• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Leveraging Active Decremental TTL Measuring for Flexible and Efficient NAT Identification

    2022-03-14 09:25:36TaoYangChengyuWangTongqingZhouZhipingCaiKuiWuandBingnanHou
    Computers Materials&Continua 2022年3期

    Tao Yang,Chengyu Wang,Tongqing Zhou,Zhiping Cai,*,Kui Wu and Bingnan Hou

    1National University of Defense Technology,Changsha,410073,China

    2Department of Computer Science,University of Victoria,Canada

    Abstract:Malicious attacks can be launched by misusing the network address translation technique as a camouflage.To mitigate such threats, network address translation identification is investigated to identify network address translation devices and detect abnormal behaviors.However,existing methods in this field are mainly developed for relatively small-scale networks and work in an offline manner, which cannot adapt to the real-time inference requirements in high-speed network scenarios.In this paper,we propose a flexible and efficient network address translation identification scheme based on actively measuring the distance of a round trip to a target with decremental time-tolive values.The basic intuition is that the incoming and outgoing traffic from a network address translation device usually experiences the different number of hops,which can be discovered by probing with dedicated time-to-live values.We explore a joint effort of parallel transmission,stateless probes,and flexible measuring reuse to accommodate the efficiency of the measuring process.We further accelerate statistical counting with a new sublinear space data structure Bi-sketch.We implement a prototype and conduct real-world deployments with 1000 volunteers in 31 Chinese provinces,which is believed to bring insight for ground truth collection in this field.Experiments on multi-sources datasets show that our proposal can achieve as high precision and recall as 95%with a traffic handling throughput of over 106 pps.

    Keywords: Network address translation; NAT security; NAT identification;active measurement

    1 Introduction

    As a widely adopted protocol, network address translation (i.e., NAT), also known as IP masquerading, provides transparent routing to hosts by mapping IP addresses from one realm to another [1].Based on NAT, only a single IP address is required to represent a group of devices(e.g., PC, mobile phone), which in return makes every single device behind one NAT anonymous.Hence, NAT is an attractive technique that often being misused by malicious users who want to hide the real identity [2].As reported, approximately 19% of the infected hosts reside in NATed domains [3].Meanwhile, unauthorized NAT devices may be a significant security problem [4]and the malicious hosts hidden behind the NAT devices will be continuous threats to network security [2,5].In order to detect these threats, it is essential to effectively identify NAT usage during network services [3,4].There are several techniques developed for analyzing the NAT usage situation.Some propose to identify NAT usage depending on periodically observed fields, such as IP ID or TCP options [6].Differences in the OS fingerprints of the same IP from multi-round of scanning indicate the NAT usage [7].Meanwhile, the frequency of accessing web services from the same address is introduced to make the inference in by analyzing offline traffic [8].However,involving long-term measuring for the single IP results in considerable storage and computing costs.Considering these limitations, we point out that these efforts predominately are designed to work offline for small-scale networks, thus cannot scale to large-scale NAT identification in real-time.In fact, it is essential for NAT identification to work online in real-time.On one hand,the adoption of 100 Gbps networks is nowadays pervasive [9].In these settings, the peak traffic can easily reach a throughput of 2,000 Gbps for large Internet exchange points [10].An effective identification method is expected to respond to these inputs flexibly.On the other hand, the mobility of end devices leads to instability of the NAT traffic [11,12].Furthermore, the network types (NAT/not NAT) of a mobile terminal change rapidly during moving.For the detection of malicious behaviors behind NAT, effective identification should perceive such dynamics and fluctuations timely.

    In this work, we propose a flexible and efficient NAT identification scheme that can adapt to large-scale networks and fluctuated traffic.Our basic insight is that the hops he to an end device in NAT environment is in fact further than reaching out to the IP address it uses.To this end,we design an Active Decremental TTL-based (ADT) algorithm whose probes are composed of a series of ICMP packets with decremental TTL values (i.e., he, he-1, etc.).Compared with the ADT algorithm, the existing traceroute tools will send abundant small TTL (e.g., 1, 2) probes in the initial stage which undoubtedly cause the waste of upload bandwidth.

    Given that the amount of incoming traffic is large, we carefully adopt several mechanisms including parallel transmission, stateless probes, measuring reuse and data approximation to implement the scheme.For computing statistics during identification requires tremendous query operations, we design a new sublinear space data structure (i.e., Bi-sketch) to avoid excessive intermediate information storage, simplify the counting process, and attain efficiency.Compared with Count-Min Sketch [13] and MV Sketch [14], Bi-sketch solves the statistical challenge for inferring multi-type real-time data streams.

    Note that existing techniques test their proposals on offline datasets due to the lack of NAT labeled traffic.To fill this gap, we implement a prototype and deploy it in real-world networks during the evaluation.In summary, we make the following contributions:

    ? We implement a comprehensive NAT identification scheme integrating the proposed Active Decremental TTL-based (ADT) algorithm and several innovative mechanisms (i.e., parallel transmission, stateless probes, measuring reuse and data approximation).

    ? We propose a new sketch structure (i.e., Bi-sketch) to accelerate statistic computation with its error bound theoretically proved.

    ? Targeted at the lack of NAT labeled traffic datasets, we design a lightweight prototype by recruiting around 1000 volunteers from 31 Chinese provinces.

    2 Preliminaries

    2.1 Observations on TTL

    Time to live (TTL), as a field of IP header, is a mechanism that limits the lifespan or lifetime of packets in a network [15].Our scheme is based on three observations on the IP TTL field.

    2.1.1 Characteristic Initial TTL

    As shown in Tab.1, This characteristic initial TTL of individual operating system implementations of TCP/IP is well known and can be used as part of a fingerprint to identify the operating system, meaning that we can identify the host running operating system merely by examining its traffic [16].

    2.1.2 Router Behavior

    NAT devices or gateways reduce the TTL of packets that they forward [17].The TTL field is set by the sender and reduced by every router on the route to its destination.If the TTL field reaches zero before the datagram arrives at its destination, then the datagram is discarded, and a Time-Exceeded packet is sent back to the sender [15].

    2.1.3 Routing Hops

    More than 90% hosts can be reached within 18 hops and the max hops of a normal route path will be less than 32 hops [18].

