Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses

The detection of unauthorised users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. The experiments conducted to classify OpenVPN usage found that the neural network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.

[1]  Dinil Mon Divakaran,et al.  A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes , 2021, ArXiv.

[2]  Xiaobo Ma,et al.  An Uncertainty-Based Traffic Training Approach to Efficiently Identifying Encrypted Proxies , 2020, 2020 12th International Conference on Advanced Infocomm Technology (ICAIT).

[3]  Eduardo B. Fernandez,et al.  TPM, a pattern for an architecture for trusted computing , 2020, EuroPLoP.

[4]  Javier López,et al.  A Security Pattern for Cloud service certification , 2019 .

[5]  Matt Bishop,et al.  What Is Computer Security? , 2003, IEEE Secur. Priv..

[6]  Kevin Curran,et al.  Detecting the Use of Anonymous Proxies , 2018, Int. J. Digit. Crime Forensics.

[7]  C. E. Akabogu IMPLICATIONS OF MASS MEDIA CENSORSHIP ON THE INDIVIDUAL AND THE NIGERIAN SOCIETY , 2017 .

[8]  E. Giuliani,et al.  Overcoming the liability of origin by doing no-harm: Emerging country firms’ social irresponsibility as they go global , 2017 .

[9]  Nick Sullivan,et al.  The Security Impact of HTTPS Interception , 2017, NDSS.

[10]  Martin Schmiedecker,et al.  NavigaTor: Finding Faster Paths to Anonymity , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[11]  Kevin Curran,et al.  Securing the internet through the detection of anonymous proxy usage , 2015, 2015 World Congress on Internet Security (WorldCIS).

[12]  Kevin Curran,et al.  Traffic Classification for the Detection of Anonymous Web Proxy Routing , 2015 .

[13]  James F. Kurose,et al.  Information-centric networking: The evolution from circuits to packets to content , 2014, Comput. Networks.

[14]  George Bebis,et al.  An overview of anonymity technology usage , 2013, Comput. Commun..

[15]  Dilbag Singh,et al.  An Explore View of Web Caching Techniques , 2011 .

[16]  Jussi Kangasharju,et al.  Content Routers: Fetching Data on Network Path , 2011, 2011 IEEE International Conference on Communications (ICC).

[17]  Michael Ligh,et al.  Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code , 2010 .

[18]  Bülent Yener,et al.  On anonymity in an electronic society: A survey of anonymous communication systems , 2009, CSUR.

[19]  Christopher Krügel,et al.  SWAP: Mitigating XSS attacks using a reverse proxy , 2009, 2009 ICSE Workshop on Software Engineering for Secure Systems.

[20]  Hala ElAarag,et al.  Web proxy cache replacement scheme based on back-propagation neural network , 2008, J. Syst. Softw..

[21]  Daniel Serrano,et al.  Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence , 2007, UIC.

[22]  Antonio Maña,et al.  A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios , 2006, UIC.

[23]  Ming-Syan Chen,et al.  On Exploring Aggregate Effect for Efficient Cache Replacement in Transcoding Proxies , 2003, IEEE Trans. Parallel Distributed Syst..

[24]  Philip S. Yu,et al.  Collaborative proxy system for distributed Web content transcoding , 2000, CIKM '00.

[25]  Ari Luotonen,et al.  World-Wide Web Proxies , 1994, Comput. Networks ISDN Syst..

[26]  Shou-Hsuan Stephen Huang,et al.  Detecting Malicious Users Behind Circuit-Based Anonymity Networks , 2020, IEEE Access.

[27]  S. O. Khanna,et al.  Overview of Emerging Trends in Network Security and Cryptography , 2014 .

[28]  Antonio Maña,et al.  Dynamic Security Properties Monitoring Architecture for Cloud Computing , 2013 .

[29]  Antonio Maña,et al.  TPM-based protection for mobile agents , 2011, Secur. Commun. Networks.

[30]  Carsten Rudolph,et al.  Verification of S&D Solutions for Network Communications and Devices , 2009, Security and Dependability for Ambient Intelligence.

[31]  Antonio Maña,et al.  Representation of Security and Dependability Solutions , 2009, Security and Dependability for Ambient Intelligence.

[32]  Luca Compagna,et al.  XACML as a Security and Dependability Pattern for Access Control in AmI environments , 2008 .

[33]  S. Darwish,et al.  An Approach for Improving Performance of a Packet Filtering Firewall Based on Fuzzy Petri Net 67 , 2022 .