[go: up one dir, main page]

Mehanna et al., 2024 - Google Patents

Free proxies unmasked: A vulnerability and longitudinal analysis of free proxy services

Mehanna et al., 2024

View PDF
Document ID
2501813057686078260
Author
Mehanna N
Rudametkin W
Laperdrix P
Vastel A
Publication year
Publication venue
arXiv preprint arXiv:2403.02445

External Links

Snippet

Free-proxies have been widespread since the early days of the Web, helping users bypass geo-blocked content and conceal their IP addresses. Various proxy providers promise faster Internet or increased privacy while advertising their lists comprised of hundreds of readily …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
US20230362189A1 (en) System and method for strategic anti-malware monitoring
Oest et al. Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis
Roy et al. Survey and taxonomy of adversarial reconnaissance techniques
US9942270B2 (en) Database deception in directory services
US9609019B2 (en) System and method for directing malicous activity to a monitoring system
US9860265B2 (en) System and method for identifying exploitable weak points in a network
US9356950B2 (en) Evaluating URLS for malicious content
US9769204B2 (en) Distributed system for Bot detection
US10476891B2 (en) Monitoring access of network darkspace
US9111092B2 (en) Security event management apparatus, systems, and methods
US12395513B2 (en) System and method for evaluating risk of a vulnerability
US9430646B1 (en) Distributed systems and methods for automatically detecting unknown bots and botnets
Binde et al. Assessing outbound traffic to uncover advanced persistent threat
WO2016081561A1 (en) System and method for directing malicious activity to a monitoring system
US11632393B2 (en) Detecting and mitigating malware by evaluating HTTP errors
Mehanna et al. Free proxies unmasked: A vulnerability and longitudinal analysis of free proxy services
Djap et al. Xb-pot: Revealing honeypot-based attacker’s behaviors
Shamsi et al. Measuring and clustering network attackers using medium-interaction honeypots
Raftopoulos et al. A quality metric for IDS signatures: in the wild the size matters
Wardman et al. A practical analysis of the rise in mobile phishing
Nikiforakis et al. Exploring the ecosystem of referrer-anonymizing services
Christopher et al. Siem-Enabled Cyber Event Correlation (What And How)
TWI764618B (en) Cyber security protection system and related proactive suspicious domain alert system
Thompson Continuous monitoring
Li et al. IPv6: a catalyst and evasion tool for botnets and malware delivery networks