scholarly journals Detecting the Use of Anonymous Proxies

2018 ◽  
Vol 10 (2) ◽  
pp. 74-94 ◽  
Author(s):  
Jonathan McKeague ◽  
Kevin Curran

The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection is in progress from online fraud hotspots. IP addresses can be spoofed allowing hackers to bypass geographical IP restrictions and thus render some category of fraud prevention useless. Anonymous proxies (AP) which act as intermediate relays which disguise the source IP addresses can play a large role in cybercrime. There is a need to ascertain whether an incoming IP connection is an original source matched IP address, or one being routed through an anonymising proxy. This article concentrates on various methods used by anonymising proxies, the characteristics of the anonymous proxies and the potential mechanisms available to detect if a proxy is in use.

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1510 ◽  
Author(s):  
Prakash Veeraraghavan ◽  
Dalal Hanna ◽  
Eric Pardede

The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprietary, expensive, and requires expertise. The Internet is subjected to several other forms of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since 2005, there is no holistic solution available to solve this problem from the gross-root. Also, every solution assumes that the attackers are always from outside networks. In this paper, we provide an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside hosts. We use a modified form of Network Address Translation (NAT) to build our solution framework. We call our framework as NAT++. The proposed infrastructure is robust, crypto-free, and easy to implement. Our simulation results have shown that the proposed NAT++ infrastructure does not consume more than the resources required by a simple NAT.


2015 ◽  
Vol 7 (3) ◽  
pp. 1-23 ◽  
Author(s):  
Benjamin Edelman ◽  
Michael Schwarz

We consider market rules for transferring IP addresses, numeric identifiers required by all computers connected to the Internet. Transfers usefully move resources from lowest- to highest-valuation networks, but transfers tend to cause socially costly growth in the Internet's routing table. We propose a market rule that avoids excessive trading and comes close to achieving social efficiency. We argue that this rule is feasible despite the limited powers of central authorities. We also offer a framework for reasoning about future prices of IP addresses, then explore the role of rentals in sharing information about the value of IP address and assuring allocative efficiency. (JEL D47, D82, D85, L86)


2019 ◽  
Vol 4 (2) ◽  
pp. 137 ◽  
Author(s):  
Nfn Sarip ◽  
Arief Setyanto

The use of the internet today has become a necessity, the most commonly used media to connect to the internet is a Wireless LAN network. For easy access to the network, DHCP service become a standard feature that must exist, because ordinary users no longer need to think about procedures for configuring IP addresses, all of which have been done automatically by the DHCP service. But it turns out that there is a security threat to DHCP service, namely DHCP Starvation attacks that can be exhausting the availability of IP addresses in DHCP service so that the configuration of IP address automatically can no longer be done on the client. Various methods such as authentication, cryptography, and machine learning are used by researchers in preventing DHCP Starvation attacks, but the issue of effectiveness and efficiency still opens up further research opportunities. In this research, packet filtering methods based on DSCP code applied to the Netfilter system are used to do prevention of DHCP Starvation attacks, this method has proven to be very effective in making prevention and more efficient when applied on small scale wireless networks such as at office networks and internet cafe.


2009 ◽  
Vol 2009 ◽  
pp. 1-6
Author(s):  
Maher Ben Jemaa ◽  
Nahla Abid ◽  
Maryline Laurent-Maknavicius ◽  
Hakima Chaouchi

The role of Internet Protocol (IP) is becoming more and more problematic especially with the new requirements of mobility and multihoming. Host Identity protocol (HIP) defines a new protocol between the network and transport layers in order to provide a better management to those requirements. The protocol defines a new namespace based on cryptographic identifiers which enable the IP address roles dissociation. Those new identifiers identify hosts rather than IP addresses. Because HIP is a quite recent protocol, we propose to present an experimental evaluation of its basic characteristics.


2019 ◽  
Vol 10 (2) ◽  
pp. 83-96 ◽  
Author(s):  
Junaid Latief Shah ◽  
Heena Farooq Bhat ◽  
Asif Iqbal Khan

The Internet, since its genesis in 1970's, has already become a global broadcasting potential for information dissemination and a channel for information collaboration and an interface between disparate users and their systems, separated by large geographical locations. The rate of growth of interconnected devices has been on exponential scale from the last decade. As of now, more than 5 billion devices are accessing the Internet. The Internet Protocol Version 4 (IPv4) which is a three decade old standard internetworking protocol using 32-bit address, fails to cater such a large number of hosts. In February 2011, the Internet Assigned Numbers Authority (IANA), the nodal agency for IP address allocation exhausted the central pool of IPv4 addresses completely. This rapid depletion of IP addresses was inevitable as a large number of devices are getting connected to internet. Also, inefficient utilization and remiss planning of IP address space acted as catalyst in the process of depletion. NAT, CIDR and Subnetting only serve as short interim solutions provided by IPv4. Moreover, IPv4 fails to scale up and bridge the security enhancements required by the modern Internet today. The only feasible option lies in unabridged transition to IPv6. Internet Protocol Version 6 (IPv6) provides an address space of 2128 i.e. trillions of addresses, making the IP address space potentially inexhaustible. Thus, adopting IPv6 makes a paragon choice of replacement for IPv4. This article reviews the next generation internet protocol IPv6 and explicates the discussion over the need for migrating to IPv6. The article also presents technical as well as non-technical challenges related to migration and presents overall statistics regarding IPv6 adoption around the world.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 4975
Author(s):  
Dan Komosny

