+ All Categories
Home > Documents > Insecured Proxies in Internet Abuse

Insecured Proxies in Internet Abuse

Date post: 06-Jan-2016
Category:
Upload: nida
View: 20 times
Download: 0 times
Share this document with a friend
Description:
Insecured Proxies in Internet Abuse. Eur Ing Brian Tompsett Department of Computer Science University of Hull [email protected]. Analysis of Proxy Abuse. Web Server since 93/94 Large popular content (genealogy) 1-2M clicks month Same IP/domain 1999 saw first proxy requests - PowerPoint PPT Presentation
29
Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull [email protected] Busan, Korea
Transcript
Page 1: Insecured Proxies in  Internet Abuse

Insecured Proxies in Internet Abuse

Eur Ing Brian TompsettDepartment of Computer Science

University of [email protected]

Busan, Korea

Page 2: Insecured Proxies in  Internet Abuse

2

Analysis of Proxy Abuse

• Web Server since 93/94

• Large popular content (genealogy)

• 1-2M clicks month

• Same IP/domain

• 1999 saw first proxy requests

• Allowed a few, experimentally

Busan, Korea

Page 3: Insecured Proxies in  Internet Abuse

3

Proxy Server?

• Web Server – Port 80

• Not a proxy

• Scanned for Proxy ability

• Pages/robots indicated not open

• Added to lists of “open” servers

Busan, Korea

Page 4: Insecured Proxies in  Internet Abuse

4

Level of Intrusions?

• Measured general Intrusion– 100’s a day per machine– Machine compromise risk high

• Analysed bulk email– 1000s month since 1996– Open proxies main vehicle

Busan, Korea

Page 5: Insecured Proxies in  Internet Abuse

5

Origins of Proxy Abuse

• 1st Austrian Universities

• Russian/Ukrainian Origin

• CZ, CN, EDU.CA, IL– Russian Speakers

• Proxy Abuse Software in Russian found

Busan, Korea

Page 6: Insecured Proxies in  Internet Abuse

6

General Problem of Proxies

• Denial of Service– Tracking and Complaining– Scripts to assist log extracting

• Others noticed– APAN-JP Proxy Abuse Campaign

Busan, Korea

Page 7: Insecured Proxies in  Internet Abuse

7

The Proxy Abusers

• Initially Adult Oriented

• Hotel/Travel material

• Avoid local censorship/blocking– Education site seems inoffensive

• ISP load sharing

• Researchers cache timing experiments

Busan, Korea

Page 8: Insecured Proxies in  Internet Abuse

8

Counter Fraud

• Manipulate Click Counters

• Improving Ranking

• Polls, Talent Contest, TV Votes

• Make minority interests appear normal

Busan, Korea

Page 9: Insecured Proxies in  Internet Abuse

9

Pay-per-Click

• Web pages full of adverts

• Adverts Clicked Mechanically

• Advert Revenue Collected

• Organised Crime– Clicking Clubs– Software Promoted & Available

Busan, Korea

Page 10: Insecured Proxies in  Internet Abuse

10

The Advertisers

• Unaware of Fraud

• No expertise to control

• Disbelieving

• Minority aware and capable

• Many Bankrupted

• E-commerce growth harmed

Busan, Korea

Page 11: Insecured Proxies in  Internet Abuse

11

What is a Proxy?

• Application Gateway

• Carry Traffic for third parties– http proxy– Socks Proxy– NAT– Firewalls– SMTP– AnalogX, WinGate, Squid

Busan, Korea

Page 12: Insecured Proxies in  Internet Abuse

12

Proxy Trends

• Make the Unacceptable Acceptable– Counter Manipulation

• DSL connected proxies

• World Growth in Broadband– Political Prominence– Technical Naivety– Commercial Imperatives

Busan, Korea

Page 13: Insecured Proxies in  Internet Abuse

13

Proxy Implantation

• Worm delivers viral Proxy– Sobig

• Web server Implantation– Pornographic distribution

• Problem for Forensics– Criminals can claim virus caused it– Forensic Examination needs more rigour– ISP hindering public protection

Busan, Korea

Page 14: Insecured Proxies in  Internet Abuse

14

SuperZonda

• Latest proxy use• Done by DNS control with open proxy• Method:

www.doubtful-domain.zz– Web browser fetches page– DNS lookup => open proxy– Open proxy fetches page– DNS lookup return true IP– Can be layered

Busan, Korea

Page 15: Insecured Proxies in  Internet Abuse

15

Why?

