Securing the internet through the detection of anonymous proxy usage

Businesses and educational facilities employ network filtering to control what internet sites their users access. This is done to help protect network assets, to protect data from being stolen and to comply with company policies on internet usage. Anonymous proxies can be used to bypass most filtering systems put in place and this can remove the protection that the filtering systems provide. Unless the web proxy being used is being hosted by the end user or someone they know, then the identity of whoever is hosting the proxy is unknown and they are potentially untrustworthy. The proxy website could have been set up to eavesdrop on the data flow between the end user's machine and the internet. Sites like this would normally log information for later inspection and data sent from a business user's machine could contain confidential information about the company or the user. This research aims to identify the characteristics or signatures whenever a user is using a web proxy by developing a Detection System that records packets and analyses them looking for identifying patterns of web proxies. One of the main focuses of the research will be detecting the usage of proxy websites that use SSL encryption.

[1]  S. O. Khanna,et al.  Overview of Emerging Trends in Network Security and Cryptography , 2014 .

[2]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[3]  Bjoern M. Luettmann,et al.  Man-in-the-middle attacks on auto-updating software , 2007 .

[4]  Dawn Xiaodong Song,et al.  Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.

[5]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[6]  Alan O. Freier,et al.  Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .

[7]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[8]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[9]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[10]  Robin Sommer,et al.  Here's my cert, so trust me, maybe?: understanding TLS errors on the web , 2013, WWW.

[11]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[12]  T. Chomsiri Sniffing Packets on LAN without ARP Spoofing , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[13]  Matt Bishop,et al.  What Is Computer Security? , 2003, IEEE Secur. Priv..