    2.2 Related Work

    Time to live (TTL), as a field of IP header, is a mechanism that limits the lifespan or lifetime of packets in a network [15].Our scheme is based on three observations on the IP TTL field.Currently, there are several methods to identify NAT usage.In this section, we first characterize existing methods regarding four principal properties that indicate how well they work(i.e., throughput, cost, real-time and clientlessness).Notification, our purpose is large-scale NAT identification for network threats in the introduction rather than the continuous NAT research without time and cost constraints.Thus, throughput is undoubtedly essential and ground truth should be given appropriately.For large-scale networks, excessive storage and query costs are unacceptable.Extensive client-side participation is also unrealistic in large-scale networks (i.e.,clientlessness).In order to detect malicious traffic in time, real-time identification will be necessary.It is desired that a method fulfills all of these properties in order to be comprehensive and to be widely applicable.Then we review existing methods for inferring NAT usage from the literatures and compare them regarding their properties.Moreover, we summarize all the methods in Tab.2 for comparison.

    Table 1: Initial TTL values of different OS

    Table 2: Existing methods

    Based on the observation that on many operating systems, the IP header’s ID field is a simple counter [6], Bellovin and Steven M propose a technique for detecting NATs and counting the number of active hosts behind NATs.They find that when receiving packets from the same host behind NAT, the IP header’s ID field shows a linearly increasing relationship.However, not all NAT routers and terminals use simple counters in the ID fields [21], and high detection cost and non-real-time measurements are the weaknesses of this method.

    NAT Revelio [19] detects the NAT444 at the ISP by deploying the client on the user’s host and the server on the public network.When the client accesses the network, it will send a probe message to the server.At the same time, the author used NAT Revelio to detect the deployment of CGN (Carrier Grade NAT) in the United States and Europe [22].However, this method requires the participation of the client, and its low throughput is also fatal in large-scale NAT identification.

    Muller et al.[20] intelligently introduced routing information for detecting Large Scale NAT(LSN) and Carrier Grade NAT (CGN).By using TCP, UDP echo-reply, and traceroute tools,the author proposes to detect NAT based on the routing information and IP address of the replying packets.However, this method has the following problems: 1) The TCP-based version of the algorithm requires superuser privileges on the client-side, which is not acceptable for most of the volunteers running the test.2) TCP, UDP echo-reply, or traceroute tools all need to save the intermediate state and keep the measurement interval.Further, the participation of the client-side is unrealistic in the real network.Besides, the intermediate state reservation will lead to huge storage and query costs.Thus, the Andreas Muller method is suitable for discovery of NAT middleboxes rather than real-time NAT identification in network security or network management scenarios.

    Using passive measurement, Livadariu [8] classifies traffic datasets and detects the deployment of CGN at the autonomous domain (AS) level by two methods.The first method infers/24 blocks used for CGN by analyzing traffic with client identifiers.The second method achieves the same goal by investigating how frequently the same IP address accesses a web service.These two methods are very suitable for NAT detection in a static traffic data set, but for real-time traffic,these methods must store packets of several entire streams as input.It requires a lot of storage costs as the buffer when processing real-time backbone network traffic.Besides, for large-scale traffic analysis, it is almost impossible to verify the results and provide the ground truth.

    As is shown in Tab.2, methods based on the long-term IP header observation cannot meet the real-time requirement.The client-side participation techniques are not applicable for large-scale NAT identification in real time.Passive measurement methods suffer from huge traffic storage costs and non-comprehensive evaluation due to the lack of ground truth.Obviously, existing methods cannot meet all the requirements at the same time, but we adopt several innovative mechanisms to address the problems.

    3 The Proposed Scheme

    We first present the design of the active decremental TTL-based (ADT) algorithm and its initial assumption intuitively.Then, we implement a comprehensive NAT identification scheme integrating innovative and efficient mechanisms.Furthermore, we give the details of the sublinear space data structure (i.e., Bi-sketch) and its theoretical error bound.

    3.1 ADT Algorithm for NAT Identification

    In general, the detection of NAT should rely on different behavior patterns of NAT gateway and the host behind NAT, those complex detecting mechanisms will confuse the network in largescale real-time NAT identification.In order to reduce the impact on the network, we use the Active Decremental TTL-based algorithm to build the NAT traffic analyzer.This algorithm can not only identify the NAT usage, but also measure the hops between the end hosts and the NAT devices or gateways.

    ?

    The initial assumption of our ADT algorithm is that we are able to trace the real hops and compare them with the packet hops when our scheme sniffed a packet as Fig.1.Suppose a host uses the Windows OS and is 10 hops away from the measurement server, the host would then generate IP packets with a TTL value of 128.The TTL value decrements to 118 and then is inferred to be 128 closest to 118+32 when the packet arrives at the measurement server and the public IP source address of NAT devices or gateways can be extracted.However, the measurement server finds that the hops to the public source IP are 9 rather than 10 hops as predicted, revealing the existence of the NAT router.

    Figure 1: Intuitive NAT identification with ADT algorithm

    The initial TTL values of the packets and efficient hop trace are indispensable.There are methods for obtaining the initial TTL of the target hosts, such as OS fingerprint from the Nmap tool [23].However, long time-consuming, and huge probing traffic of OS fingerprint is intolerable for large-scale networks.To address these challenges, we directly infer the initial TTL of packets which is closest to the reversed TTL + 32 according to the observations on initial TTL value of different OS in 2.1.

    To further reduce bandwidth usage, the TTL values of probes are initially set to difference between initial TTL and reserved TTL and actively decrement instead of naively increasing.Suppose a host is 10 hops away from the measurement server, most small TTL (e.g., 1, 2, 3)probes are unnecessary and will get the Time-Exceeded replies [16].

    3.2 Design for an Efficient Implementation

    There are several mechanisms of the NAT traffic analyzer for the flexible and efficient identification: 1) parallel transmission.To avoid blocking and deadlock, the analyzer directly processes link-layer frames rather than network sockets.2) stateless probes.As shown in Fig.3, intermediate information will be kept both in ICMP options and payload and only probe replies are handled.3) measuring reuse.Already stored results can infer the old stream packets due to hosts are fixed in one stream.4) data approximation.We improve the counting efficiency by using a new sketch structure for data approximation and reduce the storage costs in the meantime.

