Proxy traffic is an interesting one. Commonly referred to as the Tor network, Tor just happens to be the most common proxy network. Tor browsing works by bouncing users’ communications through a distributed network of relays all around the world, effectively anonimizing users’ traffic. While proxy networks have a very legitimate use for individuals with privacy concerns as it prevents third parties from surveilling their internet connection to gather data such as what sites they visit and their physical location, it of course has less legitimate uses as well. By routing traffic through an intermediary proxy device, the traffic is anonymized, making it difficult or impossible to assess its quality.
With only 1,050,000 machines using the networks on a daily basis in 2013, Tor represents an incredibly small fraction (0.011%) of the total number of machines connected to the internet. While this makes it a lower ranking threat on the fraud scale, the number of users doubled in size last year and is something to keep an eye on if usage continues to grow.
Next up: Domain Bait & Switch
Read more from our Fraud Series:
- Fraud Series Part 1: The Irresistible Allure of Ad Dollars
- Fraud Series Part 2: Hidden Ads
- Fraud Series Part 3: Botnets & Hijacked Devices
- Fraud Series Part 4: Proxy Traffic
- Fraud Series Part 5: Domain Bait & Switch
- Fraud Series Part 6: Q&A with DoubleVerify, the Leading Industry Performance Innovator
- Fraud Series Part 7: Q&A with DoubleVerify, Top Trends & Recommendations
Leah White, Senior Manager, Product Marketing