Вы находитесь на странице: 1из 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/304158964

Exploring Proxy Detection Methodology

Conference Paper · June 2016


DOI: 10.1109/ICCCF.2016.7740438

CITATIONS READS
2 1,952

5 authors, including:

Mandeep Pannu Bob Gill


Kwantlen Polytechnic University British Columbia Institute of Technology
18 PUBLICATIONS   84 CITATIONS    12 PUBLICATIONS   342 CITATIONS   

SEE PROFILE SEE PROFILE

Robert Bird
Coventry University
14 PUBLICATIONS   20 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Internet of Things: Analyzing the Impact on Businesses and Customers View project

Volatile Memory Recovery and analysis; Evidential logging: professionalising digital forensic evidential recovery; gender differences in student cohorts in digital forensics
View project

All content following this page was uploaded by Mandeep Pannu on 15 February 2018.

The user has requested enhancement of the downloaded file.


Exploring Proxy Detection Methodology
Mandeep Pannu Bob Gill Robert Bird Kai Yang Ben Farrel
Department of Computer Department of Electrical Faculty of Engineering and Department of Computer Department of Computer
Science and Information and Computer Engineering Computing Science and Information Science and Information
Technology BCIT Coventry University Technology Technology
KPU Burnaby, Canada Coventry, UK KPU KPU
Surrey, Canada Bob_Gill@bcit.ca robert.bird@coventry.ac.uk Surrey, Canada Surrey, Canada
mandeep.pannu@kpu.ca kaixin.yang@kwantlen.net Ben.farrel@kpu.ca

Abstract—Under most circumstances, cyber criminals will This paper identifies different proxy connectivity methods,
commit fraudulent transactions using proxy services which hide in order to develop a multi-tiered proxy detection module, and
their real IP address and physical location. This is done in an evaluate the implementation of the module in terms of cost and
effort to avoid being tracked and prosecuted by law enforcement effectiveness. Tests are completed using different types of
agencies. This paper presents the investigation of a proxy
devices and platforms, such as desktops, laptops (Windows),
detection methodology and efforts to implement such technology
into a business solution with the sole purpose of eliminating the and mobile devices (Android). We also test the module using
majority of fraudulent transaction attempts. The approach, computers connected through home networks, work networks,
described in identifies multiple proxy connectivity methods, and and mobile networks. The results of the experiments indicate
implements a multi-tiered detection technique. The result of the that the proxy detection module improves business security by
experiments demonstrates that the proxy methodology improves successfully identifying proxy users.
business security by identifying users who are utilizing proxies
and to collect data that prevents potentially fraudulent activities. II. BACKGROUND

