ADVANCED FRAUD TOOLS TRIGGERED RULES



Similar documents
Top 9 Fraud Attacks and Winning. Mitigating Strategies. Carl Tucker. Tom Donlea Managing Director of Americas Merchant Risk Council

Online Payment Fraud. IP Intelligence is one of the top five techniques used to detect and prevent online fraud

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Fraud Network Whitepaper

Smart Device Identification for Cloud-Based Fraud Prevention. Alisdair Faulkner Chief Products Officer

Device Fingerprinting and Fraud Protection Whitepaper

Combating Cybercrime A Collective Global Response

Fraud Detection & Mitigation Strategies

Five Trends to Track in E-Commerce Fraud

WHITE PAPER Moving Beyond the FFIEC Guidelines

Web Tracking for You. Gregory Fleischer

More Details About Your Spam Digest & Dashboard

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Digital Fingerprinting in Market and Survey Research. CASRO Panel Conference Duane Berlin Peter Milla

ONLINE FRAUD MANAGEMENT BENCHMARKS

WHITEPAPER. OFAC Compliance. Best Practices in Knowing Where and With Whom You Are Conducting Business

ACCEPT MORE ORDERS, FROM MORE PEOPLE, IN MORE PLACES.

Closing the Biggest Security Hole in Web Application Delivery

10 Things Every Web Application Firewall Should Provide Share this ebook

WHITE PAPER. Internet Gambling Sites. Expose Fraud Rings and Stop Repeat Offenders with Device Reputation

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

1 4 & 6. Merchant Web Page

Remote Desktop Administration

Security Intelligence Blacklisting

Risk Management Service Guide. Version 4.2 August 2013 Business Gateway

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

FILTERING FAQ

Central Desktop Enterprise Edition (Security Pack)

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

Fighting Online Fraud

ThreatMetrix Cybercrime Report: Q1 2015

Host Fingerprinting and Tracking on the Web: Privacy and Security Implications

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

Understanding and Combating Online Fraud in 2014

Frontline Report: Online Fraud Prevention

Configuring Single Sign-on for WebVPN

Fraud Detection Module (basic)

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist

TrustDefender Mobile Technical Brief

WHITEPAPER. Combating Cybercrime A Collective Global Response

WHITEPAPER. Real Time Trust Analytics Next Generation Cybercrime Protection

Change Advanced Proxy Server Configuration Settings

eprism Security Suite

Startup guide for Zimonitor

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

Protect Your Business and Customers from Online Fraud

Webmail Using the Hush Encryption Engine


Setting Up Scan to SMB on TaskALFA series MFP s.

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

BT Managed Fraud Reduction. Confidence in online business from stronger identity assurance

Vidder PrecisionAccess

WHITE PAPER. VeriSign Identity Protection Fraud Detection Service An Overview

How Retailers Can Automate the Screening Process for Online Fraud While Preserving the Customer Shopping Experience

Let s talk about assets in QRadar

SANS Top 20 Critical Controls for Effective Cyber Defense

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Obfuscation for and against device fingerprinting Position Paper for Symposium on Obfuscation New York University, February 15, 2014

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Supplement to Authentication in an Internet Banking Environment

VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure)

Web Application Firewalls: What the vendors do NOT want you to know SHAKACON III

WHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation

Designing and Implementing a Server Infrastructure

How To Protect Your Online Banking From Fraud

FitCause Privacy Policy

Using RADIUS Agent for Transparent User Identification

FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper

Versafe TotALL Online Fraud Protection

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

Creating smarter fish by customizing the pond What application developers can do to stop phishing

Student QUICK START GUIDE. System Requirements. Browser Settings. Configure the following settings in your Web browser:

Fraud Prevention Tips

Assets, Groups & Networks

Layered security in authentication. An effective defense against Phishing and Pharming

Holiday Fraud Myths. How They Leave Retailers Vulnerable

EMC VoyenceControl Integration Module. BMC Atrium Configuration Management Data Base (CMDB) Guide. version P/N REV A01

COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

fraud prevention solutions tougher on fraudsters, simpler for you DOCUMENT D EXECUTION INGENICO_PAYMENT_CMJN.ai

TUT8173 Best Practices for Security Monitoring in Distributed Environments November 2014

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

eprism Security Suite

ECOMMERCE AND MERCHANT FRAUD PREVENTION

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications

CHAPTER 2: CASE STUDY SPEAR-PHISHING CAMPAIGN GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Security Analytics Engine 1.0. Help Desk User Guide

RSA Adaptive Authentication For ecommerce

Perspectives on retail payments fraud

Privacy Policy. About Us and Our Purpose. Your Privacy is Our Mission

Risk Based Authentication and AM 8. What you need to know!

Introduction to Computer Security Benoit Donnet Academic Year

Finance and Accounting outsourcing e-commerce solutions. Financial Solutions

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

WordPress Security Scan Configuration

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Blackbaud Merchant Services Web Portal Guide

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

Transcription:

ADVANCED FRAUD TOOLS TRIGGERED RULES This document provides definitions of the triggered rules returned in the Advanced Fraud Results (advancedfraudresults element) section of the response message (see Example below). ThreatMetrix uses the rules triggered by each advanced fraud check to determine the device reputation score, which in turn determines the final review status: Pass, Review, or Fail. NOTE: The rules/descriptions in this document reflect those used in the generic merchant policy. Depending upon the policy configured in your merchant profile, some rules may not apply to you, or additional rules, not defined here, may appear in your results. Example: advancedfraudresults Structure <advancedfraudresults> <devicereviewstatus>pass, fail, review, etc.</devicereviewstatus> <devicereputationscore>score Returned from ThreatMetrix</deviceReputationScore> <triggeredrule>triggered Rule #1</triggeredRule>... <triggeredrule>triggered Rule #N</triggeredRule> </advancedfraudresults> 10PaymentsOnDeviceLocalDay 10PaymentsOnFuzzyDeviceLocalDay This device has submitted 10 or more payments in the previous 24 hours. This is atypical and may be an indicator of This device appears to have submitted 10 or more payments in the previous 24 hours. This is atypical and may be an indicator of Document Version: 1.5 1

