Towards Detecting and Geolocalizing Web Scrapers with Round Trip Time Measurements

Elisa Chiapponi, Marc Dacier, Olivier Thonnard

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Residential IP Proxy (RESIP) providers represent a growing threat when used for web scraping and other malicious activities. RESIPs enable their customers to hide behind a vast network of residential IP addresses to perpetrate their actions. This helps the customers to evade detection. Thanks to two new large datasets of RESIP connections, we reveal new insights into RESIP inner functioning and modus operandi. We present the similarities and differences of the ecosystems associated with four RESIP providers (geographic distribution, types, management and amount of machines used). Moreover, we display how two of the providers have striking similarities and we propose a specific detection method to identify them. Furthermore, we show how to build a list of suspicious /24 blocks of IP addresses and use it to mitigate the actions of malicious parties behind RESIPs.
Original languageEnglish (US)
Title of host publication7th IFIP Network Traffic Measurement and Analysis Conference (TMA)
StatePublished - Jun 20 2023

Bibliographical note

KAUST Repository Item: Exported on 2023-06-21

Fingerprint

Dive into the research topics of 'Towards Detecting and Geolocalizing Web Scrapers with Round Trip Time Measurements'. Together they form a unique fingerprint.

Cite this