    3.2.1 Parallel Transmission

    As one of the most used Internet protocols, ICMP itself can carry a large amount of routing and terminal information as the probing protocol.We can even set the options in the ICMP packets to achieve our measurement purpose.Thus, when it sniffs packets from the targeted network, the analyzer runs as follows:

    (1) After the Sniffer, Filter, Classifier in Fig.2, all the packets will be divided into new stream packets, old stream packets and replying probe ICMP packets to exploit measuring reuse.The old stream packets and ICMP packets are handled by theOutputHandler(i.e., Bisketch) in 3.2.4.The information of new stream packets, such as TTL and IP addresses, is used to create ICMP probes.

    (2) In the Generation module, the destination address of the ICMP probe is set to the source address of the new stream packet.Then, the probes are created based on ADT algorithm and handled by the next step.

    (3) The Transmission will send the ICMP probes in parallel.Then the replies of these probes will back to the analyzer and processed as Step (1).

    Figure 2: An efficient NAT traffic analyzer

    Figure 3: Source IP, size and reversed TTL of the packets are the characteristics of traffic, and the series of probes have the active decremental TTL which are the intermediate information

    3.2.2 Stateless Probes

    Scanning of hosts on the Internet to infer NAT usage inevitably keeps the intermediate states.Local storage of intermediate states will cause a lot of storage and query costs, further reducing efficiency.Thus, the probes keeping the intermediate state, so-called stateless probes, is an intuitive idea.As shown in Fig.3, the ICMP options and payload both keep the intermediate information to ensure that the replies do not lose it.However, real-world networks are complex and unexpected.We consider the following network anomalies: 1) the routers along the path do not reply to ICMP probes.2) the probe replies out-of-order arrived at the analyzer.3) forward and backward path asymmetry.4) packet loss.For our scheme’s robustness, we exploit the previous and next hop replies for inferring the not replying as shown in Fig.4.Besides, the same TTL multiple probes can be the guarantee of replies.Intuitively, even if the path asymmetry causes the hops differences, multiple replies can be seen as votes for the most common hops to reduce the errors.

    Figure 4: The network anomalies and the ADT algorithm’s countermeasures

    We cannot deny that the errors caused by network anomalies cannot be completely eliminated.Thus, we further describe the errors in 5.2, and we experimentally characterize the analyzer’s performance in 5.Additionally, there are also some decent works [24,25] for network optimization to reduce network anomalies which will support our methods.

    3.2.3 Flexible Measuring Reuse

    In the previous subsections, we introduce the parallel transmission and stateless probe mechanisms of the NAT traffic analyzer.However,is it necessary to analyze every packet of real-time large traffic on the real network and under such high load?A straightforward idea is using the measuring results that are already stored.

    Based on the observation that two hosts are fixed in one stream, such as a TCP handshake,we only need to analyze the quintuple, including the source address, the destination address, the source port, the destination port, and the transport layer protocol of the packets to identify a stream as shown in Fig.5.Therefore, the introduction of the Bloom filter can reduce a lot of meaningless analysis.

    Bloom filter [26] is a space-efficient probabilistic data structure, conceived by Burton Howard Bloom in 1970, that is used to test whether an element is a member of a set.Bloom filters use multiple hash functions and a small amount of storage space to analyze large amounts of data.Because the cost of the hash function is low, and all data can be stored in RAM, even in the Cache, the Bloom filter can reduce numerous unnecessary operations without additional performance loss.

    Inevitably, the false positive rate of the Bloom filter will increase as the number of packets increases.A reasonable method is to refresh the bloom filter at certain intervals.According to the formulawe set the capacitymof the Bloom filter, the numberkof hash functions, and the refresh interval.When the number of packets n is 107and the false positive rate is less than 0.01, about 20 MB storage space and 7 hash functions are enough for measuring reuse.

    3.2.4 Data Approximation

    However, considering practicality, it is meaningless for network management and network security to only know the types (NAT/non-NAT) of each packet or each stream, and necessary statistical information is the real demand.Naively, directly storing the identification results will result in a lot of query costs.For example, assuming the types (NAT/non-NAT) of n streams have been identified and the new results of m packets have arrived, the cost of querying and storing to the corresponding streams will beO(mlogn).Even in frequently observed 10Gbps networks, direct storage is not practical.

    To address the statistics challenge of real-time large traffic, we propose the Bi-Sketch in Fig.6 based on Count-Min Sketch [13] and MV Sketch [14].Compared with other traffic sketch algorithms, Bi-Sketch addresses the statistical challenge for counting multi-type real-time data streams The data approximation is presented in Fig.7.First, like Count-Min Sketch, all packets will be mapped to the bucket throughrhash functions in Bi-sketch and the sizes will be added to the correspondingVi,j.Second, the identification results will revise the types (NAT/non-NAT),Di,j., which default to NAT traffic in initialization.Therefore, the query and storage costs of Bi-Sketch areO(2m).For accuracy guarantees, we state a lemma about Bi-Sketch’s error bounds as follows and give its proof in Appendix.1.

    Given parameters(?,δ), setw=[e/?] andr=[ln(1/δ)].LetAflowsbe the size of A type flow.With probability at least 1-δ, the estimatehas the following guarantees:

    4 The Prototype

    In fact, it is non-trivial, if not impossible, to attain the ground truth of NAT label for largescale network traffic as it requires intensive involvements of the target (source of the traffic) for manual annotation.This further highlights the necessity of an effective measurement technique.To overcome the lack of ground truth for evaluation purposes, we implement a relatively lightweight prototype for demonstration purposes by building a server for centralized traffic analysis and recruiting distributed mobile terminals as end devices.The workflow is shown in Fig.8.

    To attain traffic type ground truth, we design an annotation module for the participated devices to detect and report.Specifically, we refer to the Session Traversal Utilities for NAT(STUN) protocol [27], which can differentiate address translation types (e.g., Open Internet, Cone,Symmetric, UDP Blocked), to classify NAT traffic.

    Based on STUN, we can acquire whether the mobile terminal is on the Open Internet (non-NAT) or in other types (NAT) when it accesses the public STUN server.Note that merely obtaining the traffic type is not enough, meanwhile, we also require the hops of the end devices to the NAT gateways to evaluate the identification precision.For this, a terminal first obtains its public IP address by accessing some domain names.Then, existing tools, such as traceroute, are used to measure the hops away from the NAT gateway easily.

