2015 World Congress on Internet Security (WorldCIS) 2015
DOI: 10.1109/worldcis.2015.7359434
|View full text |Cite
|
Sign up to set email alerts
|

Securing the internet through the detection of anonymous proxy usage

Abstract: Many businesses and educational facilities employ some form of filtering to control what internet sites their users may browse. This is done to help protect network assets, to protect data from being stolen and to comply with company policies on internet usage. Anonymous proxies (or web proxies) can be used by the end users to bypass most filtering systems put in place by businesses and this can remove the protection that the filtering systems provide for the network. For instance, unless the web proxy being u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Anonymity technologies allow Internet users to maintain their privacy by preventing the collection of identifying information such as IP addresses. Due to an increasing awareness of what is shared and collected online, Internet users are growing more concerned with their privacy and are turning to the use of technologies such as anonymous proxies (Edman & Yener, 2009;Miller et al, 2015a). Anonymous Proxies are one of the easier to deploy technologies for anonymity on the Internet and are generally access through a web browser (Miller et al, 2015b).…”
Section: Anonymous Proxiesmentioning
confidence: 99%
“…Anonymity technologies allow Internet users to maintain their privacy by preventing the collection of identifying information such as IP addresses. Due to an increasing awareness of what is shared and collected online, Internet users are growing more concerned with their privacy and are turning to the use of technologies such as anonymous proxies (Edman & Yener, 2009;Miller et al, 2015a). Anonymous Proxies are one of the easier to deploy technologies for anonymity on the Internet and are generally access through a web browser (Miller et al, 2015b).…”
Section: Anonymous Proxiesmentioning
confidence: 99%
“…This plaintext access behavior has been marked as unsafe by Google Chrome. In this context, the transport layer security (TLS) protocol has been widely adopted for its ability to encrypt plaintext and to prevent general man-inthe-middle attacks as mentioned in [1]. According to Sandvine's latest report [2], encrypted traffic accounts for 50% of global web traffic.…”
Section: Introductionmentioning
confidence: 99%