• Obscures True Page Location

• Makes Organisation Appear Large

• Improves apparent responsiveness– Millions of effective web servers

• Enhances reputation of advertiser

• Diverts Complaints

Busan, Korea

Page 16: Insecured Proxies in  Internet Abuse

16

Why Worry?

• Paedophile Material

• Appear to be hosted at schools

• Fulfils their fantasy

• Combined with AnalogX at Korean Schools

• Damaged Reputation

• Needs Local Action – Lobby Admins & Politicians

Busan, Korea

Page 17: Insecured Proxies in  Internet Abuse

17

Further Hiding

• Bogons– Traffic from non-existent IP blocks– Identified by CIDR-report.org

• Zombies– Dormant IP block taken over by fraud– Documentation is forged

• Hides origins of Proxy Abusers

• Traceroute fooling Busan, Korea

Page 18: Insecured Proxies in  Internet Abuse

18

Regional Perspectives

• Korean Schools

• Japan– formerly free of proxies– Now broadband expansion

• Many proxies – worrying

• Malaysia, broadband proxies

• Thailand – educational proxies

• China – registration data & Language Busan, Korea

Page 19: Insecured Proxies in  Internet Abuse

19

Dirty Money

• Overseas Currency– Powerful draw– Naivety regarding issues– Causes Internet Routing Sanctions

Busan, Korea

Page 20: Insecured Proxies in  Internet Abuse

20

Solving The Problem

• Too many proposals – Too a narrow perspective– Vested Interests – hope to profit– Vendors only looking at their part

• Need holistic approach to abuse– Across applications– All Layers of protocol

Busan, Korea

Page 21: Insecured Proxies in  Internet Abuse

21

Layered Defence

• Protection at all Levels of Network Model

• Action by end users at application layer– Not fully protected– Need action at lower layers

Busan, Korea

Page 22: Insecured Proxies in  Internet Abuse

22

Physical/Datalink

• Secure Physical Access– Plug in cables– Wireless range

• Control Access by medium

• Control Access by Authorization– No free rides– Particularly important in wireless

Busan, Korea

Page 23: Insecured Proxies in  Internet Abuse

23

Network (IP) Layer

• Some IP not routed– RFC1918– Bogons– Zombies– Own policy based restrictions

• Manage this database

Busan, Korea

Page 24: Insecured Proxies in  Internet Abuse

24

Transport (TCP/UDP) Layer

• Only route to provided services– Restrict port 25 through mailhubs– Restrict port 80 to web servers– No incoming port 23

• Restrict dialups (in and out)

• Local Policy based restrictions– Manage this database

• Protects from worm propagation Busan, Korea

Page 25: Insecured Proxies in  Internet Abuse

25

Application Level

• Enforce Protocols/Handshaking

• Filter for application targetting– Web pages (e.g. browser attacks)– Email (e.g. browser attacks)– Viral content

• Checksumming (DCC)

• Content Filters (Bayesian)

• Local & User filters Busan, Korea

Page 26: Insecured Proxies in  Internet Abuse

26

The Layers

Transport

Network

Datalink

Physical

Application User Filter; Baysian; DCC; Format; Handshake;RFC-Ignorant

Service PolicyRFC-ignorant

Policy; Zombie;Bogons; RFC1918

Authorised

Connection -Medium

Busan, Korea

Page 27: Insecured Proxies in  Internet Abuse

27

Managing Layered Prevention

• Not a Single Point Solution– Distributed Responsibility– Network Managers– Customer Service– Clients

• No unmanaged Broadband

• Managed Software Install– Child Protection enabled

Busan, Korea

Page 28: Insecured Proxies in  Internet Abuse

28

Role of the Regulator

• Legislators are confused

• Abuse is immune to Legislation

• Regulators need to enforce best practice– Managed Broadband– Track Best Practice

• Regulate Registrars– More resources, better data

Busan, Korea

Page 29: Insecured Proxies in  Internet Abuse

29

Conclusions

• National Interest to Regulate Registrar– Provide Resources– Operate as Internet Licensees– Identity Proved

• Internet Product Safety Regulation

• Regulate Network Best Practise– To protect the consumer

Busan, Korea


Recommended