Detecting the Use of Anonymous Proxies

Detecting the Use of Anonymous Proxies

Jonathan McKeague (Ulster University, Londonderry, United Kingdom) and Kevin Curran (Faculty of Computing and Engineering, Ulster University, Londonderry, United Kingdom)
Copyright: © 2018 |Pages: 21
DOI: 10.4018/IJDCF.2018040105

Abstract

The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection is in progress from online fraud hotspots. IP addresses can be spoofed allowing hackers to bypass geographical IP restrictions and thus render some category of fraud prevention useless. Anonymous proxies (AP) which act as intermediate relays which disguise the source IP addresses can play a large role in cybercrime. There is a need to ascertain whether an incoming IP connection is an original source matched IP address, or one being routed through an anonymising proxy. This article concentrates on various methods used by anonymising proxies, the characteristics of the anonymous proxies and the potential mechanisms available to detect if a proxy is in use.
Article Preview
Top

2. Anonymous Proxies

This literature review will be split up into two different sections. The first section will discuss the different ways people can access networks and systems using anonymous proxies. The second section will discuss the different ways of stopping or blocking the anonymous proxies and the different tools used to aid this. Some of the main proxies or ways to access the Internet anonymously are PHPProxy, CGIProxy, Glype, Onion Routing/Tor and SSL Proxy.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 12: 4 Issues (2020): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing