
International Journal for Information Security Research (IJISR), Volume 5, Issue 1, March 2015 Traffic Classification for the Detection of Anonymous Web Proxy Routing Shane Miller, Kevin Curran, Tom Lunney Ulster University, Northern Ireland Abstract There is an increasing need to be able to classify be logging all the requests and information that pass whether an incoming packet is from a legitimate originating through it. This information could include usernames IP address or has been modified through an intermediate and passwords and the operators of the proxy site may proxy or node. Being able to verify the originating IP use these to steal the identity linked to the credentials address allows a business (e.g. bank) to use geolocation and use it to commit fraud and other criminal actions. services in order to then ascertain which geographical location that packet was sent from. This can then feed into A user employing an anonymous proxy on an the system intrusion system or backend fraud alert enterprise network to bypass a network filter might be, mechanisms. The web however is going 'dark'. There is a unwittingly, leaking confidential information about noticeable uptake in the amount of encrypted data and third their company. To combat this issue we propose a party anonymous traffic proxies which aim to mask the try system that will detect suspicious traffic on the location and IP address of a web request. We present here a network and attempt to determine whether the traffic system which identifies the characteristics or signatures indicates the usage of an anonymous proxy website. whenever a user is using a web proxy by developing a The system will specifically check for characteristics Detection System that records packets and analyses them that appear in packets generated by anonymous looking for identifying patterns of web proxies. proxies and then create rules to determine the usage of anonymous proxies. 1. Introduction 2. Intrusion Detection and Traffic A proxy server, in terms of computer networks, is a Classification server that acts as an intermediary for requests from clients for resources located on other servers on a 2.1. IP Blocking network or the Internet. This is the most basic type of proxy which is known as a gateway. Another type of proxy is a reverse proxy. This consists of a server on IP blocking is the most basic technique used to an internal company network and acts as an combat malicious threats to networks and is one of the intermediary for other servers based on that network. most commonly used techniques for protecting Reverse proxies are typically used as an Internet networks [1]. Using this method an administrator can facing server that handles a number of different tasks. block an IP address or a range of IP addresses from Some examples include: SSL acceleration using accessing a certain domain name IP address. A specially designed hardware for the encryption and network administrator can also block access to an IP decryption of SSL traffic, load balancing to distribute address that is being used by a disruptive user. IP requests between several web servers and acting as a blocking can however be overcome by using cache for static content such as pictures and other anonymising proxies. The user’s IP address is usually graphical content. The proxies that will be discussed sent out as a source IP address in the network packet in this research are anonymising proxies which are containing the request to a web server. However, based on another type of proxy known as an open when using a proxy, this request is first sent to the proxy. Open proxies are a proxy that is available to proxy server which then forwards it on towards the any user on the Internet. They are mostly used to set web server. This forwarded request is encased in a up anonymous proxy websites. Anonymising proxy new network packet which means that the source IP sites act as an intermediary, forwarding requests and address is no longer that of the end user but instead is fetching the results, whilst also hiding a user’s identity that of the proxy server. So, the blocked IP address of by concealing their IP address from web servers on the the user is not actually making any direct contact with Internet. This type of server is regularly used as a the web server running the IP filter. The network means to hide a criminal’s identity so they can commit administrator may also block the IP addresses of various crimes on the internet without being caught. websites that they do not want users to access, but in There are also a number of risks with using an this case a proxy will separate the business network anonymous proxy as a method to bypass network and the website being accessed. The IP block filter filters on a company network. The anonymous proxy will only detect the IP of the proxy site, which will server might not be a simple intermediary that only likely not be in the filter’s block list. Fig. 1 shows how forwards requests and fetches the results. It could also the proxy is located between the user and the website they are trying to access. Copyright © 2015, Infonomics Society 538 International Journal for Information Security Research (IJISR), Volume 5, Issue 1, March 2015 2.2. Firewalls and Intrusion Detection of preventing possible violations [6]. When detecting possible incidents, an IDS can take a number of A significant security problem for business type actions. One would be to report the incident to a networks is hostile or unwanted access by users or system security administrator, who could then initiate software [2]. Unwanted user access (an intrusion) can a response to mitigate the effects of the incident. be in the form of unauthorised logon to a machine or Alongside alerting an administrator, the IDS could gaining the ability to perform higher privilege actions also keep a record of incident that could be referenced than what is normally authorised. Unwanted software at a later date and as a way to help prevent future access can take the form of a virus, Trojan horse or cases of that particular incident. There are a number of other form of malware. To combat these intrusions different types of IDS. These are: Network based, there are a number of defences. There are host based Host based, Network Behaviour and Wireless [5]. security methods that are managed by the operating Network based systems monitor the traffic of a system of the machine, various types of firewall used network using sensors placed at certain parts of the to filter network packets, such as Intrusion Detection network and IDS management servers. They analyse Systems (IDS) and Intrusion Prevention Systems (IPS). the activity recorded by the sensors in order to identify A firewall is defined as a component or set of incidents of intrusion. Host based systems differ from components that restrict access between a protected network based systems by monitoring a single host. network and external networks [3]. Intrusion NBA systems monitor network traffic in order to Detection Systems detect intrusions on a network. identity threats that generate unusual traffic flows such IDSs come in many different configurations, two of as malware or port scanning attempts. Wireless IDSs which are Host-based IDS (HIDS) and Network-based apply similar techniques to network based systems IDS (NIDS). The difference between these two is the specifically to wireless network traffic that makes use location of the IDS on the network. A HIDS monitors of wireless networking protocols. IDSs typically use 3 and collects the characteristics for hosts containing primary detection methodologies; signature based sensitive information, servers running public services detection, anomaly based detection and stateful and suspicious activities [4]. To detect intrusions to protocol analysis [7, 4]. IDSs can make use of only the network HIDSs typically follow one of two one of these methods or, more commonly, they can general approaches. These are anomaly detection and make use of multiple methods which provides a signature detection. Anomaly detection involves the broader and more complete approach to intrusion collection of data relating to behaviour of legitimate detection. Signature based detection is the process of users over a period of time. Next, tests are applied to using signatures to define what is and is not a potential observed behaviour to determine if it involves an incident. Signatures are defined as a pattern or string illegitimate user. Signature detection involves a set of that signifies a known attack or threat [4]. An example rules or attack patterns that can be used to decide if an of a signature would be more than 3 consecutive failed observed behaviour is that of an attacker [4]. A NIDS logins within 2 minutes signifying an attack attempt. captures network traffic at specific points of a network Signature based detection is the simplest methodology through sensors and then analyses the activities of available to IDSs as it compares the current network applications and protocols to recognise suspicious packets or network logs against a list of signatures and incidents [4]. A typical NIDS configuration includes a patterns using string comparison techniques[8]. number of sensors to monitor network traffic, a NIDS Scanning network packets would be useful for an management server and one or more user interface online, real time detection system whereas scanning consoles for human interaction with the IDS. The network logs would be more suitable in finding out if analysis of network traffic may occur at either the an attack had taken place in the past. A limitation of sensor and/or the management server.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages8 Page
-
File Size-