Keywords—fraud prevention; proxy detection; security


In the literature about information technology, the term
“proxy” is also referred to as a “Stepping Stone” [1]. A proxy
is software that resides on a server or node, and has the
I. INTRODUCTION purpose of mediating access between the client’s machine and
The detection and protection against fraud have become of the destination server. When an application generates a request
utmost importance in modern society. With the rise of online for a particular resource, the request is relayed via the
financial and e-commerce services, a new class of criminal has demarcated proxy server. Once the proxy server receives the
surfaced. When we use any Internet-related application or request, it analyzes the said request in order to determine the
service, we become potential targets for cyber criminals. desired resource accompanied by its designated server or
Cyber criminals utilize techniques such as social engineering, machine, as well as any additional information that it needs to
phishing, and scamming to exploit system vulnerabilities for relay, after which it connects and forwards the request to the
personal gain. They could act on our behalf to take our target server and waits for a response. Upon receipt, it
valuable assets, or use our privileges or rights without our forwards the reply back to its end client [2].
knowledge. Concealing a person’s true identity and location on Fig. 1. Example of a Typical Proxy
the Internet can be done by the usage of proxy or anonymity
services. Cyber criminals commit fraudulent transactions by
using proxy services to hide their real internet protocol (IP)
address and physical location, in order to avoid being tracked
and prosecuted by law enforcement agencies. Thus, having the
ability to detect proxy connections and prevent fraudulent
transactions becomes paramount.
We are proposing to devise and present a proxy detection
methodology to protect businesses, as well as their end users,
A. Proxy Types
against electronic commerce (e-commerce) fraud. Knowledge
gained from currently available detection methods, underlying According to David Gourley and Brian Totty [3], proxy
technology, and methods of experimentation were all servers can be classified based on their functionality.
thoroughly considered and utilized. This proposed proxy 1) Child filter: Proxies can be utilized in order to block
detection methodology checks for cyber criminals who access certain types of content such as adult material.
the website and/or web application for the possibility of proxy
2) Document access controller: Access to certain
usage and perform necessary action before cyber criminals
carry out fraudulent activities. resources can be restricted and/or granted to certain users
based on authentication and authorization mechanisms.
3) Security firewall: Proxies are an effective technique of control protocol (TCP) based traffic and can also resolve
improving an enterprise’s security when deployed at the entry domain name system (DNS) addresses if the SOCKS4a
point of a given network segment, for the reason that they can extension is utilized. SOCKS5 is the extension of SOCKS4
be configured to filter certain types of application-layer protocol, and besides all functionality delivered by the
protocols. previous version, it provides support for the user datagram
4) Web cache: Due to their caching ability, proxies can protocol (UDP), IPv6, and additional client-based
store frequently accessed content and when a request is authentication.
received, instead of the given resource being retrieved from Additionally, there are proxies that implement virtual
the server and sent to the end client, it is served directly to the private network (VPN) techniques by creating a point-to-point
or site-to-site connection that is secure with different type of
end client from the local cache, thereby reducing congestion
protocol. Below are some examples.
and bandwidth consumption.
5) Surrogate: This type of proxy is also termed as 1) Layer 2 tunneling protocol (L2TP): A standard protocol
“reverse-proxy” or “server-accelerator”. It is generally utilized for tunneling L2 traffic over an IP network [5]. Its ability to
in order to reduce server-load caused by the generation of carry almost any L2 data format over IP or other L3 networks
dynamic content. Henceforth, similar to the “web cache” type, makes it particularly useful.
it caches the content generated for a particular request, and if 2) OpenVPN: An open-source software application that
any client initiates the same request, it returns the content implements VPN techniques for creating secure point-to-point
without re-soliciting the end server. or site-to-site connections in routed or bridged configurations
6) Content router: Based on the content-type and network and remote access facilities [6]. It uses a custom security
conditions such as traffic flow/congestion, proxies can be protocol that utilizes secure sockets layer (SSL) and transport
employed to request specific content from servers which deal layer security (TLS) for key exchange.
with the type of content requested and alleviate traffic from 3) Point-to-point tunneling protocol (PPTP): A method for
