An Extensive Study of Residential Proxies in China

by   Mingshuo Yang, et al.

We carry out the first in-depth characterization of residential proxies (RESIPs) in China, for which little is studied in previous works. Our study is made possible through a semantic-based classifier to automatically capture RESIP services. In addition to the classifier, new techniques have also been identified to capture RESIPs without interacting with and relaying traffic through RESIP services, which can significantly lower the cost and thus allow a continuous monitoring of RESIPs. Our RESIP service classifier has achieved a good performance with a recall of 99.7 cross validation. Applying the classifier has identified 399 RESIP services, a much larger set compared to 38 RESIP services collected in all previous works. Our effort of RESIP capturing lead to a collection of 9,077,278 RESIP IPs (51.36 available RESIP datasets. An extensive measurement on RESIPs and their services has uncovered a set of interesting findings as well as several security implications. Especially, 80.05 least one malicious traffic flows during 2021, resulting in 52-million malicious traffic flows in total. And RESIPs have also been observed in corporation networks of 559 sensitive organizations including government agencies, education institutions and enterprises. Also, 3,232,698 China RESIP IPs have opened at least one TCP/UDP ports for accepting relaying requests, which incurs non-negligible security risks to the local network of RESIPs. Besides, 91 China RESIP services show up a crest-trough pattern in terms of the daily active RESIPs across time.


page 1

page 2

page 3

page 4


A [in]Segurança dos Sistemas Governamentais Brasileiros: Um Estudo de Caso em Sistemas Web e Redes Abertas

Whereas the world relies on computer systems for providing public servic...

Early Identification of Services in HTTPS Traffic

Traffic monitoring is essential for network management tasks that ensure...

CHOKeD: A Fair Active Queue Management System

Fairness is the significant factor to sustain best effort delivery of ne...

Factors influencing risk acceptance of Cloud Computing services in the UK Government

Cloud Computing services are increasingly being made available by the UK...

DANTE: A framework for mining and monitoring darknet traffic

Trillions of network packets are sent over the Internet to destinations ...

Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming

As an emerging service for in-browser content delivery, peer-assisted de...

Gotta CAPTCHA 'Em All: A Survey of Twenty years of the Human-or-Computer Dilemma

A recent study has found that malicious bots generated nearly a quarter ...

Please sign up or login with your details

Forgot password? Click here to reset