Skip to main content
Top
Published in: Wireless Personal Communications 4/2014

01-04-2014

Detecting Anonymising Proxy Usage on the Internet

Authors: Ronan O’Flaherty, Kevin Curran

Published in: Wireless Personal Communications | Issue 4/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Anonymising proxies are a growing problem for organisations as more people become aware of their capabilities. These proxy sites enable users to bypass the network’s filtering system leaving the network open to banned content and harmful threats. Network administrators do try to block these online proxy sites, but with a growing number of new sites created, this task is not a trivial one. Many existing solutions rely almost entirely on Access Control Lists, which blacklist undesirable websites; the end result being that many users learn that anonymous proxies allow them to easily bypass this filtering. While Access Control Lists serve a purpose, there are lots of difficulties especially in detecting if users are circumventing the policies and Access Control Lists. One possible solution is to focus on detecting access to anonymous proxies. This paper outlines procedures required to discover anonymous proxies on the Internet.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gong, X., Kiyavash, N., & Borisov, N. (2010). Fingerprinting websites using remote traffic analysis. In Proceedings of the 17th ACM conference on computer and communications (vol. 1(1), p. 684). Gong, X., Kiyavash, N., & Borisov, N. (2010). Fingerprinting websites using remote traffic analysis. In Proceedings of the 17th ACM conference on computer and communications (vol. 1(1), p. 684).
2.
go back to reference Thomas, K., Grier, C., Ma, J., Paxson, V., & Song, D. (2011). Monarch: Providing real-time URL spam filtering as a service. In Proceedings of the IEEE symposium on security and privacy, Oakland, CA, USA. Thomas, K., Grier, C., Ma, J., Paxson, V., & Song, D. (2011). Monarch: Providing real-time URL spam filtering as a service. In Proceedings of the IEEE symposium on security and privacy, Oakland, CA, USA.
3.
go back to reference Hamade, S. (2008). Internet filtering and censorship. In 5th International conference on information technology: New generations (vol. 1(1), p. 1081). Hamade, S. (2008). Internet filtering and censorship. In 5th International conference on information technology: New generations (vol. 1(1), p. 1081).
4.
go back to reference Murdoch, S., & Anderson, R. (2008). Tools and technology of Internet filtering. Access Denied: The Practice and Policy of Global Internet Filtering, 1(1), 58. Murdoch, S., & Anderson, R. (2008). Tools and technology of Internet filtering. Access Denied: The Practice and Policy of Global Internet Filtering, 1(1), 58.
5.
go back to reference Caloyannides, M., Memon, N., & Venema, W. (2009). Digital forensics. IEEE Security & Privacy, 7(2), 16–17.CrossRef Caloyannides, M., Memon, N., & Venema, W. (2009). Digital forensics. IEEE Security & Privacy, 7(2), 16–17.CrossRef
6.
go back to reference Sandhu, R., & Samarati, P. (1994). Access control: Principles and practice. IEEE Communications Magazine, 1(1), 40.CrossRef Sandhu, R., & Samarati, P. (1994). Access control: Principles and practice. IEEE Communications Magazine, 1(1), 40.CrossRef
7.
go back to reference Lee, K., Jiang, Z., Kim, S., Kim, S., & Kim, S. (2005). Access control list mediation system for large-scale network. In 6th International conference on parallel and distributed computing (vol. 1(1), p. 483). Lee, K., Jiang, Z., Kim, S., Kim, S., & Kim, S. (2005). Access control list mediation system for large-scale network. In 6th International conference on parallel and distributed computing (vol. 1(1), p. 483).
8.
go back to reference Knickerbocker, P., Yu, D., & Li, J. (2009). Humboldt: A distributed phishing disruption system. In Proceedings of the IEEE eCrime researchers summit (pp. 1–12), Tacoma, USA. Knickerbocker, P., Yu, D., & Li, J. (2009). Humboldt: A distributed phishing disruption system. In Proceedings of the IEEE eCrime researchers summit (pp. 1–12), Tacoma, USA.
9.
go back to reference Raynal, F., Ahmad, M., Shaikhli, I., & Ahmad, H. (2012). Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research, 2(1), 22. Raynal, F., Ahmad, M., Shaikhli, I., & Ahmad, H. (2012). Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research, 2(1), 22.
10.
go back to reference Reed, M., Syverson, P., & Goldschlag, D. (1998). Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4), 482–494.CrossRef Reed, M., Syverson, P., & Goldschlag, D. (1998). Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4), 482–494.CrossRef
11.
go back to reference Rennhard, M., Rafaeli, S., Mathy, L., Plattner, B., & Hutchison, D. (June 2002) Analysis of an anonymity network for Web browsing. In IEEE 7th international workshop on enterprise security (WET ICE 2002), Pittsburgh, USA. Rennhard, M., Rafaeli, S., Mathy, L., Plattner, B., & Hutchison, D. (June 2002) Analysis of an anonymity network for Web browsing. In IEEE 7th international workshop on enterprise security (WET ICE 2002), Pittsburgh, USA.
12.
go back to reference Chaabane, A., Pere Manils, P., & Kaafar, M. (2010). Digging into anonymous traffic: A deep analysis of the Tor anonymizing network. In 4th International conference on network and system security (vol. 1(1), p. 167). Chaabane, A., Pere Manils, P., & Kaafar, M. (2010). Digging into anonymous traffic: A deep analysis of the Tor anonymizing network. In 4th International conference on network and system security (vol. 1(1), p. 167).
13.
go back to reference Reed, M., Syverson, P., & Goldschlag, D. (1996) Proxies for anonymous routing. In 12th Annual computer security applications conference (vol. 1(1), pp. 95–102). Reed, M., Syverson, P., & Goldschlag, D. (1996) Proxies for anonymous routing. In 12th Annual computer security applications conference (vol. 1(1), pp. 95–102).
18.
go back to reference Han, F., Chen, Z., Xu, H., & Liang, Y. (2012). A collaborative botnets suppression system based on overlay network. International Journal of Security and Networks, 7(4), 24–32. Han, F., Chen, Z., Xu, H., & Liang, Y. (2012). A collaborative botnets suppression system based on overlay network. International Journal of Security and Networks, 7(4), 24–32.
22.
go back to reference Rossi, D., Mellia, M., & Meo, M. (2009). Understanding skype signalling. The International Journal of Computer and Telecommunications Networking, 53(2), 130–140.MATH Rossi, D., Mellia, M., & Meo, M. (2009). Understanding skype signalling. The International Journal of Computer and Telecommunications Networking, 53(2), 130–140.MATH
Metadata
Title
Detecting Anonymising Proxy Usage on the Internet
Authors
Ronan O’Flaherty
Kevin Curran
Publication date
01-04-2014
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2014
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1451-y

Other articles of this Issue 4/2014

Wireless Personal Communications 4/2014 Go to the issue