    Figure 5: Packet No.1 passes all the hash function tests, which indicates that one packet of this session may have been detected.Packet No.2 fails which means that this packet needs to be analyzed

    Figure 6: Data structure of Bi-Sketch

    The diversity of mobile terminal operating systems, such as iOS and Android, poses new challenges for implementing the client-side prototype during real-world deployment.Obviously,developing dedicated software or plug-ins for each operating system is inflexible.Fortunately, we are aware that most Chinese users have the WeChat, which is known as a social platform/software,installed on their mobile devices [28].To this end, we propose to deploy the client-side prototype on the WeChat applet.Since the WeChat applet is embedded in the software, no additional downloading or installation is required for the clients.Meanwhile, due to its portability and compatibility, the clients only need to start the measurement and wait for around 10 s to acquire the current network status.Finally, the collected data will be uploaded to and aggregated in the centralized server.

    Figure 7: The revision of Dij according to active detection results

    Figure 8: Workflow of NAT identification prototype

    We recruit 1000 volunteers from 31 provinces in China for traffic data annotation.The geodistribution of their devices and the corresponding traffic types (w.r.t., STUN) are depicted in Fig.9.Again, we emphasize that this relatively small-scale deployment is for the purpose of ground truth collection, which is not applied on real backbone networks directly.

    5 Experiments

    5.1 Setup

    5.1.1 Metrics

    Recall that our scheme is designed for flexible and efficient NAT identification.To test the effectiveness and performance, we use precision and recall for qualifying identification accuracy and use the throughput of handling incoming traffic for gauging its efficiency.

    Only several ICMP probes are enough in our scheme [29,30], the number of which is related to the hops between the end hosts and NAT gateways.Besides, the probes are sent in parallel,and the extra transmission overhead is small.Therefore, the scheme delay will not be evaluated separately.

    Figure 9: Volunteers from all over china were invited to participate in evaluation

    5.1.2 Datasets

    By jointly considering the requirements of evaluating different performance aspects, we conduct experiments based on three sources of data (as shown in Tab.3).On one hand, since estimating identification accuracy needs the ground truth regarding the NAT type and online measuring, we use the collected data of our prototype for this purpose.On the other hand,an appropriate efficiency test should be provided with sufficient and controllable traffic, so we introduce the M-lab NDT [8,31] to support extensive simulations.The NDT dataset is a single stream performance measurement of a connection’s capacity and reports uploading/downloading speeds.Finally, we attempt to observe the effectiveness via deploying our scheme on a largescale network.For this part, we collect the results of NAT identification at a Border Gateway of CERNET in Jiangsu Province.Wherein, both IPv4 and IPv6 traffic are analyzed.

    5.2 Accuracy Evaluation

    Considering the difficulty of large-scale accuracy evaluation, we finally design a relatively light weight prototype whose components are all under our control.Besides, we also introduce the evaluation metrics of performance on precision rate and recall rate.

    For fine-grained evaluation and analysis of the causes of errors, each data from volunteers is assigned the universally unique identifier (UUID).Then, not only the statistics of the data set are evaluated, but the errors of each sample will be also observed as shown in Fig.10.In summary,the precision rate and recall rate of the hops between NAT gateways and the end devices are both over 95%, using the ADT NAT identification scheme.However, there are still some errors between the real hops and the ADT measured results.It is found that the ADT measured results are usually larger than the real hops.For the explanation of this phenomenon, we analyze the ADT replies and find that the multiple routers not replying the probes causes the oversized ADT measured results.For example, both the real NAT gateway and the NO.1 router in Fig.11 do not reply to the ADT probes.Then the NO.1 router, closest to the NO.2 router which replies to the Time-Exceeded, will be recognized as the NAT gateway which causes 1 hop error.

    Figure 10: The NAT Identification Result on Prototype

    Figure 11: Cause of the oversized ADT measured results

    According to the dataset from the prototype deployment in Tab.4, the error of the ADT NAT identification scheme does not exceed 5% and all the 0 hop away from NAT gateways (non-NAT) can be correctly identified.Besides, there is only 1 hop difference between the real hops and the ADT measured results.From the perspective of whether the ADT algorithm can identify the NAT devices, the method achieves an 100% precision rate and up to 99% recall rate, which shows the high performance of our work on the NAT identification.

    Table 4: Precision rate and recall rate of NAT identification prototype

    5.3 Efficiency Evaluation

    To cope with the continuous high load in large-scale networks, high throughput is also an important indicator of the NAT identification scheme.The requirement on throughput majorly includes two aspects.

    First, considering the continuous high load of large-scale networks, the throughput and capacity of the NAT identifciation scheme should keep stable rather than fulctuate sharply.In other words, huge memory usage should be avoided as much as possible.Therefore, we adopt about 1 billion packets from the M-lab NDT dataset [31] as the benchmark for the evaluation.The result, shown in Fig.12, indicates that the throughput of this scheme could keep about 1 M pps capacity even under more than the max input load.Note that the receiving capacity is the bottleneck of the NAT identification scheme due to the tiny upload bandwidth usage of the ADT probes.

    Figure 12: The receiving capacity of the NAT identification scheme

    Second, it is intolerable that lots of active probes occupy bandwidth and reduce the quality of service on the Internet.Therefore, we evaluate the size of the probe traffic under different loads and the impact of active measurement on the network.The result, shown in Fig.13,demonstrates that the scheme does not exploit all the input traffic but the packets of the new streams for probing, which could avoid the bandwidth waste.Generally, even under the max load,the uploading probe traffic will not exceed 1 MB/s, which owes to the adopted bloom filter [26]and the small size of the ICMP packet.

    Figure 13: Bloom filter reduces huge upload bandwidth usage of active probe

    Note that the scheme is deployed for throughput evaluation on an Ubuntu 16.04 platform with 4 core CPU and 8G RAM.Therefore, the NAT identification scheme takes into account high throughput and low cost, which means that the applicable scope of the proposed method includes the traffic analysis on the gateways of the backbone networks.Thus, we present the experiment in a real laboratory bed.

