TheInternetisbuiltatoptheInternetProtocol(IP)whichhasatitsheartauniqueidentifierknown asanIPaddress.KnowingthelocationofanIPaddresscanbeveryusefulinmanysituationssuch asforbankstoknowifaconnectionisinprogressfromonlinefraudhotspots.IPaddressescanbe spoofedallowinghackerstobypassgeographicalIPrestrictionsandthusrendersomecategoryof fraudpreventionuseless.Anonymousproxies(AP)whichactasintermediaterelayswhichdisguise thesourceIPaddressescanplayalargeroleincybercrime.Thereisaneedtoascertainwhetheran incomingIPconnectionisanoriginalsourcematchedIPaddress,oronebeingroutedthroughan anonymisingproxy.Thisarticleconcentratesonvariousmethodsusedbyanonymisingproxies,the characteristicsoftheanonymousproxiesandthepotentialmechanismsavailabletodetectifaproxy isinuse. KeywoRDS Anonymous Proxies, Network Security, Security, Traffic Classification
[1]
Dongting Yu,et al.
Humboldt: A distributed phishing disruption system
,
2009,
2009 eCrime Researchers Summit.
[2]
Ross Anderson,et al.
Tools and Technology of Internet Filtering
,
2008
.
[3]
Paul F. Syverson,et al.
Anonymous connections and onion routing
,
1998,
IEEE J. Sel. Areas Commun..
[4]
Mohammad A. AlAhmad,et al.
Protection of the Texts Using Base64 and MD5
,
2012
.
[5]
Mohamed Ali Kâafar,et al.
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network
,
2010,
2010 Fourth International Conference on Network and System Security.