Detecting the Use of Anonymous Proxies

TheInternetisbuiltatoptheInternetProtocol(IP)whichhasatitsheartauniqueidentifierknown asanIPaddress.KnowingthelocationofanIPaddresscanbeveryusefulinmanysituationssuch asforbankstoknowifaconnectionisinprogressfromonlinefraudhotspots.IPaddressescanbe spoofedallowinghackerstobypassgeographicalIPrestrictionsandthusrendersomecategoryof fraudpreventionuseless.Anonymousproxies(AP)whichactasintermediaterelayswhichdisguise thesourceIPaddressescanplayalargeroleincybercrime.Thereisaneedtoascertainwhetheran incomingIPconnectionisanoriginalsourcematchedIPaddress,oronebeingroutedthroughan anonymisingproxy.Thisarticleconcentratesonvariousmethodsusedbyanonymisingproxies,the characteristicsoftheanonymousproxiesandthepotentialmechanismsavailabletodetectifaproxy isinuse. KeywoRDS Anonymous Proxies, Network Security, Security, Traffic Classification

[1]  Dongting Yu,et al.  Humboldt: A distributed phishing disruption system , 2009, 2009 eCrime Researchers Summit.

[2]  Ross Anderson,et al.  Tools and Technology of Internet Filtering , 2008 .

[3]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[4]  Mohammad A. AlAhmad,et al.  Protection of the Texts Using Base64 and MD5 , 2012 .

[5]  Mohamed Ali Kâafar,et al.  Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network , 2010, 2010 Fourth International Conference on Network and System Security.