    5.4 Real Large-Scale Network Deployment

    CERNET is the first nationwide education and research computer network in China.According to reports, the bandwidth of CERNET backbone has been up to 2.5 Gbps by the end of 2000.More than 2,000 education and research institutions, 1.2 million PCs and 20 million end users have connected to the CERNET.In order to demonstrate the feasibility of large-scale NAT identification, we deployed the scheme at a Border Gateway of CERNET in Jiangsu Province.The traffic’s IP address range is 121.248.192.0/20, 202.119.112.0/20, 219.230.160.0/20, 222.193.96.0/20,2001:250:5005::/48 and 2001:DA8:1004::/48.The NAT identification lasts from November 26, 2020 to December 2, 2020.About 500gigabytes traffic data is collected at intervals 14:00-15:00 every day.

    Due to the security configuration of NAT gateways, about 30% of the traffic cannot be identified for the host not replying to ICMP probes.Therefore, the ADT NAT identification scheme, deployed on the CERNET, successfully identified about 70% of the traffic both in IPv4 and IPv6.As shown in Fig.14, among the identified traffic, 74.1% of the IPv4 traffic on average is intranet or NAT traffic, and this proportion drops to 15.6% in the IPv6 traffic.Besides, we notice that about 10% of IPv6 traffic addresses are distributed in the fe80::/10 block, known as Link-local address.There is no such Link-local address traffic in the IPv4 dataset.We suppose this may be an IPv6 router misconfiguration problem.

    Figure 14: The proportion of NAT traffic is usually changing

    6 Conclusion

    In this work, we introduce an active decremental TTL-based (i.e., ADT) algorithm and implement a real-time NAT identification scheme that can identify the NAT usage and measure the hops between the end devices and the NAT gateways.This work is practical and efficient for large-scale network security and network management scenarios.For flexible and efficient NAT identification, we innovatively adopt several mechanisms including parallel transmission, stateless probes, measuring reuse and data approximation.Besides, we provide our new sketch structure(i.e., Bi-sketch) for data approximation with its error bound theoretically proved.To solve the lack of NAT labeled dataset and comprehensively evaluate the ADT algorithm with ground truth,we also implement a light-weight prototype and conduct real-world deployments.Experiments indicate that our scheme outperformed the existing NAT usage identification methods in multiple metrics.

    Acknowledgement:Tao Yang and Chengyu Wang contribute equally to the article.The authors thank those who contributed to write this article and give some valuable comments.

    Funding Statement:The work is supported by the National Key Research and Development Program of China (2018YFB1800202) and the NUDT Research Grants (No.ZK19-38).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    Appendix A.Bi-sketch’s proof

    Obviously, the number of buckets in a row is:

    Due to the random and uncertain arrival time of measurement results, the effect of the second correction should be saved in bucketDij.If it is a non-NAT according to the active detection,Dijshould be set to 0.

    Therefore, letTflowsbe the entire traffic, and we conclude as follows:

    LetAflowsbe the non-NAT traffic andBflowsbe the NAT traffic.If we assume that there is no hash collision:

    Hash collision is inevitable for large-scale data.There will be cases where the hash values ofAflowscoverBflows’s since only non-NAT traffic was checked.The estimate including hash collision:

    Therefore, we can give the estimates of NAT traffic through Bi-Sketch, and the estimate has the following guarantees:

    Given parameters(?,δ), setw= [e/?] andr= [ln(1/δ)].Besides, we proved that with probability at least 1-δ,

    Set α=Aflows/Tflowsand β=Bflows/Tflows.We introduce indicator variablesIi,j, which are 1 if(j∈Aflows∧(?k∈Bflows,hi(j))=hi(k)), and 0 otherwise.By pairwise independence of the hash functions, then

    by pairwise independence ofhi, and linearity of expectation.By the Markov inequality,

