Академический Документы
Профессиональный Документы
Культура Документы
net/publication/304158964
CITATIONS READS
2 1,952
5 authors, including:
Robert Bird
Coventry University
14 PUBLICATIONS 20 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Internet of Things: Analyzing the Impact on Businesses and Customers View project
Volatile Memory Recovery and analysis; Evidential logging: professionalising digital forensic evidential recovery; gender differences in student cohorts in digital forensics
View project
All content following this page was uploaded by Mandeep Pannu on 15 February 2018.
Abstract—Under most circumstances, cyber criminals will This paper identifies different proxy connectivity methods,
commit fraudulent transactions using proxy services which hide in order to develop a multi-tiered proxy detection module, and
their real IP address and physical location. This is done in an evaluate the implementation of the module in terms of cost and
effort to avoid being tracked and prosecuted by law enforcement effectiveness. Tests are completed using different types of
agencies. This paper presents the investigation of a proxy
devices and platforms, such as desktops, laptops (Windows),
detection methodology and efforts to implement such technology
into a business solution with the sole purpose of eliminating the and mobile devices (Android). We also test the module using
majority of fraudulent transaction attempts. The approach, computers connected through home networks, work networks,
described in identifies multiple proxy connectivity methods, and and mobile networks. The results of the experiments indicate
implements a multi-tiered detection technique. The result of the that the proxy detection module improves business security by
experiments demonstrates that the proxy methodology improves successfully identifying proxy users.
business security by identifying users who are utilizing proxies
and to collect data that prevents potentially fraudulent activities. II. BACKGROUND