Exploring Proxy Detection Methodology: Abstract-Under Most Circumstances, Cyber Criminals Will
Exploring Proxy Detection Methodology: Abstract-Under Most Circumstances, Cyber Criminals Will
Mandeep Pannu Bob Gill Robert Bird Kai Yang Ben Farrel
Department of Computer Department of Electrical Faculty of Engineering and Department of Computer Department of Computer
Science and Information and Computer Engineering Computing Science and Information Science and Information
Technology BCIT Coventry University Technology Technology
KPU Burnaby, Canada Coventry, UK KPU KPU
Surrey, Canada [email protected] [email protected] Surrey, Canada Surrey, Canada
[email protected] [email protected] [email protected]
Abstract—Under most circumstances, cyber criminals will This paper identifies different proxy connectivity methods,
commit fraudulent transactions using proxy services which hide in order to develop a multi-tiered proxy detection module, and
their real IP address and physical location. This is done in an evaluate the implementation of the module in terms of cost and
effort to avoid being tracked and prosecuted by law enforcement effectiveness. Tests are completed using different types of
agencies. This paper presents the investigation of a proxy
detection methodology and efforts to implement such technology
devices and platforms, such as desktops, laptops (Windows),
into a business solution with the sole purpose of eliminating the and mobile devices (Android). We also test the module using
majority of fraudulent transaction attempts. The approach, computers connected through home networks, work networks,
described in this paper identifies multiple proxy connectivity and mobile networks. The results of the experiments indicate
methods, and implements a multi-tiered detection technique. The that the proxy detection module improves business security by
result of the experiments demonstrates that the proxy successfully identifying proxy users.
methodology improves business security by identifying users who
are utilizing proxies and to collect data that prevents potentially II. BACKGROUND
fraudulent activities.
In the literature about information technology, the term
Keywords—fraud prevention; proxy detection; security “proxy” is also referred to as a “Stepping Stone” [1]. A proxy
is software that resides on a server or node, and has the
purpose of mediating access between the client’s machine and
I. INTRODUCTION the destination server. When an application generates a request
The detection and protection against fraud have become of for a particular resource, the request is relayed via the
utmost importance in modern society. With the rise of online demarcated proxy server. Once the proxy server receives the
financial and e-commerce services, a new class of criminal has request, it analyzes the said request in order to determine the
surfaced. When we use any Internet-related application or desired resource accompanied by its designated server or
service, we become potential targets for cyber criminals. machine, as well as any additional information that it needs to
Cyber criminals utilize techniques such as social engineering, relay, after which it connects and forwards the request to the
phishing, and scamming to exploit system vulnerabilities for target server and waits for a response. Upon receipt, it
personal gain. They could act on our behalf to take our forwards the reply back to its end client [2].
valuable assets, or use our privileges or rights without our Fig. 1. Example of a Typical Proxy
knowledge. Concealing a person’s true identity and location on
the Internet can be done by the usage of proxy or anonymity
services. Cyber criminals commit fraudulent transactions by
using proxy services to hide their real internet protocol (IP)
address and physical location, in order to avoid being tracked
and prosecuted by law enforcement agencies. Thus, having the
ability to detect proxy connections and prevent fraudulent
transactions becomes paramount.
We are proposing to devise and present a proxy detection
A. Proxy Types
methodology to protect businesses, as well as their end users,
against electronic commerce (e-commerce) fraud. Knowledge According to David Gourley and Brian Totty [3], proxy
gained from currently available detection methods, underlying servers can be classified based on their functionality.
technology, and methods of experimentation were all 1) Child filter: Proxies can be utilized in order to block
thoroughly considered and utilized. This proposed proxy certain types of content such as adult material.
detection methodology checks for cyber criminals who access
the website and/or web application for the possibility of proxy 2) Document access controller: Access to certain
usage and perform necessary action before cyber criminals resources can be restricted and/or granted to certain users
carry out fraudulent activities. based on authentication and authorization mechanisms.