    We can conclude that with probability at least 1-δ,

    老汉色∧v一级毛片| 日本成人三级电影网站| 免费人成视频x8x8入口观看| 无遮挡黄片免费观看| 国产成+人综合+亚洲专区| 国产精华一区二区三区| 99久久精品热视频| 欧美乱码精品一区二区三区| 欧美成人一区二区免费高清观看 | 久久中文字幕一级| 999久久久国产精品视频| 人妻丰满熟妇av一区二区三区| 亚洲色图 男人天堂 中文字幕| 精品国产超薄肉色丝袜足j| 日本三级黄在线观看| 一个人观看的视频www高清免费观看 | 午夜精品久久久久久毛片777| 国产又色又爽无遮挡免费看| 日本熟妇午夜| 国产视频内射| 午夜福利免费观看在线| 国产99白浆流出| 久久久久精品国产欧美久久久| 香蕉丝袜av| 好男人电影高清在线观看| 高潮久久久久久久久久久不卡| 午夜福利在线观看吧| 国产一区二区在线观看日韩 | 麻豆久久精品国产亚洲av| 国产精品 欧美亚洲| 母亲3免费完整高清在线观看| 亚洲美女黄片视频| 很黄的视频免费| 久久中文字幕一级| 一a级毛片在线观看| 一本综合久久免费| 狂野欧美激情性xxxx| 精品国产乱码久久久久久男人| 好男人电影高清在线观看| 欧美一级a爱片免费观看看 | 69av精品久久久久久| 日韩免费av在线播放| 中文字幕久久专区| 非洲黑人性xxxx精品又粗又长| 亚洲国产欧美人成| 久久精品人妻少妇| netflix在线观看网站| 国产97色在线日韩免费| 露出奶头的视频| 少妇人妻一区二区三区视频| 成人国产综合亚洲| 久99久视频精品免费| 国产一区二区激情短视频| 天天躁夜夜躁狠狠躁躁| 真人做人爱边吃奶动态| 制服人妻中文乱码| 国内毛片毛片毛片毛片毛片| 人妻丰满熟妇av一区二区三区| tocl精华| 长腿黑丝高跟| 成人国产一区最新在线观看| 亚洲天堂国产精品一区在线| 日韩高清综合在线| 香蕉丝袜av| 国产成年人精品一区二区| 麻豆国产97在线/欧美 | 两个人免费观看高清视频| 欧美性长视频在线观看| 亚洲欧美日韩高清在线视频| 亚洲国产中文字幕在线视频| 性欧美人与动物交配| 亚洲人成电影免费在线| 国产成人影院久久av| 丰满人妻一区二区三区视频av | 一本综合久久免费| www.精华液| 制服诱惑二区| av在线天堂中文字幕| 国内揄拍国产精品人妻在线| 日韩中文字幕欧美一区二区| 黑人操中国人逼视频| 欧美日韩一级在线毛片| 亚洲人成77777在线视频| 国产又色又爽无遮挡免费看| av免费在线观看网站| 少妇的丰满在线观看| 制服诱惑二区| 亚洲精品国产精品久久久不卡| 久久久久久免费高清国产稀缺| 久久久精品大字幕| e午夜精品久久久久久久| 午夜福利在线观看吧| 欧美日本亚洲视频在线播放| 可以在线观看毛片的网站| 国产成人欧美在线观看| 国产精品久久久久久人妻精品电影| 国产精品一及| 国产高清视频在线播放一区| 日本熟妇午夜| 人妻丰满熟妇av一区二区三区| x7x7x7水蜜桃| 十八禁人妻一区二区| 亚洲精品国产精品久久久不卡| 19禁男女啪啪无遮挡网站| 免费观看人在逋| 叶爱在线成人免费视频播放| 国产欧美日韩一区二区三| 午夜视频精品福利| 色综合欧美亚洲国产小说| 午夜福利在线观看吧| 久久婷婷人人爽人人干人人爱| 欧美高清成人免费视频www| 一本久久中文字幕| 嫩草影院精品99| 99国产极品粉嫩在线观看| 欧美日韩精品网址| 观看免费一级毛片| 男插女下体视频免费在线播放| 国产黄a三级三级三级人| 91字幕亚洲| 欧美三级亚洲精品| 午夜激情av网站| 欧美日韩瑟瑟在线播放| 亚洲午夜精品一区,二区,三区| 欧美中文综合在线视频| av福利片在线| 最近最新中文字幕大全免费视频| 日韩欧美在线乱码| 欧美另类亚洲清纯唯美| 久久久精品国产亚洲av高清涩受| 国产一区在线观看成人免费| 成年版毛片免费区| 日本熟妇午夜| 日日夜夜操网爽| 老司机福利观看| 国产精品亚洲av一区麻豆| 99riav亚洲国产免费| 少妇裸体淫交视频免费看高清 | 久久 成人 亚洲| 校园春色视频在线观看| 欧美成人一区二区免费高清观看 | 亚洲精品中文字幕一二三四区| 少妇人妻一区二区三区视频| 成人av一区二区三区在线看| 亚洲中文字幕日韩| 99久久久亚洲精品蜜臀av| 亚洲国产看品久久| 亚洲自偷自拍图片 自拍| 久久久久国产一级毛片高清牌| 国产亚洲精品久久久久5区| 久久精品夜夜夜夜夜久久蜜豆 | 欧美日韩一级在线毛片| 一夜夜www| 中文字幕人成人乱码亚洲影| 欧美成人午夜精品| 成人欧美大片| 欧美丝袜亚洲另类 | 久久天躁狠狠躁夜夜2o2o| 久久精品aⅴ一区二区三区四区| 成人特级黄色片久久久久久久| 91麻豆av在线| 免费人成视频x8x8入口观看| 久久精品aⅴ一区二区三区四区| 又黄又粗又硬又大视频| 十八禁人妻一区二区| 国产蜜桃级精品一区二区三区| 亚洲精品中文字幕在线视频| 一本久久中文字幕| 免费av毛片视频| 国产亚洲精品久久久久久毛片| 亚洲精品av麻豆狂野| 久久亚洲真实| 亚洲av成人av| 国产精品 国内视频| 国产精品电影一区二区三区| 亚洲免费av在线视频| cao死你这个sao货| 国产欧美日韩精品亚洲av| 色在线成人网| 国产99白浆流出| 精品高清国产在线一区| aaaaa片日本免费| 高清毛片免费观看视频网站| 黄色视频,在线免费观看| 深夜精品福利| 人人妻人人澡欧美一区二区| 国产精品一区二区三区四区免费观看 | 在线免费观看的www视频| 色综合站精品国产| 午夜福利视频1000在线观看| 久久久久久亚洲精品国产蜜桃av| 观看免费一级毛片| 亚洲 欧美一区二区三区| 国产精品99久久99久久久不卡| 亚洲专区中文字幕在线| 男人舔女人的私密视频| 免费在线观看影片大全网站| 国产精品久久久av美女十八| 露出奶头的视频| 最近最新免费中文字幕在线| 亚洲五月婷婷丁香| 黄色片一级片一级黄色片| 禁无遮挡网站| 好男人在线观看高清免费视频| 欧美乱妇无乱码| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美乱妇无乱码| 