Detecting the Use of Anonymous Proxies

J McKegaue, K Curran

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)
443 Downloads (Pure)

Abstract

The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection is in progress from online fraud hotspots. IP addresses can be spoofed allowing hackers to bypass geographical IP restrictions and thus render some category of fraud prevention useless. Anonymous proxies (AP) which act as intermediate relays which disguise the source IP addresses can play a large role in cybercrime. There is a need to ascertain whether an incoming IP connection is an original source matched IP address, or one being routed through an anonymising proxy. This article concentrates on various methods used by anonymising proxies, the characteristics of the anonymous proxies and the potential mechanisms available to detect if a proxy is in use.
Original languageEnglish
Article number5
Pages (from-to)74-94
Number of pages21
JournalInternational Journal of Digital Crime and Forensics (IJDCF),
Volume10
Issue number2
Early online dateApr 2018
DOIs
Publication statusPublished online - Apr 2018

Keywords

  • network proxies
  • security

Fingerprint

Dive into the research topics of 'Detecting the Use of Anonymous Proxies'. Together they form a unique fingerprint.

Cite this