servers which are over-loaded. implementing virtual private networks [7]. PPTP uses a
control channel over TCP and a GRE tunnel operating to
Moreover, as reflected by Michael Ligh et al. [4], proxies
can also be categorized by the level of anonymity provided to encapsulate point-to-point protocol (PPP) packets.
the end user. 4) Secure socket tunneling protocol (SSTP): A form of
VPN tunnel that provides a mechanism to transport PPP or
1) Transparent: It does not conceal the source IP address L2TP traffic through an SSL 3.0 channel [8].
of the end user when requesting a particular resource. This is 5) Stealth: TorGuard has engineered special “stealth”
accomplished by adding a hypertext transfer protocol (HTTP) connections that are guaranteed to bypass deep packet
header to the request containing the IP address of the user’s inspection (DPI) firewalls and provide “invisible” VPN access
machine. anywhere in the world [9].
2) Anonymous: This type of proxy does conceal the end
user’s IP address, by omitting it from any request headers. On C. HTTP Headers
the other hand it still displays a header indicates that the end As aforementioned, transparent proxies do not conceal the
user is utilizing a proxy therefore this type of proxy is not very end user’s IP address due to the fact that they embed a
effective in providing complete anonymity. particular HTTP header in the request, which identifies the end
3) Highly anonymous: This provides the highest level of user’s machine IP address. The HTTP header analysis
anonymity due to the fact that it does not relay any information technique relies on detecting the HTTP headers and
that might potentially identify a user or the datum that the determining the end user’s IP address based on their typical
aforementioned is utilizing a proxy service. proxy header. This solution is quite common and has been
deployed to prevent IP spoofing even in specialized security
B. Proxy Protocols devices such as the CISCO IronPort Web Security Appliance
Proxies utilize a diversity of protocols to support end client [10]. The most frequently utilized headers that indicate the IP
to proxy-server communication. As emphasized by the author address of a proxy’s end client are:
Blake Adair [4], the most common protocols encompass: 1. VIA: As defined by RFC 2616 [11], this is a general-
purpose header which informs the destination server of the
1) HTTP: It is not explicitly designed for proxy
end-client’s IP address as well as the end-client of the origin
communications. Nevertheless, when utilized by proxy based
server’s IP address.
applications, it tolerates encrypted or unencrypted HTTP-
2. X-FORWARDED-FOR: Standardized in 2014 and as
based communications and also has the ability of allowing
defined by RFC 7239 [12]. This HTTP header field is a
non-HTTP traffic to pass-through the proxy-server when the
common method for identifying the originating IP address of a
CONNECT functionality is employed.
client connecting to a web server through a load balancer or
2) Socket secure (SOCKS): There are currently 3 major
HTTP proxy. The originating IP address can be obfuscated at
SOCKS protocol version. SOCKS4 is especially designed for
proxy-based applications. It will allow any transmission
the server connect stage, and as such, this method is only not every user is willing to go online with their original
reliable for trusted servers. IP address that can reveal their true identity and location.
The HTTP header analysis technique is effective as long as
III. METHODOLOGY
the type of proxy is transparent, and the proxy service adds the
specific headers. However, if the proxy service omits the In order to analyze the incoming connections, we aim to
headers, or sends a header with a client IP address that does build a detection methodology that functions similarly to the
not match the actual client address, this detection method will proxy detection demonstrated on WhatIsMyIPAddress [14].
fail. This website uses a collection of six tests to determine if a user
is behind a proxy or not. One of these tests is performed using
D. RBL Databases a vast collection of internal testing data that has been
According to the author, John Brozycki, a real-time formatted into an identification database. As this approach is
blacklist (RBL) identification check can be employed to detect out of the scope for this project, we will focus on the
whether a person is using a proxy or not [13]. RBLs were identification methods that can be completed without the need
created in order to detect and prevent, in real-time, spamming of database storage and access. The remaining five tests utilize
activities such as the sending of unsolicited emails. Large packet header analysis, various scripting techniques, and
volumes of email spam are often sent through proxy and VPN routing analysis. We will analyze these tests, along with other
anonymity services, which end up getting blacklisted. known methods, to accomplish our goal.
However, RBLs are not limited to spam detection only, as they
can also provide listings of hosts compromised via illegal third A. Research Method
party exploits, worms, Trojans or any other form of malware. The primary ideology of this paper is hoping to introduce
The providers of such services are: Spam and Open Relay the readers into the world of e-commerce fraud and its related
Blocking System (SORBS), Spamhaus Project, Abuse Hosts proxy-based operations. Hence, various references were
Blocking List (ATLBL), and many more. chosen to deliver an adequate amount of knowledge to help
The principle of determining if an IP address has been readers to better understand the relevance of fraud prevention
listed in a specific RBL, as described in Brozycki’s paper, is via proxy detection. Since our target audiences are mostly
that the RBL needs to be queried, and if the reply contains a small to medium sized enterprises, their needs and capabilities
valid DNS record, this implies that the aforementioned IP are also taken into consideration. In order to provide complete
address has been listed in the RBL’s database, therefore might anonymity to our test subjects, we have sanitized all the IP
represent a proxy. If the reply did not return a DNS record, addresses and personal information before publication.
then it has not been listed in the particular RBL, and it might
B. Data Gathering Method
not be a proxy.
For the purpose of data gathering, we have purchased a
E. Limitations of Current Proxy Detection Techniques proxy service license through TorGuard [9]. The services
To the best of our knowledge, all proxy detection provided by TorGuard allow us to test five different proxy
techniques have a plethora of advantages and disadvantages connectivity types from hundreds of servers across the globe.
[13]. Currently, there is no single method that is capable of We also utilized configurations that are available through free
identifying all of the possible configurations for proxy proxy lists, and alternative connectivity types such as mobile
connections. However, by using several detection schemes, we data connections and VPN tunnels. Once the proxy
are able to greatly increase the effective detection rate. Several configurations were completed, connection attempts were
disadvantages exist that are outside of the control of the made to our pre-configured server, which contains a packet
methodology tested in this report. logging application that documents each instance of
 These testing methods cannot prevent an end user from connection and identifies specific proxy connections. For the
performing modifications to their computer or network best result, we gathered test data from different browsers. For
traffic with the intention of bypassing a configured Windows devices, the following browsers were used: Firefox
detection method. 44, Chrome 47, Internet Explorer 11, and Opera 34. For
Android devices, the following browsers were used: Chrome
 Not all businesses will have the resources to manage
47 and the default browser with Flash player installed.
and maintain secure access to all of their systems. This
is especially the case when portions of the company are C. Design Detection and Prevention Method
outsourced.
To identify a large number of configurable proxy
 Any tests that are heavily dependent on RBL databases connection types, several steps can be used.
might be prone to higher amounts of false positive 1) Identify the public IP address of the target machine.
results. 2) Implement a Flash element that runs client-side and
 People are becoming highly protective of their data and quickly reports the true public IP.
privacy. Some users like to surf the internet in stealth so 3) If the target machine’s IP and the retrieved public IP
they can keep their browsing details private. Therefore, match, then this test will return a value representing that no
proxy was detected. However, if the IP addresses do not match, B. Method Development
we are able to confirm that a proxy is certainly in use. Given the accuracy of the aforementioned methods, we
Utilizing this test, we are able to positively identify any have opted to focus on developing a client-side Flash object
simple proxy that has been configured through a browser, or that runs from the target machine, and reports the local
users requesting access through a web-based proxy portal. connection IP for determining whether a proxy or VPN is in
Fig. 2. Detection Architecture use. This implementation method has the benefit of quickly
identifying any locally configured proxy connections, or web-
based proxy portals. The IP detection of our module is
accomplished by reporting the locally detected public IP, and
comparing it against the IP address that initiated the
connection to our test server. In order to ensure that the test
will carry out, it is designed to verify that the user attempting
to access the site is able to run the Flash object in their browser.
Additional tests can also be made to identify stealth The following steps were required to provision and install
connections such as universal VPN services, though only to a the aforementioned proxy detection module method:
certain degree. In order to target VPN services that our first 1) Set up a web server capable of running Perl and PHP.
test would not identify, we can implement further checks. 2) Adjust the parameters of the proxy detection module
1) Reverse DNS test: Attempt to confirm the IP of a target according to the environment variable of the server.
