【24h】

Exploring proxy detection methodology

机译:探索代理检测方法

获取原文
获取原文并翻译 | 示例

摘要

Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such technology into a business solution with the sole purpose of eliminating the majority of fraudulent transaction attempts. The approach, described in this paper identifies multiple proxy connectivity methods, and implements a multi-tiered detection technique. The result of the experiments demonstrates that the proxy methodology improves business security by identifying users who are utilizing proxies and to collect data that prevents potentially fraudulent activities.
机译:在大多数情况下,网络犯罪分子会使用代理服务进行欺诈性交易,这些服务会隐藏其真实IP地址和实际位置。这样做是为了避免被执法机构跟踪和起诉。本文介绍了代理检测方法的研究,以及旨在将这种技术实施到业务解决方案中的努力,其唯一目的是消除大多数欺诈性交易企图。本文中描述的方法可识别多种代理连接方法,并实现多层检测技术。实验结果表明,代理方法可通过识别正在使用代理的用户并收集防止潜在欺诈活动的数据来提高业务安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号