Mehanna et al., 2024 - Google Patents
Free proxies unmasked: A vulnerability and longitudinal analysis of free proxy servicesMehanna et al., 2024
View PDF- Document ID
- 2501813057686078260
- Author
- Mehanna N
- Rudametkin W
- Laperdrix P
- Vastel A
- Publication year
- Publication venue
- arXiv preprint arXiv:2403.02445
External Links
Snippet
Free-proxies have been widespread since the early days of the Web, helping users bypass geo-blocked content and conceal their IP addresses. Various proxy providers promise faster Internet or increased privacy while advertising their lists comprised of hundreds of readily …
- 238000010234 longitudinal analysis 0 title description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20230362189A1 (en) | System and method for strategic anti-malware monitoring | |
| Oest et al. | Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis | |
| Roy et al. | Survey and taxonomy of adversarial reconnaissance techniques | |
| US9942270B2 (en) | Database deception in directory services | |
| US9609019B2 (en) | System and method for directing malicous activity to a monitoring system | |
| US9860265B2 (en) | System and method for identifying exploitable weak points in a network | |
| US9356950B2 (en) | Evaluating URLS for malicious content | |
| US9769204B2 (en) | Distributed system for Bot detection | |
| US10476891B2 (en) | Monitoring access of network darkspace | |
| US9111092B2 (en) | Security event management apparatus, systems, and methods | |
| US12395513B2 (en) | System and method for evaluating risk of a vulnerability | |
| US9430646B1 (en) | Distributed systems and methods for automatically detecting unknown bots and botnets | |
| Binde et al. | Assessing outbound traffic to uncover advanced persistent threat | |
| WO2016081561A1 (en) | System and method for directing malicious activity to a monitoring system | |
| US11632393B2 (en) | Detecting and mitigating malware by evaluating HTTP errors | |
| Mehanna et al. | Free proxies unmasked: A vulnerability and longitudinal analysis of free proxy services | |
| Djap et al. | Xb-pot: Revealing honeypot-based attacker’s behaviors | |
| Shamsi et al. | Measuring and clustering network attackers using medium-interaction honeypots | |
| Raftopoulos et al. | A quality metric for IDS signatures: in the wild the size matters | |
| Wardman et al. | A practical analysis of the rise in mobile phishing | |
| Nikiforakis et al. | Exploring the ecosystem of referrer-anonymizing services | |
| Christopher et al. | Siem-Enabled Cyber Event Correlation (What And How) | |
| TWI764618B (en) | Cyber security protection system and related proactive suspicious domain alert system | |
| Thompson | Continuous monitoring | |
| Li et al. | IPv6: a catalyst and evasion tool for botnets and malware delivery networks |