{"title":"跟踪Vpn/代理服务器背后的Ip地址","authors":"T. Nithesh Aravind, A. Mukundh, Vijayakumar R","doi":"10.1109/ICNWC57852.2023.10127335","DOIUrl":null,"url":null,"abstract":"Today, in the Internet world, the volume of Internet activity is constantly increasing, generating massive amounts of data. Data has become the most powerful commodity. Every employee’s need for security and privacy is increasing dramatically. More cybersecurity and data protection is needed. One way to prevent data loss and privacy violations is to use a virtual private network. It is very challenging to read or intercept traffic sent across an encrypted “tunnel” by a virtual private network (VPN). Due to insufficient security, public networks become ideal territory for hackers. As it is necessary to distinguish between legitimate users of the system and those attempting to circumvent it, security is one of the latest advances in computer science that has received the most attention. One of the common methods is IP spoofing, in which the hackers start the attack by faking the source IP; after this event has happened, they have the ability to attack without disclosing their precise location. Majority of the time, cybercriminals will use proxy services to carry out fraudulent activities while concealing their true IP address and physical location. In an effort to escape being located and arrested by police enforcement, this is done. This project’s only goal is to stop most attempts at fraudulent transactions. This method, as described in, employs a multi-tiered detection mechanism and finds several proxy connectivity approaches. The findings of the trials show that using proxies and VPNs to detect individuals who are collecting data potentially fraudulent actions, the proxy methodology enhances corporate security.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Tracing Ip Addresses Behind Vpn/Proxy Servers\",\"authors\":\"T. Nithesh Aravind, A. Mukundh, Vijayakumar R\",\"doi\":\"10.1109/ICNWC57852.2023.10127335\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today, in the Internet world, the volume of Internet activity is constantly increasing, generating massive amounts of data. Data has become the most powerful commodity. Every employee’s need for security and privacy is increasing dramatically. More cybersecurity and data protection is needed. One way to prevent data loss and privacy violations is to use a virtual private network. It is very challenging to read or intercept traffic sent across an encrypted “tunnel” by a virtual private network (VPN). Due to insufficient security, public networks become ideal territory for hackers. As it is necessary to distinguish between legitimate users of the system and those attempting to circumvent it, security is one of the latest advances in computer science that has received the most attention. One of the common methods is IP spoofing, in which the hackers start the attack by faking the source IP; after this event has happened, they have the ability to attack without disclosing their precise location. Majority of the time, cybercriminals will use proxy services to carry out fraudulent activities while concealing their true IP address and physical location. In an effort to escape being located and arrested by police enforcement, this is done. This project’s only goal is to stop most attempts at fraudulent transactions. This method, as described in, employs a multi-tiered detection mechanism and finds several proxy connectivity approaches. The findings of the trials show that using proxies and VPNs to detect individuals who are collecting data potentially fraudulent actions, the proxy methodology enhances corporate security.\",\"PeriodicalId\":197525,\"journal\":{\"name\":\"2023 International Conference on Networking and Communications (ICNWC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Networking and Communications (ICNWC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNWC57852.2023.10127335\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Networking and Communications (ICNWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNWC57852.2023.10127335","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Today, in the Internet world, the volume of Internet activity is constantly increasing, generating massive amounts of data. Data has become the most powerful commodity. Every employee’s need for security and privacy is increasing dramatically. More cybersecurity and data protection is needed. One way to prevent data loss and privacy violations is to use a virtual private network. It is very challenging to read or intercept traffic sent across an encrypted “tunnel” by a virtual private network (VPN). Due to insufficient security, public networks become ideal territory for hackers. As it is necessary to distinguish between legitimate users of the system and those attempting to circumvent it, security is one of the latest advances in computer science that has received the most attention. One of the common methods is IP spoofing, in which the hackers start the attack by faking the source IP; after this event has happened, they have the ability to attack without disclosing their precise location. Majority of the time, cybercriminals will use proxy services to carry out fraudulent activities while concealing their true IP address and physical location. In an effort to escape being located and arrested by police enforcement, this is done. This project’s only goal is to stop most attempts at fraudulent transactions. This method, as described in, employs a multi-tiered detection mechanism and finds several proxy connectivity approaches. The findings of the trials show that using proxies and VPNs to detect individuals who are collecting data potentially fraudulent actions, the proxy methodology enhances corporate security.