A Large-scale Analysis of Content Modification by Open HTTP Proxies

被引:13
|
作者
Tsirantonakis, Giorgos [1 ]
Ilia, Panagiotis [1 ]
Ioannidis, Sotiris [1 ]
Athanasopoulos, Elias [2 ]
Polychronakis, Michalis [3 ]
机构
[1] FORTH, Iraklion, Greece
[2] Univ Cyprus, Nicosia, Cyprus
[3] SUNY Stony Brook, Stony Brook, NY 11794 USA
基金
欧盟地平线“2020”;
关键词
D O I
10.14722/ndss.2018.23244
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Open HTTP proxies offer a quick and convenient solution for routing web traffic towards a destination. In contrast to more elaborate relaying systems, such as anonymity networks or VPN services, users can freely connect to an open HTTP proxy without the need to install any special software. Therefore, open HTTP proxies are an attractive option for bypassing IP-based filters and geo-location restrictions, circumventing content blocking and censorship, and in general, hiding the client's IP address when accessing a web server. Nevertheless, the consequences of routing traffic through an untrusted third party can be severe, while the operating incentives of the thousands of publicly available HTTP proxies are questionable. In this paper, we present the results of a large-scale analysis of open HTTP proxies, focusing on determining the extent to which user traffic is manipulated while being relayed. We have designed a methodology for detecting proxies that, instead of passively relaying traffic, actively modify the relayed content. Beyond simple detection, our framework is capable of macroscopically attributing certain traffic modifications at the network level to well-defined malicious actions, such as ad injection, user fingerprinting, and redirection to malware landing pages. We have applied our methodology on a large set of publicly available HTTP proxies, which we monitored for a period of two months, and identified that 38% of them perform some form of content modification. The majority of these proxies can be considered benign, as they do not perform any harmful content modification. However, 5.15% of the tested proxies were found to perform modification or injection that can be considered as malicious or unwanted. Specifically, 47% of the malicious proxies injected ads, 39% injected code for collecting user information that can be used for tracking and fingerprinting, and 12% attempted to redirect the user to pages that contain malware. Our study reveals the true incentives of many of the publicly available web proxies. Our findings raise several concerns, as we uncover multiple cases where users can be severely affected by connecting to an open proxy. As a step towards protecting users against unwanted content modification, we built a service that leverages our methodology to automatically collect and probe public proxies, and generates a list of safe proxies that do not perform any content modification, on a daily basis.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Energy content of large-scale turbulence in wide open channel flows
    Uijttewaal, Wim S. J.
    van Balen, Wim
    van Prooijen, Bram C.
    [J]. PROGRESS IN TURBULENCE II, 2007, 109 : 297 - +
  • [2] Large-scale personalized video streaming with program insertion proxies
    Brassil, J
    Kim, T
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2004, 42 (08) : 104 - 110
  • [3] Design of an Emulation Framework for Evaluating Large-Scale Open Content Aware Networks
    Latre, Steven
    Famaey, Jeroen
    Wauters, Tim
    Van Leekwijck, Werner
    De Turck, Filip
    [J]. 2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 804 - 807
  • [4] A Large-Scale Analysis of Pockets of Open Cells and Their Radiative Impact
    Watson-Parris, D.
    Sutherland, S. A.
    Christensen, M. W.
    Eastman, R.
    Stier, P.
    [J]. GEOPHYSICAL RESEARCH LETTERS, 2021, 48 (06)
  • [5] A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet
    Park, Jeman
    Jang, Rhongho
    Mohaisen, Manar
    Mohaisen, David
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (01) : 76 - 89
  • [6] Fine-Grained HTTP Web Traffic Analysis Based on Large-Scale Mobile Datasets
    Fang, Cheng
    Liu, Jun
    Lei, Zhenming
    [J]. IEEE ACCESS, 2016, 4 : 4364 - 4373
  • [7] Neither Good nor Bad: A Large-Scale Empirical Analysis of HTTP Security Response Headers
    Karopoulos, Georgios
    Geneiatakis, Dimitris
    Kambourakis, Georgios
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (TRUSTBUS 2021), 2021, 12927 : 83 - 95
  • [8] LARGE-SCALE PERTURBATIONS IN THE OPEN UNIVERSE
    LYTH, DH
    WOSZCZYNA, A
    [J]. PHYSICAL REVIEW D, 1995, 52 (06) : 3338 - 3357
  • [9] Learning optimization proxies for large-scale Security-Constrained Economic
    Chen, Wenbo
    Park, Seonho
    Tanneau, Mathieu
    Van Hentenryck, Pascal
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2022, 213