machine through an Internet Control Message Protocol (ICMP) 3) Copy the configured module over to the web server.
request, then using the resulting DNS name, verify that the 4) Create the necessary file and log that runs the module
connection path resolves to the same target machine and not to on the web server.
a local IP or a different system entirely. 5) Integrate the Adobe Flash in small web format (SWF)
2) TOR network discovery test: Identifying the majority of file format on the webpage as an embedded object, so it will
TOR (an anonymity network) users can be accomplished by initiate the analysis process locally and remotely. Once the
parsing the list of publicly available TOR exit nodes, then flash object runs on the client-side, it will return the local IP of
comparing the target machine's public IP against the list. the client to help identify whether a proxy had been used or
3) RBL database test: Compare the target machine's public not. Additional methodology checks can be implemented by
IP against RBL database. However, this test might not be as altering the PHP code segments to include a reverse DNS test,
reliable, due to possible false positive results. In addition, all TOR network discovery test, and RBL database test.
connection IP addresses are required to send to a third party In order to identify the effectiveness of our detection
service in order to use RBL databases, which can present a algorithm, we need to configure our test platform computers
with various known proxy configurations, and then connect to
potential security concern and higher service cost.
our target server for validation. A debug logging function was
IV. IMPLEMENTATION added to the module, so we can validate correct identification
of proxies and to further troubleshoot false positives if the
A. Proxy Connection Configuration situation requires it. Furthermore, a Wireshark packet capture
Proxy connections can be configured in a multitude of was set up on the client-side, to monitor the connection and
fashions. These include configuring a simple redirection record the TCP/IP packet information to avoid data collection
within a given browser that will send any web based traffic error and possible human error throughout the test.
through the provided proxy service. Alternatively, a proxy
C. Provisioning
connection can be configured as a new network device, and
bridged to the existing network adapter to send packets We provisioned Windows and Android since these
through a designated server. A client side application can be operating systems make up approximately 77.58% of Internet
used, such as TorGuard, to automate the creation and connected devices worldwide [16]. Due to the fact that iOS
connection type through a designated secure proxy service. does not support flash, the module will not work on iOS
Finally, there are websites, such as kproxy.com and hide.me, devices. The module is configured to run on a website hosted
that act as an anonymous proxy browser by creating a separate on a dedicated server with Intel E3-1230v2 processor using
frame that connects to the requested sites through a designated Apache, MySQL, PHP, and CentOS - one of the best
server location. Manually configuring a proxy connection community-based Linux server distributions available today
requires a fair amount of configuration information including [17]. Since the test devices are configured to specifically use
the IP or DNS address, the port being used, the security option proxy connections, additional tests are conducted on our
utilized for authentication, encryption type, valid user personal devices (desktop, laptop, and mobile) to better
credentials, and the knowledge needed to bridge a network represent real-life situations of normal proxy users.
adapter to the configured proxy connection.
V. EXPERIMENT RESULTS AND EVALUATION 1) Connection one is using a simple proxy configuration,
as the initial IP address differs from the one identified through
A. Proxy Operations Analysis
the proxy detection module. It also failed the reverse DNS test.
In the first part of this particular investigation, we have 2) Connection two passes the test as both the public and
determined that when proxy connections are created, specific detected IP are the same. There were no detections on the
characteristics that are unique to the proxy become identifiable remaining two tests.
during transmission of information, or during connection 3) Connection three is a partial match. It fails the reverse
attempts. The information needed to identify a proxy can DNS check, which can mean that they are using a
sometimes be as simple as reading the packet header
misconfigured stealth VPN service, but it can also indicate that
containing connection type details, or checking for a matching
they were connecting through a mobile data service, or have
forward and reverse DNS records, or comparing the client’s IP
disabled any ICMP requests on their firewall.
to a RBL database. Many methods exist to identify these traits
and we intend to devise a detection logic that utilizes these 4) Connection four indicates that a TOR network
tests with efficiency and accuracy. connection was detected.

