Pannu et al., 2016 - Google Patents
Exploring proxy detection methodologyPannu et al., 2016
View PDF- Document ID
- 12750611842888188826
- Author
- Pannu M
- Gill B
- Bird R
- Yang K
- Farrel B
- Publication year
- Publication venue
- 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)
External Links
Snippet
Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the …
- 238000001514 detection method 0 title abstract description 55
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khan et al. | An empirical analysis of the commercial vpn ecosystem | |
US11336677B2 (en) | Online portal for improving cybersecurity risk scores | |
US10298610B2 (en) | Efficient and secure user credential store for credentials enforcement using a firewall | |
US20210234837A1 (en) | System and method to detect and prevent Phishing attacks | |
US10425387B2 (en) | Credentials enforcement using a firewall | |
Amara et al. | Cloud computing security threats and attacks with their mitigation techniques | |
US10212134B2 (en) | Centralized management and enforcement of online privacy policies | |
US20190354709A1 (en) | Enforcement of same origin policy for sensitive data | |
US10826872B2 (en) | Security policy for browser extensions | |
US9838356B2 (en) | Encrypted peer-to-peer detection | |
US10601870B2 (en) | Distributed cloud-based security systems and methods | |
US20090228780A1 (en) | Identification of and Countermeasures Against Forged Websites | |
US8713674B1 (en) | Systems and methods for excluding undesirable network transactions | |
US8763120B1 (en) | Exploitation detection | |
US20230336524A1 (en) | In-line detection of algorithmically generated domains | |
US12003537B2 (en) | Mitigating phishing attempts | |
US20100020967A1 (en) | Http authentication and authorization management | |
US8656462B2 (en) | HTTP authentication and authorization management | |
US8806201B2 (en) | HTTP authentication and authorization management | |
Miller et al. | Traffic classification for the detection of anonymous web proxy routing | |
Pannu et al. | Exploring proxy detection methodology | |
US20230344867A1 (en) | Detecting phishing pdfs with an image-based deep learning approach | |
Hazhirpasand et al. | One Leak Is Enough to Expose Them All: From a WebRTC IP Leak to Web-Based Network Scanning | |
US20230344866A1 (en) | Application identification for phishing detection | |
Wadkar et al. | Prevention of information leakages in a web browser by monitoring system calls |