Nothing Special   »   [go: up one dir, main page]

Pannu et al., 2016 - Google Patents

Exploring proxy detection methodology

Pannu et al., 2016

View PDF
Document ID
12750611842888188826
Author
Pannu M
Gill B
Bird R
Yang K
Farrel B
Publication year
Publication venue
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)

External Links

Snippet

Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Similar Documents

Publication Publication Date Title
Khan et al. An empirical analysis of the commercial vpn ecosystem
US11336677B2 (en) Online portal for improving cybersecurity risk scores
US10298610B2 (en) Efficient and secure user credential store for credentials enforcement using a firewall
US20210234837A1 (en) System and method to detect and prevent Phishing attacks
US10425387B2 (en) Credentials enforcement using a firewall
Amara et al. Cloud computing security threats and attacks with their mitigation techniques
US10212134B2 (en) Centralized management and enforcement of online privacy policies
US20190354709A1 (en) Enforcement of same origin policy for sensitive data
US10826872B2 (en) Security policy for browser extensions
US9838356B2 (en) Encrypted peer-to-peer detection
US10601870B2 (en) Distributed cloud-based security systems and methods
US20090228780A1 (en) Identification of and Countermeasures Against Forged Websites
US8713674B1 (en) Systems and methods for excluding undesirable network transactions
US8763120B1 (en) Exploitation detection
US20230336524A1 (en) In-line detection of algorithmically generated domains
US12003537B2 (en) Mitigating phishing attempts
US20100020967A1 (en) Http authentication and authorization management
US8656462B2 (en) HTTP authentication and authorization management
US8806201B2 (en) HTTP authentication and authorization management
Miller et al. Traffic classification for the detection of anonymous web proxy routing
Pannu et al. Exploring proxy detection methodology
US20230344867A1 (en) Detecting phishing pdfs with an image-based deep learning approach
Hazhirpasand et al. One Leak Is Enough to Expose Them All: From a WebRTC IP Leak to Web-Based Network Scanning
US20230344866A1 (en) Application identification for phishing detection
Wadkar et al. Prevention of information leakages in a web browser by monitoring system calls