B. Proxy Detection Test D. Result Evaluation


Proxy detection tests were performed in each development The proxy detection module performed its function with
phase. Each test signified advancement in our detection efficiency and effectiveness. The detection process time per
algorithm. During testing, it was determined that the easiest client is approximately one millisecond (1 ms) plus the latency
method of integration is via PHP. Further testing was between the client and the server. The detection rate for
performed in an attempt to utilize HTML5; however, we were SOCKS proxy connections is 100%. On the other hand, the
unable to create a non-PHP module that is capable of operating detection rate for HTTP proxy connections is 94%, due to
without requiring the user to install a plug-in or add-on some devices disabled flash and scripts. The module is
extension. Through the utilization of both paid proxy services relatively straightforward to integrate into existing systems. As
and manual configuration on several system platforms, we long as we are able to enforce the use of the Flash object on
were able to positively identify proxy users of any manually the browser, the detection of any locally configured proxy will
configured proxy options, or web based portals. As previously be positively identified.
described, VPN services were more difficult to identify in a Unfortunately we were unable to create a database-free
meaningful way. These VPN services can potentially be methodology of identifying users utilizing advanced VPN
detected using one of the following methods. services. Since VPN services bind to a locally created network
 Personal computer fingerprinting and analysis of data device, the proxy detection module will find both the public IP
stored in a database. and the discovered IP to be the same, which renders the proxy
detection module ineffective.
 A client-side invasive application that monitors all web 78 out of 80 of the VPN services that we tested through
traffic and ensures a secure connection to the target site TorGuard were positively identified with a reverse DNS test.
(this is used by a number of banks). However, the reverse DNS test is vulnerable to false positives.
 Advanced hardware technology that performs detailed In order to filter out the false positives, we would need to
packet inspection used in combination with tracking create a complex mechanism to analyze the client machines'
packets. details. A detailed fingerprint can be created from any
incoming connection containing information about the
C. Experiment Results computer and location [18]. The fingerprint is used to identify
Below are some of the proxy users logged by the proxy information about the target machine, such as local machine's
detection module, which demonstrates the result of our country codes, language options, and regional settings. This
experiment. information can then be compared against the public IP
address' country of origin.
TABLE 1. SELECTEDA EXPERIMENT RESULTS
VI. E-COMMERCE MODULE DESIGN AND
Time Connection Discovered Proxy RDNS Tor
Stamp IP IP Detected Failure Check IMPLEMENTATION
1/31/2016 10.190.147.23 10.190.22.1
Yes Yes No
7:11 4 76 As modern society becomes more and more dependent on
1/31/2016 10.107.147.23 10.107.147.
7:12 4 234
No No No electronic transactions, data has become the most valuable
1/31/2016
10.150.208.18
10.150.208.
No Yes No asset for any businesses. Due to the inherently insecure nature
15:41 18
1/31/2016 10.164.234.13 10.164.234.
of the Internet, businesses need to take into account that
No No Yes
22:34 8 138
A
vulnerable web-based applications can be exploited by cyber-
Out of 811 connection attempts from 50 devices.
criminals. Thus, it is crucial that businesses adopt e-commerce
fraud prevention methods to safeguard their data.
Based on table 1, below are the interpretations of the data.
A. Legal Implications possible. In this paper, we have investigated and tested
Several legal implications need to be considered when different detection techniques, used the knowledge attained to
designing the proxy detection module for e-commerce use. design a multi-tiered proxy detection module, and explained
1) Data protection: All processed data need to be secured how to implement the module in a business environment. With
the overall detection rate of 97% and low integration cost, our
by employing cryptographic technology, and stored in a secure
proxy detection module is an effective and efficient solution
environment where the information is not disclosed unless
for businesses to prevent fraudulent transactions from non-
legally permitted. All parts of the module should provide
VPN proxy connections.
boundary-checking and input validation. The module should
also be capable of preventing attacks such as SQL injection, B. Further Research
remote command execution, remote file inclusion, and This paper serves as an example and starting point for the
information disclosure. study of proxy detection, and stands as a reference point for
2) Customer privacy: An enterprise must adhere to the any interested researchers and organizations to explore this
laws of the country they operate in. If the enterprise is based in particular area. In the future, we would like the opportunity to
the United Kingdom, it must provide an adequate layer of improve the current detection technique. One of the features
obscurity and control for its customers' identities, and only we would like to develop in future is the ability to encompass
