Perino et al., 2018 - Google Patents
ProxyTorrent: Untangling the free HTTP (S) proxy ecosystemPerino et al., 2018
View PDF- Document ID
- 14037653064277252249
- Author
- Perino D
- Varvello M
- Soriente C
- Publication year
- Publication venue
- Proceedings of the 2018 World Wide Web Conference
External Links
Snippet
Free web proxies promise anonymity and censorship circumvention at no cost. Several websites publish lists of free proxies organized by country, anonymity level, and performance. These lists index hundreds of thousand of hosts discovered via automated …
- 238000004458 analytical method 0 abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12001504B2 (en) | Internet-based proxy service to modify internet responses | |
Merzdovnik et al. | Block me if you can: A large-scale study of tracker-blocking tools | |
Perino et al. | ProxyTorrent: Untangling the free HTTP (S) proxy ecosystem | |
US10313475B2 (en) | Internet-based proxy service for responding to server offline errors | |
Chung et al. | Tunneling for transparency: A large-scale analysis of end-to-end violations in the internet | |
Aceto et al. | Internet censorship detection: A survey | |
US9049244B2 (en) | Registering for internet-based proxy services | |
KR102580898B1 (en) | System and method for selectively collecting computer forensics data using DNS messages | |
Dixon et al. | Network traffic obfuscation and automated internet censorship | |
Nasr et al. | MassBrowser: Unblocking the Censored Web for the Masses, by the Masses. | |
US9055113B2 (en) | Method and system for monitoring flows in network traffic | |
Perino et al. | Long-term measurement and analysis of the free proxy ecosystem | |
Safaei Pour et al. | A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security | |
AT&T | ||
Yen | Detecting stealthy malware using behavioral features in network traffic | |
Shahbar | Analysis of multilayer-encryption anonymity networks | |
Morales et al. | Analyzing temporal graphs of malware distribution networks | |
Jianming et al. | An empirical study of unsolicited content injection into a website | |
US11979383B1 (en) | Transparent web browsing recorder | |
Bian | Using stand-off observation and measurement to understand aspects of the global internet | |
Levy | CDNs and Privacy Threats: A Measurement Study | |
Bennett | Search Engines That Scan For Internet-Connected Services: Classification and Empirical Study | |
Sanders | Techniques for the analysis of modern web page traffic using anonymized tcp/ip headers | |
Kontaxis | Reducing Third Parties in the Network through Client-Side Intelligence | |
Xu | Understanding and Characterizing CDN Services and Paid Features |