An Extensive Study of Residential Proxies in China

Author:

Yang Mingshuo1,Yu Yunnan2,Mi Xianghang3,Tang Shujun4,Guo Shanqing5,Li Yilin1,Zheng Xiaofeng6,Duan Haixin6

Affiliation:

1. Shandong University, Jinan, China

2. University at Buffalo, Buffalo, NY, USA

3. University of Science and Technology of China, Beijing, China

4. QI-ANXIN Technology Research Institute, Beijing, China

5. Shandong University & Quancheng Laboratory, Jinan, China

6. Tsinghua University & QI-ANXIN Technology Research Institute, Beijing, China

Publisher

ACM

Reference53 articles.

1. Mozi , another botnet using dht. https://blog.netlab.360.com/mozi-another-botnet-using-dht/ , 2019 . Mozi, another botnet using dht. https://blog.netlab.360.com/mozi-another-botnet-using-dht/, 2019.

2. A multifaceted approach to understanding the botnet phenomenon

3. Manos Antonakakis , Tim April , Michael Bailey , Matt Bernhard , Elie Bursztein , Jaime Cochran , Zakir Durumeric , J Alex Halderman , Luca Invernizzi , Michalis Kallitsis , Understanding the mirai botnet . In 26th {USENIX} security sym- posium ({USENIX} Security 17) , pages 1093 -- 1110 , 2017 . Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, Michalis Kallitsis, et al. Understanding the mirai botnet. In 26th {USENIX} security sym- posium ({USENIX} Security 17), pages 1093--1110, 2017.

4. David Atch Atch , Gil Regev , and Ross Bevington . How to proactively defend against mozi iot botnet. https://www.microsoft.com/security/blog/2021/08/19/ how-to-proactively-defend-against-mozi-iot-botnet/ , 2021 . David Atch Atch, Gil Regev, and Ross Bevington. How to proactively defend against mozi iot botnet. https://www.microsoft.com/security/blog/2021/08/19/ how-to-proactively-defend-against-mozi-iot-botnet/, 2021.

5. Leyla Bilge , Engin Kirda , Christopher Kruegel , and Marco Balduzzi . Exposure : Finding malicious domains using passive dns analysis . In Ndss , pages 1 -- 17 , 2011 . Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi. Exposure: Finding malicious domains using passive dns analysis. In Ndss, pages 1--17, 2011.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Silent Observers Make a Difference: A Large-scale Analysis of Transparent Proxies on the Internet;IEEE INFOCOM 2024 - IEEE Conference on Computer Communications;2024-05-20

2. Inside Residential IP Proxies: Lessons Learned from Large Measurement Campaigns;2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2023-07

3. Towards Detecting and Geolocalizing Web Scrapers with Round Trip Time Measurements;2023 7th Network Traffic Measurement and Analysis Conference (TMA);2023-06-26

4. BADPASS: Bots Taking ADvantage of Proxy as a Service;Information Security Practice and Experience;2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3