count hosts behind a NAT
======================================================== usage (from within the deNAT dir):
python -m Code.main.deNAT_main [options]
python -m Code.main.deNAT_main -h for usage and more options
pcap-filename - a capture file containing a single-side sniffing capture where all packets has the same source IP (NAT)
========================================================
stream - tcp session. identified by 5-tuple (IP,port,protocol)
main - project executed from here
pcap_to_stream - parse packets and group them by stream
TCPts_regression - tag stream with timestamp (if exist)
-flag
-linear regression:
-slope
-intercept
-statistical details (R,P,std_err)
==== This project is no longer developed, but if you have questions, feel free to contact me
Yair