A Large-scale Analysis of Content Modification by Open HTTP Proxies
نویسندگان
چکیده
Open HTTP proxies offer a quick and convenient solution for routing web traffic towards a destination. In contrast to more elaborate relaying systems, such as anonymity networks or VPN services, users can freely connect to an open HTTP proxy without the need to install any special software. Therefore, open HTTP proxies are an attractive option for bypassing IPbased filters and geo-location restrictions, circumventing content blocking and censorship, and in general, hiding the client’s IP address when accessing a web server. Nevertheless, the consequences of routing traffic through an untrusted third party can be severe, while the operating incentives of the thousands of publicly available HTTP proxies are questionable. In this paper, we present the results of a large-scale analysis of open HTTP proxies, focusing on determining the extent to which user traffic is manipulated while being relayed. We have designed a methodology for detecting proxies that, instead of passively relaying traffic, actively modify the relayed content. Beyond simple detection, our framework is capable of macroscopically attributing certain traffic modifications at the network level to well-defined malicious actions, such as ad injection, user fingerprinting, and redirection to malware landing pages. We have applied our methodology on a large set of publicly available HTTP proxies, which we monitored for a period of two months, and identified that 38% of them perform some form of content modification. The majority of these proxies can be considered benign, as they do not perform any harmful content modification. However, 5.15% of the tested proxies were found to perform modification or injection that can be considered as malicious or unwanted. Specifically, 47% of the malicious proxies injected ads, 39% injected code for collecting user information that can be used for tracking and fingerprinting, and 12% attempted to redirect the user to pages that contain malware. Our study reveals the true incentives of many of the publicly available web proxies. Our findings raise several concerns, as we uncover multiple cases where users can be severely affected by connecting to an open proxy. As a step towards protecting users against unwanted content modification, we built a service that leverages our methodology to automatically collect and probe public proxies, and generates a list of safe proxies that do not perform any content modification, on a daily basis.
منابع مشابه
Analysis of Large-scale Displacement Using Radar Interferometry Technology in Open-pit Mines (Case Study: Gol Gohar Sirjan Mine)
Abstract Mines with their displacements cause damage to infrastructure and land, so it is important to control the displacement caused by mines. Also, the amount of minerals extracted from mines has always been of interest to managers. On the other hand, radar interferometry, given the production of repetitive and full images and the acceptable accuracy of this method, in examining be sugge...
متن کاملData Integrity Related Markup Language and HTTP Protocol Support for Web Intermediaries
In this paper, we propose the markup language framework and its associated HTTP protocol extension to support data integrity for active web intermediaries. There are three aspects that our language framework would like to focus on. Firstly, the content server can specify its intended authorization and task to multiple web intermediary proxies in its content objects easily. Secondly, a web inter...
متن کاملA Modification on Applied Element Method for Linear Analysis of Structures in the Range of Small and Large Deformations Based on Energy Concept
In this paper, the formulation of a modified applied element method for linear analysis of structures in the range of small and large deformations is expressed. To calculate deformations in the structure, the minimum total potential energy principle is used. This method estimates the linear behavior of the structure in the range of small and large deformations, with a very good accuracy and low...
متن کاملModification of Silica surface by Titanium sol synthesis and characterization
Hydrophobic silica titanium nanoparticles (STNPs) were successfully synthesized by the sol-gel process using liquid modification. Fourier transform infrared (FTIR) and X-ray fluorescence (XRF) studies were demonstrated the attachment of titanium on the silica surface. Titanium content enhanced the agglomeration of particles as shown in topography results. The N2 adsorption-desorption followed T...
متن کاملModification of Silica surface by Titanium sol synthesis and characterization
Hydrophobic silica titanium nanoparticles (STNPs) were successfully synthesized by the sol-gel process using liquid modification. Fourier transform infrared (FTIR) and X-ray fluorescence (XRF) studies were demonstrated the attachment of titanium on the silica surface. Titanium content enhanced the agglomeration of particles as shown in topography results. The N2 adsorption-desorption followed T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017