首页> 外文会议>IEEE Symposium on Security and Privacy >Resident Evil: Understanding Residential IP Proxy as a Dark Service
【24h】

Resident Evil: Understanding Residential IP Proxy as a Dark Service

机译:生化危机:将住宅IP代理理解为一项黑暗服务

获取原文

摘要

An emerging Internet business is residential proxy (RESIP) as a service, in which a provider utilizes the hosts within residential networks (in contrast to those running in a datacenter) to relay their customers' traffic, in an attempt to avoid server- side blocking and detection. With the prominent roles the services could play in the underground business world, little has been done to understand whether they are indeed involved in Cybercrimes and how they operate, due to the challenges in identifying their RESIPs, not to mention any in-depth analysis on them. In this paper, we report the first study on RESIPs, which sheds light on the behaviors and the ecosystem of these elusive gray services. Our research employed an infiltration framework, including our clients for RESIP services and the servers they visited, to detect 6 million RESIP IPs across 230+ countries and 52K+ ISPs. The observed addresses were analyzed and the hosts behind them were further fingerprinted using a new profiling system. Our effort led to several surprising findings about the RESIP services unknown before. Surprisingly, despite the providers' claim that the proxy hosts are willingly joined, many proxies run on likely compromised hosts including IoT devices. Through cross-matching the hosts we discovered and labeled PUP (potentially unwanted programs) logs provided by a leading IT company, we uncovered various illicit operations RESIP hosts performed, including illegal promotion, Fast fluxing, phishing, malware hosting, and others. We also reverse engi- neered RESIP services' internal infrastructures, uncovered their potential rebranding and reselling behaviors. Our research takes the first step toward understanding this new Internet service, contributing to the effective control of their security risks.
机译:新兴的互联网业务是住宅代理(RESIP)服务,服务提供商利用住宅网络中的主机(与运行在数据中心中的主机相反)来中继其客户的流量,以试图避免服务器端阻塞和检测。由于服务在地下商业世界中可以发挥的突出作用,由于在确定其RESIP方面存在挑战,因此几乎没有做过任何工作来了解它们是否确实参与了网络犯罪以及其运作方式,更不用说对其进行深入的分析了。他们。在本文中,我们报告了对RESIP的首次研究,该研究揭示了这些难以捉摸的灰色服务的行为和生态系统。我们的研究采用了一个渗透框架,包括我们的RESIP服务客户和他们所访问的服务器,来检测230多个国家和52K + ISP中的600万个RESIP IP。分析观察到的地址,并使用新的配置文件系统对位于其后的主机进行进一步的指纹识别。我们的努力导致了一些关于RESIP服务的未知的令人惊讶的发现。令人惊讶的是,尽管提供商声称代理主机是自愿加入的,但许多代理仍在包括物联网设备在内的可能受损的主机上运行。通过对主机进行交叉匹配,发现并标记了一家领先的IT公司提供的PUP(潜在有害程序)日志,我们发现RESIP主机执行了各种非法操作,包括非法推广,快速通量,网络钓鱼,恶意软件托管等。我们还逆转了工程化的RESIP服务的内部基础结构,发现了其潜在的品牌重塑和转售行为。我们的研究迈出了了解这种新Internet服务的第一步,有助于有效控制其安全风险。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号