The paper deals with the locations of IP addresses that were used in the past. This retrospective geolocation suffers from continuous changes in the Internet space and a limited availability of past IP location databases. I analyse the retrospective geolocation of IPv4 and IPv6 addresses over five years. An approach is also introduced to handle missing past IP geolocation databases. The results show that it is safe to retrospectively locate IP addresses by a couple of years, but there are differences between IPv4 and IPv6. The described parametric model of location lifetime allows us to estimate the time when the address location changed in the past. The retrospective geolocation of IP addresses has a broad range of applications, including social studies, system analyses, and security investigations. Two longitudinal use cases with the applied results are discussed. The first deals with geotargeted online content. The second deals with identity theft prevention in e-commerce.


2018 ◽  
Author(s):  
Juan Sebastian Mejia Vallejo ◽  
Daniel Lazkani Feferman ◽  
Christian Esteve Rothenberg

A short-term solution for the depletion of Internet Protocol (IP) addresses and scaling problems in network routing is the reuse of IP address by placing Network Address Translators (NAT) at the borders of stub domains. In this article, we propose an implementation of NAT using Programming ProtocolIndependent Packet Processors (P4) language, taking advantage of its features such as target-agnostic dataplane programmability. Through the MACSAD framework, we generate a software switch that achieves high performance with the support of different hardware (H/W) and Software (S/W) platforms. The main contributions of this paper relate to the performance evaluation results of the NAT implementation using P4 language with MACSAD compiler.


Author(s):  
Do Van Tien

Dynamic Host Configuration Protocol (DHCP) allows the automatic networking configuration of computers and devices (clients) in Internet Protocol (IP) networks. It is used by clients to request an IP address and obtain configuration parameters (netmask, router IP address, Domain Name Server –DNS– address etc.) for IP networking from a DHCP server. For this purpose, a pool of IP addresses is administered and maintained in a DHCP server. In order to reuse an IP address that is no longer needed by the client to which it was assigned, a lease time parameter is applied. That is, each client leases an IP address from the chosen DHCP server for a limited period of time.


1998 ◽  
Vol 20 (3) ◽  
pp. 77-81
Author(s):  
Barry Clark ◽  
Bartosz Wachowiak ◽  
Ewan W. Crawford ◽  
Zenon Jakubowski ◽  
Janusz Kabata

A pilot study was performed to evaluate the feasibility of using the Internet to securely deliver patient laboratory results, and the system has subsequently gone into routine use in Poland. The system went from design to pilot and then to live implementation within a four-month period, resulting in the LIS-Interlink software product. Test results are retrieved at regular intervals from the BioLinkTMLIS (Laboratory Information System), encrypted and transferred to a secure area on the Web server. The primary health-care centres dial into the Internet using a local-cell service provided by Polish Telecom (TP), obtain a TCP/IP address using the TP DHCP server, and perform HTTP ‘get’ and ‘post’ operations to obtain the files by secure handshaking. The data are then automatically inserted into a local SQL database (with optional printing of incoming reports)for cumulative reporting and searching functions. The local database is fully multi-user and can be accessed from different clinics within the centres by a variety of networking protocols.


2021 ◽  
pp. 1-4
Author(s):  
Rosa M. Delgado

BACKGROUND: Originally, digital healthcare was created to support underserved and rural patients gain access to health services. Phones, devices, and computers need IP (Internet Protocol) addresses to connect to the Internet. OBJECTIVE: This paper aims to study the close relationship between the Internet and the transformation of healthcare services. METHODS: The current protocol in use is the Internet protocol version 4 (IPv4), whose number of Internet addresses has been globally exhausted. The Internet Protocol version 6 (IPv6) with 47 octillion unique addresses for every person on the planet has become the only option for sustainable growth and innovation. However, most of the worldwide industry is still in IPv4. In the era of Artificial Intelligence, Internet of Things, Fifth Generation of Cellular Technology (5G), and Blockchain, there will be a massive need of IP addresses. For 2025, experts predict over 1.5 billion new IPv6 users which will continue to grow exponentially. RESULTS: Nations need to tackle the increasing industry requirements for IPv6 and telehealth adoption to benefit from the full IPv6 connectivity which is the key strategic advantage for the healthcare industry. CONCLUSION: The strategic potential that telehealth brings to the healthcare industry is widely appreciated. However, what are the implications of its expansion around the world? How can we prioritize the poorest and most vulnerable in society without new technologies?


Sign in / Sign up

Export Citation Format

Share Document