【24h】

Identifying Tunnelled Proxies through Passively Monitoring Network Traffic

机译:通过被动监视网络流量来识别隧道代理

获取原文

摘要

"Proxies" are Internet applications that enable Internet users to connect to (or tunnel through) remote resources using another machine for two distinct purposes. First, they allow users to access remotely all resources in a network (i.e. Virtual Private Network or VPN). Second, they bring some level of anonymity by bouncing traffic around proxies. The latter model may enable Internet users to bypass website censorship and services that prohibit access from some specific geographical locations. Similarly, Internet attackers may use the latter approach to stay unknown. In our previous research, we have introduced OverUDP (a novel approach of transferring all transport layer data over UDP tunnel for P2P communications of IPv4). In this study, we briefly explain how OverUDP works in practice and also show how an Internet attacker may misuse it and make it act as a proxy. Finding this type of proxy is relatively difficult because communications between the attacker and the victim are tunnelled. Furthermore, we discuss the security concerns of misusing our solution, and a detection approach if OverUDP was used as a proxy.
机译:“代理”是Internet应用程序,它使Internet用户能够使用另一台计算机出于两个不同的目的而连接(或穿越)远程资源。首先,它们允许用户远程访问网络(即虚拟专用网或VPN)中的所有资源。其次,它们通过绕过代理服务器附近的流量来带来某种程度的匿名性。后一种模型可以使Internet用户绕过禁止从某些特定地理位置访问的网站审查和服务。同样,互联网攻击者可能使用后一种方法来保持未知。在之前的研究中,我们介绍了OverUDP(一种通过UDP隧道传输所有传输层数据以进行IPv4的P2P通信的新颖方法)。在本研究中,我们将简要说明OverUDP在实际中的工作原理,并说明Internet攻击者可能如何滥用它并使其充当代理。找到这种类型的代理相对困难,因为攻击者和受害者之间的通信是通过隧道传输的。此外,我们还将讨论滥用我们的解决方案的安全性问题,以及将OverUDP用作代理的一种检测方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号