share such information with other parties in accordance with various data analysis techniques, which should improve the
the laws and regulations. existing proxy detection methods. Another feature to be
3) Trademark laws: Violating any existing patents or developed is seamless integration to any existing systems,
trademarks could do serious damage to an enterprise's where the module can be attached or removed from the system
financial status or image. Therefore, it is advised that without impacting the overall quality and functionality of
enterprises be aware of trademark laws. business operations.
4) Terms and conditions for the provided service: REFERENCES
Customers must acknowledge a specific set of terms and
[1] R.-M. Lin, Y.-C. Chou and K.-T. Chen, "Stepping Stone Detection at
conditions before using an enterprise' product or service. Due The Server Side," in 2011 IEEE Conference, Shangai, 2011, pp. 964-969.
to the fact that the module utilizes resources on the end user's [2] D. Stuttard and M. Pinto, "The Web Application Hacker's Handbook:
machine, it is important to obtain permission from the end user Finding and Exploiting Security Flaws," John Wiley & Sons, 2011, pp.
50.
to avoid potential legal action from the end user. [3] D. Gourley and B. Totty, "Http: The Definitive Guide," O'Reilly Media,
2002, pp. 131-137.
B. Module Integration [4] M. Ligh, S. Adair, B. Hartstein and M. Richard, "Malware Analyst's
All business operations that are conducted through existing Cookbook and DVD : Tools and Techniques for Fighting Malicious
Code," John Wiley & Sons, 2010, pp. 11-15.
solutions need to be modularized in such a way that the [5] V. Rawat, R. Tio, S. Nanji and R. Verma, "Layer Two Tunneling
ordering process is clearly visible and can be altered to include Protocol (L2TP) over Frame Relay," February 2001, pp. 1-3. [Online].
the proxy detection module. During the user authentication Available:
stage, the module will check the validity of user's login or https://www.researchgate.net/publication/277825842_Layer_Two_Tunne
ling_Protocol_L2TP_over_Frame_Relay.
transaction attempts, and relay the detection results to the web [6] Z. Hou, M. Xu, L. Zhu, L. Peng and B. Hu, "The Design and Realization
server to determine the access permission. If needed, further of the Test Scheme OpenVPN, Based on Message Simulation,"
analysis such as statistical analysis, data correlation, or November 2013. [Online]. Available:
intelligent agent approach can be performed since all detection https://www.researchgate.net/publication/266643218_The_Design_and_
Realization_of_the_Test_Scheme_OpenVPN_Based_on_Message_Simu
results are logged. Given its construction, the module can be lation.
easily integrated with the majority of the web platforms and [7] K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little and G. Zorn,
appended to a user authentication prompt. The cost to add the "Point-to-point tunneling protocol (PPTP)," December 1998. [Online].
Available: https://www.researchgate.net/publication/234818729_Point-
module to systems is low due to its simplicity. Once the to-point_tunneling_protocol_PPTP.
module is integrated with the website, the module can actively [8] G. Trinder, "How SSTP based VPN connection works," Microsoft,
monitor all transactions. The added security offered by the January 2007. [Online]. Available:
module benefits any website that stores confidential customer https://blogs.technet.microsoft.com/rrasblog/2007/01/10/how-sstp-based-
vpn-connection-works.
data. [9] TorGuard.net, "Anonymous VPN, Proxy & Anonymous Proxy
Services," 2016. [Online]. Available: https://torguard.net.
VII. CONCLUSION AND FURTHER RESEARCH [10] P. Ružicka, "Deployment of Cisco IronPort Web Security Appliance,"
Cisco Expo, 2009, pp. 27-31.
A. Conclusion [11] R. Fielding, J. Gett S, J. Mogul, H. F. Nielsen, L. Masinter, P. J. Leach
and T. Berners-lee, "RFC 2616: Hypertext Transfer Protocol -
Proxy connections have many types and protocols, and HTTP/1.1," December 1998, pp. 145-169. [Online]. Available:
with different software and technique configurations, it can be https://www.researchgate.net/publication/242418693_RFC_2616_Hypert
difficult to uncover a proxy connection. Although there are ext_Transfer_Protocol_-_HTTP11.
[12] A. Petersson and M. Nilsson, "Forwarded HTTP Extension," June 2014,
many existing methods to detect a proxy connection, all pp. 2-4. [Online]. Available: https://www.rfc-editor.org/rfc/rfc7239.txt.
methods have their limitations. It is our goal to create a
module that is capable of identifying as many proxy types as
[13] J. Brozycki, "Detecting and Preventing Anonymous Proxy Usage,"
September 2008. [Online]. Available: https://www.sans.org/reading-
room/whitepapers/detection/detecting-preventing-anonymous-proxy-
usage-32943.
[14] What Is My IP Address, "Advanced Proxy Check," [Online]. Available:
http://whatismyipaddress.com/proxy-check. [Accessed 15 12 2015].
[15] P. C. Kolin, "Successful Writing at Work," Cengage Learning, 2012, pp.
331-353.
[16] Stat Counter Global Stats, "Top 8 Operating Systems from Aug 2012 to
Mar 2015" [Online]. Available: http://gs.statcounter.com/#all-os-ww-
monthly-201208-201503-bar. [Accessed 16 December 2015].
[17] S. Bhartiya, "The Best Linux Distros of 2016," January 2016. [Online].
Available: https://www.linux.com/news/software/applications/878620-
the-best-linux-distros-of-2016.
[18] R. Broenink, "Using Browser Properties for Fingerprinting Purposes," in
16th Twente Student Conference on IT, Enschede, 2012.

View publication stats

Вам также может понравиться