Skip to content
2000
Volume 6, Issue 1
  • ISSN: 2215-0811
  • E-ISSN: 2215-082X

Abstract

Aims: Network security commonly uses internet protocol (IP) filtering solutions. Anonymous proxies (anonymizers) act as a gateway to the resource, meaning that filters will be bypassed, another feature of anonymizers is that they will not give out the user's IP address or any other detail about the user, the network will see the request come from the anonymizer service. Objectives: This leads to a large range of potential risks from internal users accessing the filtered content or attacks from these proxies on the network. Method: We outline a system to detect the use of anonymizers via incoming connections. Conclusion: The data being used to determine the use of an anonymizer is the media access control (MAC) address, the IP address, the ports used, and destination address

Loading

Article metrics loading...

/content/journals/rptelec/10.2174/2215081106666170705093937
2017-04-01
2025-05-14
Loading full text...

Full text loading...

/content/journals/rptelec/10.2174/2215081106666170705093937
Loading

  • Article Type:
    Research Article
Keyword(s): Anonymous proxies; hacking; IP filtering; onion routing; security; tor
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test