Nothing Special   »   [go: up one dir, main page]

skip to main content
article

The dark side of the Web: an open proxy's view

Published: 01 January 2004 Publication History

Abstract

With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running services that interact with other resources on the Web. While such interaction can easily attract clients and traffic, our experience suggests that projects accepting outside input and interacting with outside resources must carefully consider the avenues for abuse of such services. The CoDeeN Content Distribution Network, deployed on PlanetLab, uses a network of caching Web proxy servers to intelligently distribute and cache requests from a potentially large client population. Due to CoDeeN's non-commerical nature, content is not pushed/advertised by content providers, but instead is pulled by clients who have configured their browsers to use CoDeeN.In effect, CoDeeN is one of the largest "open" proxy networks in the world, and therefore draws unwanted attention from malicious users. This paper discusses our experiences with undersirable traffic on CoDeeN, the mechanisms we developed to curtail it, and the future directions for such work. We believe that this work provides a safe alternative to open proxies and will encourage others to deploy similar systems. Some of the security mechanisms we are developing are suitable for ISPs to deploy on their own networks to detect misbehaving customers before problems arise. Finally, other research projects that allow "open" access to Web resources may face similar situations, and may be able to adopt similar mechanisms.

References

[1]
Akamai. Content Delivery Network. http://www.akamai.com.
[2]
BOPM. Blitzed Open Proxy Monitor. http://www.blitzed.org/bopm/.
[3]
A. Chankhunthod, P. B. Danzig, C. Neerdaels, M. F. Schwartz, and K. J. Worrell. A hierarchical internet object cache. In USENIX Annual Technical Conference, pages 153--164, 1996.
[4]
JANET Web Cache Service. http://wwwcache.ja.net.
[5]
D. Karger, A. Sherman, A. Berkheimer, B. Bogstad, R. Dhanidina, K. Iwamoto, B. Kim, L. Matkins, and Y. Yerushalmi. Web caching with consistent hashing. In Proceedings of the Eighth International World-Wide Web Conference, 1999.
[6]
Mirror Image. http://www.mirror-image.com.
[7]
National Laboratory for Applied Network Research (NLANR). Ircache project. http://www.ircache.net/.
[8]
M. Rabinovich, J. Chase, and S. Gadde. Not all hits are created equal: cooperative proxy caching over a wide-area network. Computer Networks and ISDN Systems, 30(22--23):2253--2259, 1998.
[9]
Speedera. http://www.speedera.com.
[10]
P. N. Tan and V. Kumar. Discovery of web robot sessions based on their navigational patterns. In Special Issue of the International Journal of Data Mining and Knowledge Discovery on Web Mining for E-commerce, 2001.
[11]
R. Tewari, M. Dahlin, H. M. Vin, and J. S. Kay. Design considerations for distributed caching on the internet. In International Conference on Distributed Computing Systems, pages 273--284, 1999.
[12]
L. Wang, V. Pai, and L. Peterson. The Effectiveness of Request Redirection on CDN Robustness. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation, Boston, MA, December 2002.
[13]
A. Wolman, G. M. Voelker, N. Sharma, N. Cardwell, A. R. Karlin, and H. M. Levy. On the scale and performance of cooperative web proxy caching. In Symposium on Operating Systems Principles, pages 16--31, 1999.

Cited By

View all
  1. The dark side of the Web: an open proxy's view

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 34, Issue 1
    January 2004
    140 pages
    ISSN:0146-4833
    DOI:10.1145/972374
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 January 2004
    Published in SIGCOMM-CCR Volume 34, Issue 1

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 18 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Analysis and prediction of web proxies misbehaviorProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544412(1-11)Online publication date: 23-Aug-2022
    • (2022)Shining a light on dark placesComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2022.108893208:COnline publication date: 8-May-2022
    • (2020)Everybody Loves RoundaboutsPaths10.1007/978-3-030-47545-1_2(5-10)Online publication date: 19-Aug-2020
    • (2018)An Extensive Evaluation of the Internet's Open ProxiesProceedings of the 34th Annual Computer Security Applications Conference10.1145/3274694.3274711(252-265)Online publication date: 3-Dec-2018
    • (2014)PEERINGProceedings of the 13th ACM Workshop on Hot Topics in Networks10.1145/2670518.2673887(1-7)Online publication date: 27-Oct-2014
    • (2013)Open Proxy: A road block for Phishing investigationsi-manager's Journal on Information Technology10.26634/jit.2.1.21422:1(22-33)Online publication date: 15-Feb-2013
    • (2013)Executives and smartphones: an ambiguous relationshipManagement Research Review10.1108/MRR-09-2012-020436:11(1167-1182)Online publication date: 28-Oct-2013
    • (2013)Digital Right and the Ethics of Digitisation: A Case Study in Technology and Implicit ContractsHumanities in the Twenty-First Century10.1057/9781137361356_12(216-236)Online publication date: 2013
    • (2012)P2P Techniques for Decentralized ApplicationsSynthesis Lectures on Data Management10.2200/S00414ED1V01Y201204DTM0254:3(1-104)Online publication date: 15-Apr-2012
    • (2012)ReviewComputer Communications10.1016/j.comcom.2011.10.00535:1(1-32)Online publication date: 1-Jan-2012
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media