TL29 INCYBER Unmasking proxies from a network fingerprint
Fraudsters use proxies to mask their true origins and make large-scale attacks harder to detect. While browser and device fingerprinting methods are well-known nowadays, this talk introduces an additional approach: fingerprinting proxies at the network level.
Different proxy types —datacenter, ISP, and residential/mobile — each maintain clean IP reputations in unique ways. By analyzing network attributes like Autonomous Systems (AS) and ISP associations over time, patterns emerge that expose proxy infrastructure. Insights from MaxMind, IP2Location, and similar tools reveal network-level signals that traditional detection methods miss.
Implementing this approach comes with challenges, including potential false positives from VPNs. This session examines the nuances of proxy behavior and explores how network-level intelligence enhances bot and fraud detection without inadvertently blocking legitimate users.
Allez à la source