Detecting Anonymous Proxy Usage Final Report


Future Work and Enhancements



Download 0.59 Mb.
Page17/20
Date16.07.2017
Size0.59 Mb.
#23501
1   ...   12   13   14   15   16   17   18   19   20

8.1 Future Work and Enhancements


Although the program does detect most of the common proxies available on the internet there are some minor improvements that could be made to the system.

  1. Limit the log size
    If the network has a heavy proxy usage within it the log file is going to increase its size very quickly and if it is not monitored often this could be problematic when the administrator goes to open it. A file size limit should be put in place in order to stop this. When the limit is reached a new file should be created without stopping and restarting the program.

  2. IP/Proxy Check

A check should be put in place to limit the amount of packets printed out to the log, the check should grab the IP from the packet and also the proxy that was in the packet, and if it has already been printed to the log then there is no need to reprint. This check would greatly reduce the size of the log, however it would also leave the network administrator with only one network packet to determine the use of the proxy.

  1. Pause/Restart Function

A function should be integrated into the system to allow the user the ability to pause or restart the project without having to close the program and start it up again.

  1. Increase the amount of proxies detected

As a lot of the main proxies have been detected, there are some proxies available that do not fall under the main categories. Determining the characteristics of these proxies and adding them to the code would be a useful addition.

  1. Proxy Counter

A proxy counter could be utilized to count the amount of proxies detected within the network in a given time. The counter should be able to distinguish between the different proxies and give a daily report of the proxy usage. This could then be used to determine how successful the system is, especially if the network administrator is blocking the proxies as they find them.

  1. File Upload

As the program was to be run on a continuous basis, the need for a function for the user to upload a packet file to check if it contains a proxy or not was not the priority for this program, therefore it was not implemented. It could however be implemented in the future, as it would be a useful feature to be able to scan saved packet files.

10. References


Chaabane, A., Pere Manils, P. & Kaafar, M. (2010) Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network, 4th International Conference on Network and System Security, vol. 1, no. 1, pp. 167

Cisco. (2006) Cisco IOS Security Configuration Guide, Release 12.2, Access Control Lists: Overview and Guidelines. Available at: http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfacls.html

Dingledine, R., Mathewson, N. & Syverson, P. (2004) Tor: the second-generation onion router, Proceedings of the 13th conference on USENIX Security Symposium, August 2004.

Dredge, S. (2013) What is Tor? A beginner’s guide to the privacy tool, The Guardian, November 2013, Available at: http://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser

Goralski, W. (2008). The Illustrated Network: How TCP/IP Works in a Modern Network. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc.

International Telecommunication Union. (2013) The World in 2013 ICT Facts and Figures. February 2013, Available at: http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013.pdf

Kibirkstis, A. (2009) Intrusion Detection FAQ: What is Geolocation and How Does it Apply to Network Detection, Available at: http://www.sans.org/security-resources/idfaq/geolocation-network-detection.php

Knickerbocker, P., Yu, D. & Li,J. (2009) Humboldt: A distributed phishing disruption system, in Proc. IEEE eCrime Researchers Summit, Tacoma, USA, 2009, pp. 1-12.

Lee, J. (2013) What is Onion Routing, Exactly?. MakeUseOf, May 2013, Available at: http://www.makeuseof.com/tag/what-is-onion-routing-exactly-makeuseof-explains/

Lee, K., Jiang, Z., Kim, S., Kim, S. & Kim, S. (2005) Access Control List Mediation System for Large-Scale Network, 6th Int Conf on Parallel and Distributed Computing, vol. 1, no. 1, pp. 483-487.







Li, B., Erdin, E., Gunes, M., Bebis, G. & Shipley, T. (2011) An Analysis of Anonymity Usage, Traffic Monitoring and Analysis: Third International Workshop, TMA 2011, Vienna, Austria. Springer-Verlag, pp 113-116
Lyon, D. (2009) Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. United States: Insecure.
Mallia, D. (2013) When was the Internet Invented. History News Network, October 2013, Available at: http://hnn.us/article/142824

Microsoft. (2013) Parts of the Access Control Model. Access Control Lists, October 2010. Available at: http://msdn.microsoft.com/library/windows/desktop/aa374872(v=vs.85).aspx

Murdoch, S. & Anderson, R. (2008) Tools and Technology of Internet Filtering, Access Denied: The Practice and Policy of Global Internet Filtering, vol. 1, no. 1, pp. 58.

Neustar. (2012) Neustar® Insights: Online Fraud Prevention: Three Who Stood Their Ground, Available at: http://www.banktech.com/whitepaper/download/showPDF?articleID=191705583

Raynal, F. Ahmad, M., Shaikhli, I. & Ahmad, H. (2012) Protection of the Texts Using Base64 and MD5, Journal of Advanced Computer Science and Technology Research, vol. 2, no. 1, pp. 22-34.

Reed, M.G., Syverson, P.F., Goldschlag, D.M.(1998) Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, , vol.16, no.4, pp.482-494.

SASI. (2006) Internet Use 1990, Poster of Internet usage, Available at: http://www.worldmapper.org/posters/worldmapper_map335_ver5.pdf

Sourcefire. (2013) Snort User’s Manual 2.9.5, The Snort Project , May 2013. Available at: http://s3.amazonaws.com/snort-org/www/assets/166/snort_manual.pdf

Stanger, J., Krishnamurthy, M., Seagren, E., Alder, R., Bayles, A., Burke, J., Carter, S. & Faskha, E. (2007) How to Cheat at Securing Linux. Introducing Intrusion Detection and Snort.  United States of America: Syngress, pp 126-140.



Thomas, K., Grier, C., Ma, J., Paxson, V. & Song, D. (2011) Monarch: Providing real-time URL spam filtering as a service, in Proc. IEEE Symposium on Security and Privacy, Oakland, California, USA, 2011, pp 447-462.

Download 0.59 Mb.

Share with your friends:
1   ...   12   13   14   15   16   17   18   19   20




The database is protected by copyright ©ininet.org 2024
send message

    Main page