亚洲人成伊人成综合网2020| 国产v大片淫在线免费观看| 老司机福利观看| 国产人伦9x9x在线观看| 久久久精品大字幕| 亚洲成av人片在线播放无| 欧美大码av| 久久久久国产一级毛片高清牌| 亚洲人与动物交配视频| 欧美国产日韩亚洲一区| 中文在线观看免费www的网站 | 免费在线观看视频国产中文字幕亚洲| 欧美日韩瑟瑟在线播放| 午夜激情av网站| 国产午夜福利久久久久久| 亚洲av成人不卡在线观看播放网| 男女午夜视频在线观看| 麻豆久久精品国产亚洲av| 亚洲电影在线观看av| 久久久久久九九精品二区国产 | 丰满人妻一区二区三区视频av | 亚洲av日韩精品久久久久久密| 国产伦人伦偷精品视频| 日本 欧美在线| 国产熟女午夜一区二区三区| 美女 人体艺术 gogo| 免费看日本二区| 欧洲精品卡2卡3卡4卡5卡区| 欧美成人免费av一区二区三区| xxx96com| 国产亚洲精品综合一区在线观看 | 91麻豆精品激情在线观看国产| 国产一区二区在线av高清观看| 久久精品91无色码中文字幕| 国产精品亚洲av一区麻豆| 精品久久久久久久人妻蜜臀av| 亚洲精品在线美女| 国产高清激情床上av| 久久久久久久精品吃奶| 热99re8久久精品国产| 舔av片在线| 亚洲狠狠婷婷综合久久图片| 亚洲一码二码三码区别大吗| 99久久精品国产亚洲精品| 亚洲av电影不卡..在线观看| 日本三级黄在线观看| 亚洲成av人片在线播放无| 特级一级黄色大片| 亚洲全国av大片| 亚洲av美国av| 亚洲国产欧美一区二区综合| 少妇的丰满在线观看| 国产av麻豆久久久久久久| 亚洲欧美日韩高清在线视频| 国产亚洲精品综合一区在线观看 | 99re在线观看精品视频| 宅男免费午夜| 18禁黄网站禁片免费观看直播| 精品人妻1区二区| 日韩成人在线观看一区二区三区| 国产精品亚洲一级av第二区| 99热这里只有是精品50| 国产69精品久久久久777片 | 曰老女人黄片| 中文字幕av在线有码专区| 国产精品永久免费网站| 欧美日韩福利视频一区二区| cao死你这个sao货| 久久久久久国产a免费观看| 一a级毛片在线观看| 身体一侧抽搐| 国产免费男女视频| 成人欧美大片| 亚洲男人的天堂狠狠| 日本一区二区免费在线视频| 一个人观看的视频www高清免费观看 | 老熟妇仑乱视频hdxx| 人人妻人人澡欧美一区二区| 成人三级黄色视频| 久久精品aⅴ一区二区三区四区| 亚洲18禁久久av| 亚洲黑人精品在线| 国产成人一区二区三区免费视频网站| 久久精品国产99精品国产亚洲性色| 欧美国产日韩亚洲一区| 黄色a级毛片大全视频| 99久久99久久久精品蜜桃| 欧美性长视频在线观看| 亚洲精品一卡2卡三卡4卡5卡| 午夜福利高清视频| 精品久久久久久,| 国产精品一及| 99在线人妻在线中文字幕| 国产精品av久久久久免费| 久久精品91无色码中文字幕| 色精品久久人妻99蜜桃| 成人av在线播放网站| 老司机午夜十八禁免费视频| 精品欧美一区二区三区在线| 亚洲欧洲精品一区二区精品久久久| 亚洲国产中文字幕在线视频| 757午夜福利合集在线观看| 嫩草影视91久久| 一级a爱片免费观看的视频| 村上凉子中文字幕在线| 久久精品人妻少妇| 欧美黑人精品巨大| 国产一区二区在线av高清观看| 女生性感内裤真人,穿戴方法视频| 大型av网站在线播放| 在线观看免费午夜福利视频| 男男h啪啪无遮挡| 亚洲av五月六月丁香网| 伊人久久大香线蕉亚洲五| 国产精品一及| 麻豆av在线久日| 久久精品国产99精品国产亚洲性色| 成人18禁高潮啪啪吃奶动态图| 日韩欧美在线乱码| 久久国产精品影院| av天堂在线播放| 久久精品aⅴ一区二区三区四区| 国产午夜精品久久久久久| 18禁美女被吸乳视频| 青草久久国产| 黄色片一级片一级黄色片| 国产真实乱freesex| 午夜福利成人在线免费观看| 国内精品久久久久精免费| 欧美日韩国产亚洲二区| 亚洲欧美精品综合一区二区三区| 老熟妇乱子伦视频在线观看| 又紧又爽又黄一区二区| 每晚都被弄得嗷嗷叫到高潮| 国产精品综合久久久久久久免费| 五月伊人婷婷丁香| 国产精品,欧美在线| 一个人免费在线观看电影 | 国产精品久久久久久亚洲av鲁大| 国产主播在线观看一区二区| 日韩欧美国产在线观看| 欧洲精品卡2卡3卡4卡5卡区| 久久久久国产一级毛片高清牌| 老司机午夜十八禁免费视频| 欧美日韩一级在线毛片| 欧美乱妇无乱码| 人成视频在线观看免费观看| 久久久久久大精品| 长腿黑丝高跟| АⅤ资源中文在线天堂| 国产欧美日韩一区二区三| 一级a爱片免费观看的视频| 亚洲精品在线观看二区| 99久久久亚洲精品蜜臀av| 91字幕亚洲| 男女午夜视频在线观看| 神马国产精品三级电影在线观看 | 国产一区在线观看成人免费| 一区福利在线观看| 日韩欧美免费精品| 国产麻豆成人av免费视频| 欧美最黄视频在线播放免费| 欧美日韩精品网址| 国产真人三级小视频在线观看| 香蕉丝袜av| 99久久国产精品久久久| 91大片在线观看| 免费无遮挡裸体视频| 亚洲美女黄片视频| 免费高清视频大片| 色播亚洲综合网| x7x7x7水蜜桃| 国产精品美女特级片免费视频播放器 | 久久欧美精品欧美久久欧美| 一个人免费在线观看的高清视频| 狂野欧美白嫩少妇大欣赏| 丝袜人妻中文字幕| 1024手机看黄色片| 免费一级毛片在线播放高清视频| 一区二区三区激情视频| 国产精品一区二区三区四区久久| 丝袜美腿诱惑在线| 一个人免费在线观看电影 | 一级毛片精品| 欧美日韩瑟瑟在线播放| 91字幕亚洲| 欧美日韩中文字幕国产精品一区二区三区| 亚洲男人天堂网一区| av在线天堂中文字幕| 女生性感内裤真人,穿戴方法视频| 啪啪无遮挡十八禁网站| 在线观看免费日韩欧美大片| 18禁美女被吸乳视频| 九色成人免费人妻av| 欧美一区二区国产精品久久精品 | 一级毛片高清免费大全| 国内精品一区二区在线观看| 日韩免费av在线播放| 最好的美女福利视频网| 一a级毛片在线观看| 99久久精品热视频| 亚洲成人国产一区在线观看| 