An Extensive Evaluation of the Internet's Open Proxies

06/27/2018
by   Akshaya Mani, et al.
0

Open proxies forward traffic on behalf of any Internet user. Listed on open proxy aggregator sites, they are often used to bypass geographic region restrictions or circumvent censorship. Open proxies sometimes also provide a weak form of anonymity by concealing the requestor's IP address. To better understand their behavior and performance, we conducted a comprehensive study of open proxies, encompassing more than 107,000 listed open proxies and 13M proxy requests over a 50 day period. While previous studies have focused on malicious open proxies' manipulation of HTML content to insert/modify ads, we provide a more broad study that examines the availability, success rates, diversity, and also (mis)behavior of proxies. Our results show that listed open proxies suffer poor availability--more than 92 requests. Much more troubling, we find numerous examples of malicious open proxies in which HTML content is manipulated to mine cryptocurrency (that is, cryptojacking). We additionally detect TLS man-in-the-middle (MitM) attacks, and discover numerous instances in which binaries fetched through proxies were modified to include remote access trojans and other forms of malware. As a point of comparison, we conduct and discuss a similar measurement study of the behavior of Tor exit relays. We find no instances in which Tor relays performed TLS MitM or manipulated content, suggesting that Tor offers a far more reliable and safe form of proxied communication.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/08/2017

Learning detectors of malicious web requests for intrusion detection in network traffic

This paper proposes a generic classification system designed to detect s...
research
12/14/2020

Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services

Smart DNS (SDNS) services advertise access to "geofenced" content (typic...
research
09/19/2020

Optimizing Away JavaScript Obfuscation

JavaScript is a popular attack vector for releasing malicious payloads o...
research
03/31/2020

When the Guard failed the Droid: A case study of Android malware

Android malware is a persistent threat to billions of users around the w...
research
01/03/2019

The Price of Free Illegal Live Streaming Services

As Internet streaming of live content has gained on traditional cable TV...
research
12/14/2022

Studying the workload of a fully decentralized Web3 system: IPFS

Web3 aims at creating a decentralized platform that is competitive with ...

Please sign up or login with your details

Forgot password? Click here to reset