Annual Computer Security Applications Conference (ACSAC) 2018

Full Program »

An Extensive Evaluation of the Internet's Open Proxies

Open proxies forward traffic on behalf of any Internet user. Listed on open proxy aggregator sites, they are often used to bypass geographic region restrictions or circumvent censorship. Open proxies sometimes also provide a weak form of anonymity by concealing the requestor's IP address.

To better understand their behavior and performance, we conducted a comprehensive study of open proxies, encompassing more than 107,000 listed open proxies and 13M proxy requests over a 50 day period. While previous work has shown that open proxies sometimes manipulate HTML content in order to insert or modify ads, we provide a more broad study that examines the breadth of proxy (mis)behaviors.

Our results show that listed open proxies suffer poor availability--more than 92% of open proxies that appear on aggregator sites are unresponsive to proxy requests. Much more troubling, we find numerous examples of malicious open proxies in which HTML content is manipulated to mine cryptocurrency (that is, cryptojacking). We additionally detect TLS man-in-the-middle (MitM) attacks, and discover numerous instances in which binaries fetched through proxies were modified to include remote access trojans and other forms of malware.

As a point of comparison, we conduct and discuss a similar measurement study of the behavior of Tor exit relays. We find no instances in which Tor relays performed TLS MitM or manipulated content, suggesting that Tor offers a far more reliable and safe form of proxied communication.

Akshaya Mani
Georgetown University
United States

Tavish Vaidya
Georgetown University
United States

David Dworken
Northeastern University
United States

Micah Sherr
Georgetown University
United States

 



Powered by OpenConf®
Copyright©2002-2018 Zakon Group LLC