Tracing IP Address behind VPN/Proxy Servers

      

ABSTARCT :

Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such technology into a business solution with the sole purpose of eliminating the majority of fraudulent transaction attempts. The approach, described in identifies multiple proxy connectivity methods, and implements a multi-tiered detection technique. The result of the experiments demonstrates that the proxy methodology improves business security by identifying users who are utilizing proxies and to collect data that prevents potentially fraudulent activities.

EXISTING SYSTEM :

? A proxy connection can be configured as a new network device, and bridged to the existing network adapter to send packets through a designated server. ? All business operations that are conducted through existing solutions need to be modularized in such a way that the ordering process is clearly visible and can be altered to include the proxy detection module. ? One of the features we would like to develop in future is the ability to encompass various data analysis techniques, which should improve the existing proxy detection methods.

DISADVANTAGE :

? To be developed is seamless integration to any existing systems, where the module can be attached or removed from the system without impacting the overall quality and functionality of business operations. ? If all these devices try to access video resources, chances are high that the same video file will be downloaded multiple times over the Internet, resulting in wasted bandwidth, which could impact both origin server and the local network. ? To develop these features the cache services layer of the CMS requires a module that implements this part of the UPnP specification.

PROPOSED SYSTEM :

• This proposed proxy detection methodology checks for cyber criminals who access the website and/or web application for the possibility of proxy usage and perform necessary action before cyber criminals carry out fraudulent activities. • We also propose a novel technique of capturing a search request sent to a search engine through the proxy and modifying the search engine result by inserting local search results that came from tag based search. • We propose to implement a UPnP module to make the cached audio and video content available for UPnP devices.

ADVANTAGE :

• This proposed proxy detection methodology checks for cyber criminals who access the website and/or web application for the possibility of proxy usage and perform necessary action before cyber criminals carry out fraudulent activities. • We also propose a novel technique of capturing a search request sent to a search engine through the proxy and modifying the search engine result by inserting local search results that came from tag based search. • We propose to implement a UPnP module to make the cached audio and video content available for UPnP devices.

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp