Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies
Emerging in recent years, residential proxies (RESIPs) feature multiple unique characteristics when compared with traditional network proxies (e.g., commercial VPNs), particularly, the deployment in residential networks rather than data center networks, the worldwide distribution in tens of thousand...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Emerging in recent years, residential proxies (RESIPs) feature multiple
unique characteristics when compared with traditional network proxies (e.g.,
commercial VPNs), particularly, the deployment in residential networks rather
than data center networks, the worldwide distribution in tens of thousands of
cities and ISPs, and the large scale of millions of exit nodes. All these
factors allow RESIP users to effectively masquerade their traffic flows as ones
from authentic residential users, which leads to the increasing adoption of
RESIP services, especially in malicious online activities. However, regarding
the (malicious) usage of RESIPs (i.e., what traffic is relayed by RESIPs),
current understanding turns out to be insufficient. Particularly, previous
works on RESIP traffic studied only the maliciousness of web traffic
destinations and the suspicious patterns of visiting popular websites. Also, a
general methodology is missing regarding capturing large-scale RESIP traffic
and analyzing RESIP traffic for security risks. Furthermore, considering many
RESIP nodes are found to be located in corporate networks and are deployed
without proper authorization from device owners or network administrators, it
is becoming increasingly necessary to detect and block RESIP traffic flows,
which unfortunately is impeded by the scarcity of realistic RESIP traffic
datasets and effective detection methodologies.
To fill in these gaps, multiple novel tools have been designed and
implemented in this study, which include a general framework to deploy RESIP
nodes and collect RESIP traffic in a distributed manner, a RESIP traffic
analyzer to efficiently process RESIP traffic logs and surface out suspicious
traffic flows, and multiple machine learning based RESIP traffic classifiers to
timely and accurately detect whether a given traffic flow is RESIP traffic or
not. |
---|---|
DOI: | 10.48550/arxiv.2404.10610 |