国产精品av久久久久免费| 99精品久久久久人妻精品| 亚洲精品国产一区二区精华液| 国产亚洲精品av在线| 精品少妇一区二区三区视频日本电影| 夜夜看夜夜爽夜夜摸| 亚洲成人中文字幕在线播放| 啦啦啦免费观看视频1| 日韩欧美一区二区三区在线观看| 黄色视频,在线免费观看| 99久久无色码亚洲精品果冻| 国产成人一区二区三区免费视频网站| 欧美成人性av电影在线观看| 99国产精品一区二区蜜桃av| 免费看日本二区| 黄片大片在线免费观看| 精品久久久久久成人av| 99久久精品国产亚洲精品| 99久久综合精品五月天人人| 欧美极品一区二区三区四区| 国产精品电影一区二区三区| 亚洲精品一卡2卡三卡4卡5卡| 欧美极品一区二区三区四区| 日本一二三区视频观看| 欧美色欧美亚洲另类二区| 精品国产乱子伦一区二区三区| 国产麻豆成人av免费视频| 精品久久久久久久末码| 一卡2卡三卡四卡精品乱码亚洲| 777久久人妻少妇嫩草av网站| www.自偷自拍.com| 久久中文看片网| 久久精品国产亚洲av香蕉五月| 亚洲人成77777在线视频| 三级毛片av免费| 99在线视频只有这里精品首页| 19禁男女啪啪无遮挡网站| АⅤ资源中文在线天堂| 欧美性猛交╳xxx乱大交人| 亚洲18禁久久av| 国产高清视频在线观看网站| 午夜福利视频1000在线观看| 国产精品 欧美亚洲| 欧美日韩福利视频一区二区| 高潮久久久久久久久久久不卡| 三级毛片av免费| 国模一区二区三区四区视频 | 欧美乱色亚洲激情| av国产免费在线观看| 成人午夜高清在线视频| www.精华液| 亚洲国产日韩欧美精品在线观看 | 99国产精品99久久久久| 久久欧美精品欧美久久欧美| 嫩草影视91久久| 久久欧美精品欧美久久欧美| 午夜福利免费观看在线| 亚洲七黄色美女视频| 怎么达到女性高潮| 9191精品国产免费久久| 久久精品夜夜夜夜夜久久蜜豆 | 可以在线观看的亚洲视频| 亚洲男人的天堂狠狠| 国产精品电影一区二区三区| 亚洲国产精品合色在线| 色噜噜av男人的天堂激情| 久久性视频一级片| 搡老妇女老女人老熟妇| xxxwww97欧美| 国产单亲对白刺激| 老司机午夜福利在线观看视频| 老司机深夜福利视频在线观看| 亚洲中文字幕一区二区三区有码在线看 | 国内久久婷婷六月综合欲色啪| 久久精品国产综合久久久| 午夜福利欧美成人| 日日干狠狠操夜夜爽| 国产精品久久久久久人妻精品电影| 97人妻精品一区二区三区麻豆| 天天躁狠狠躁夜夜躁狠狠躁| 久久婷婷成人综合色麻豆| 久久精品亚洲精品国产色婷小说| 久久这里只有精品19| 一个人观看的视频www高清免费观看 | 一a级毛片在线观看| 亚洲精品在线美女| 久久久久久久久中文| 国产精品亚洲一级av第二区| 变态另类丝袜制服| 欧美黄色淫秽网站| 色综合婷婷激情| 一二三四在线观看免费中文在| 麻豆久久精品国产亚洲av| 亚洲人成77777在线视频| 国产精品日韩av在线免费观看| 黄色视频不卡| 舔av片在线| 久久中文字幕人妻熟女| 亚洲精品久久国产高清桃花| 男女之事视频高清在线观看| 欧美色欧美亚洲另类二区| 国产免费男女视频| 两个人免费观看高清视频| 亚洲精品久久国产高清桃花| 级片在线观看| 中文资源天堂在线| 日本黄大片高清| 国产精品久久久久久精品电影| 日本黄大片高清| 黄色视频,在线免费观看| 国产av一区在线观看免费| 日韩大尺度精品在线看网址| 亚洲国产精品合色在线| 亚洲午夜精品一区,二区,三区| 免费无遮挡裸体视频| 国产精品一区二区免费欧美| 国产欧美日韩一区二区精品| 欧美一级a爱片免费观看看 | 国产三级黄色录像| 国产区一区二久久| 亚洲欧美日韩东京热| 啦啦啦免费观看视频1| 老鸭窝网址在线观看| 亚洲人成网站高清观看| 在线观看舔阴道视频| 国产免费男女视频| 日韩成人在线观看一区二区三区| 亚洲精品久久成人aⅴ小说| 久久中文字幕人妻熟女| 色av中文字幕| 欧美精品亚洲一区二区| 成在线人永久免费视频| 母亲3免费完整高清在线观看| 色噜噜av男人的天堂激情| 长腿黑丝高跟| 麻豆国产av国片精品| 欧美在线一区亚洲| 中文在线观看免费www的网站 | 大型黄色视频在线免费观看| 黄色成人免费大全| 亚洲 国产 在线| 成人午夜高清在线视频| 老司机福利观看| 欧美中文日本在线观看视频| 国产成人欧美在线观看| 国产精品永久免费网站| 午夜视频精品福利| 亚洲专区中文字幕在线| 亚洲 国产 在线| 亚洲性夜色夜夜综合| 欧美另类亚洲清纯唯美| 欧美最黄视频在线播放免费| 91在线观看av| 亚洲av美国av| 亚洲精品久久成人aⅴ小说| 国内毛片毛片毛片毛片毛片| 久久热在线av| 在线播放国产精品三级| 人妻夜夜爽99麻豆av| 九色成人免费人妻av| bbb黄色大片| 精品久久久久久久人妻蜜臀av| 美女午夜性视频免费| 欧美日韩中文字幕国产精品一区二区三区| 熟女少妇亚洲综合色aaa.| 欧美久久黑人一区二区| 啦啦啦免费观看视频1| 日韩欧美精品v在线| 又黄又爽又免费观看的视频| 国产片内射在线| 亚洲一区二区三区色噜噜| 成在线人永久免费视频| 欧美成人性av电影在线观看| 亚洲成av人片免费观看| aaaaa片日本免费| 亚洲精品在线美女| 日韩欧美免费精品| 亚洲狠狠婷婷综合久久图片| 一本精品99久久精品77| 搞女人的毛片| 久久久久精品国产欧美久久久| svipshipincom国产片| 搡老岳熟女国产| 国产亚洲精品久久久久久毛片| 欧美日韩瑟瑟在线播放| 深夜精品福利| 在线观看美女被高潮喷水网站 | 99国产精品99久久久久| 搡老岳熟女国产| 三级毛片av免费| 亚洲一区二区三区不卡视频| 久久久水蜜桃国产精品网| 久久久精品国产亚洲av高清涩受| 亚洲中文日韩欧美视频| 天堂动漫精品| 日韩欧美在线二视频| 神马国产精品三级电影在线观看 | 欧美又色又爽又黄视频| 国产一区二区三区在线臀色熟女| 一级作爱视频免费观看| 天天一区二区日本电影三级| 久久久久久久久久黄片| 1024视频免费在线观看| 一卡2卡三卡四卡精品乱码亚洲| 一进一出抽搐gif免费好疼| 男女之事视频高清在线观看|