that be protected from intellectual property, bank financial related information, individual data, or different kinds of information such as personally identifiable information (PII) and protected health information (PHI) for which unapproved access or presentation could have negative results. 1299 JOURNAL OF CRITICAL REVIEWS ISSN- 2394-5125 VOL 7, ISSUE 6, 2020 Risks in Cyber Security Risk can be characterized as the chance of an undesirable result because of any incidents, occasion, or event, as dictated by its probability and the related outcomes [2].Cyber Security risk is the major concern in which there is a chance of exposure or stolen of data, unauthorized usage of data of your organization commonly present. A predominant, furthermore consolidating definition is the conceivable mishap or harm related to particular system, use of advancement or notoriety of an association. Decision makers got the chance to make chance evaluations while organizing outsider sellers and have a risk relief technique and digital episode reaction plan in situ for when a break happens. Section 1 includes the introduction and risks of cyber security. Section 2 describes literature survey of NAT-T. Section 3 describes NAT History, Overview of NAT, NAT Types and its techniques; Section 4 elaborates NAT Traversal, Operation of NAT-T and its Techniques. Section 5 defines the conclusion of NAT-T Review. II. LITERATURE SURVEY Vojtech Krmicek, Jan Vykopal and Radek Krejci [4] proposed a paper titled “Netflow based system for NAT detection” describes about the network security, is a significant field, particularly deals with the misuse of the network resources. Network Address Translation (NAT) is one such a resource device present inside the network, arises serious security issues. Many techniques are developed to identify such a NAT Devices and are failed with high false positive rate (FPR). More over no procedure stated on how to perform this NAT detection with Netflow data on large networks for forensic analysis. Authors [4] contributed NAT detection technique with Netflow data with some advancement in NAT detection technique with its prototype system which combines the several NAT detection methods to reduce the false positive rate (FPR) and false negative rates (FNR). Huynh Cong Phuoc, Ray Hunt and Andrew McKenzie [5] proposed a paper titled “NAT Traversal Techniques in Peer to Peer Networks”. This paper explains about P2P networking has significant applications. These considerable requests progress the vital and reliable NAT traversal methods. This paper is also reflecting current and evolving actions and processes proved by NAT-T in P2P networks. NAT acknowledgment is categorised in both TCP and UDP sequences of traversal. Communication method, Connection Setback method, and Hole Punching method are observed. In conclusion, the tested growth is well-defined to assess NAT-T methods and to fix suitable outlines in demand to complete P2P networks. R.Mahy, P.Matthews, J.Rosenberg, [6]presented a paper titled “Traversal Using Relay NAT (TURN) Extensions for TCP Allocations”. This describes that transitional node acts as a message relay. This explanation states a protocol, called TURN. It permits the host to control the transmission process and to exchange data packets with its users using transmission. J.Rosenberg et al., [7] presented a paper titled as “STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)”. This describes STUN protocol which is insignificant protocol that authorizes needs to control existence of NAT types. It subjects the ability for requirements to fix the network addresses assigned by the NAT to them. Majority of the NAT available currently are works with the STUN as it permits most different variety of requests to work through existing NAT structure. Yevgeniv Yeryomin, Florian Evers, and Jochen Seitz [8] proposed a paper titled “Solving the Firewall and NAT Traversal Issues for SIP-based Voice over IP”. This paper states that Session Initial Protocol (SIP) is the applicable signalling protocol for VoIP. Unsatisfactorily, a VoIP call can't be unsurprising on the off chance that one of the SIP soft phones is situated behind a NAT passage or defensive firewall. A VoIP call incorporates subjective UDP ports for answers that must be adequate. This can be risky because of security reasons. Banerjee, Dwip N., Jain, Vinit, Vallabhaneni, Vasu, [9] presented a paper titled “Accessing Data Processing Systems behind a Network Allocation Translation Enabled Network”. This paper describes that a Network Allocation Translation (NAT) data processing concept present behind network of NAT with its device. A client framework set demands Network Allocation Translation (NAT) gadget for the address location of Network Allocation Translation (NAT) data dealing with the framework. The consistently request engaged through Network Allocation Translation (NAT) device to a DNS server. This Domain Name Server goes before an area for the NAT data dealing with framework with source sending. This leads 1300 JOURNAL OF CRITICAL REVIEWS ISSN- 2394-5125 VOL 7, ISSUE 6, 2020 information sending to the NAT information preparing system at the location with the client system sending over the NAT gadget. Jeffery M. Capone, and Pramod Immaneni [10] presented a paper titled “Protocol and system for firewall and NAT traversal for TCP connections”. Firewalls along NAT convey numerous advantages for clients and the Internet, yet these devices pause various current TCP/IP requests, in this manner, they conceal the system character clients and block TCP call needs. Firewalls and Network Allocation Translations make it incredible to a source of TCP to determine the connection setup. In addition, NAT is negotiated and create a two directional P2P TCP connection in the firewall. III. NAT HISTORY Internet architecture and protocols designed before mid 1990 are used till now by the internet pioneers. Any host and the internet are end-to-end connected by the network they designed. In the year 1990 with the usage of 1:1 translation, network