10PaymentsOnTrueIPLocalDay 10PaymentsWithEmailAddressLocalDay 100PaymentsOnDeviceLocalMonth 100PaymentsOnFuzzyDeviceLocalMonth 100PaymentsOnTrueIPLocalMonth 2ScreenResolutionsPerDeviceGlobalDay 20PaymentsOnDeviceLocalDay 20PaymentsOnFuzzyDeviceLocalDay 20PaymentsOnTrueIPLocalDay 3CustomerIDsPerDeviceLocalDay 3CustomerIDsPerDeviceLocalWeek 3DevicesPerCustomerIDLocalDay This True IP has submitted 10 or more payments in the previous day. This is atypical and may be an indicator of This email address has submitted 10 or more payments in the previous day. This is atypical and may be an indicator of This device has submitted 100 or more payments in the previous month. This is atypical and may be an indicator of This device appears to have submitted 100 or more payments in the previous month. This is atypical and may be an indicator of This True IP has submitted 100 or more payments in the previous month. This is atypical and may be an indicator of This device has used 2 or more screen resolutions in the past day. This is atypical and may indicate This device has submitted 20 or more payments in the previous 24 hours. This is atypical and may be an indicator of This device appears to have submitted 20 or more payments in the previous 24 hours. This is atypical and may be an indicator of This True IP has submitted 20 or more payments in the previous day. This is atypical and may be an indicator of This device has submitted transactions using 3 or more distinct customer IDs in the previous 24 hours. This is abnormal and may be an indicator of a card-testing attack or free-trial abuse. This device has submitted transactions using 3 or more distinct customer IDs in the previous 7 days. This is abnormal and may be an indicator of a card-testing attack or free-trial abuse. Three or more devices have been used to submit transactions with this customer ID in the previous 24 hours. This may be an indicator of 2 Document Version: 1.5

3DevicesPerCustomerIDLocalWeek 3DevicesPerEmailGlobalDay 3DevicesPerEmailGlobalWeek 3DevicesPerPaymentCardGlobalDay 3DevicesPerPaymentCardGlobalWeek 3EmailsPerDeviceGlobalDay 3EmailsPerDeviceGlobalWeek 3EmailsPerFuzzyDeviceLocalHour 3PaymentCardsPerDeviceGlobalDay 3PaymentCardsPerDeviceGlobalWeek 3ProxiesPerDeviceGlobalDay Three or more devices have been used to submit transactions with this customer ID in the previous 7 days. This may be an indicator of Three or more devices have been used to submit transactions with this email address in the previous 24 hours. This may be an indicator of Three or more devices have been used to submit transactions with this email address in the previous 7 days. This may be an indicator of Three or more devices have been used to submit transactions with this payment card in the previous 24 hours. This may be an indicator of Three or more devices have been used to submit transactions with this payment card in the previous 7 days. This may be an indicator of This device has submitted transactions using 3 or more distinct email addresses in the previous 24 hours. This is abnormal and may be an indicator of a card-testing attack or free-trial abuse. This device has submitted transactions using 3 or more distinct email addresses in the previous 7 days. This is abnormal and may be an indicator of a card-testing attack or free-trial abuse. This device appears to have submitted transactions using 3 or more distinct email addresses in the previous 60 minutes. This is abnormal and may be an indicator of a card-testing attack or free-trial abuse. This device has submitted transactions using 3 or more distinct payment cards in the previous 24 hours. This is abnormal and may be an indicator of a card-testing attack or free-trial abuse. This device has submitted transactions using 3 or more distinct payment cards in the previous 7 days. This is abnormal and may be an indicator of a card-testing attack or free-trial abuse. This device submitted transactions through 3 or more distinct IP proxies in the previous 24 hours. This is atypical and may be an indicator of Document Version: 1.5 3

4ScreenResolutionsPerDeviceGlobalDay 5PaymentsOnDeviceLocalDay 5PaymentsOnFuzzyDeviceLocalDay 5PaymentsOnTrueIPLocalDay 5PaymentsWithEmailAddressLocalHour 50PaymentsOnDeviceLocalWeek 50PaymentsOnFuzzyDeviceLocalWeek 50PaymentsOnTrueIPLocalWeek AnonymousProxy AnonymousProxyIP ComputerGeneratedEmail CookiesDisabled This device has used 4 or more screen resolutions in the past day. This is atypical and may indicate This device has submitted 5 or more payments in the previous 24 hours. This is atypical and may be an indicator of This device appears to have submitted 5 or more payments in the previous 24 hours. This is atypical and may be an indicator of This True IP has submitted 5 or more payments in the previous day. This is atypical and may be an indicator of This email address has submitted 5 or more payments in the previous hour. This is atypical and may be an indicator of This device has submitted 50 or more payments in the previous week. This is atypical and may be an indicator of This device appears to have submitted 50 or more payments in the previous week. This is atypical and may be an indicator of This True IP has submitted 50 or more payments in the previous week. This is atypical and may be an indicator of This transaction was submitted through an anonymous web proxy, a method that is sometimes employed when trying to cloak one's identity. This transaction was submitted through an anonymous proxy IP Address, a method that is sometimes employed when trying to cloak one's identity. This email address may have been automatically generated by a computer. Fraudsters frequently employ automated bots that create email addresses programmatically to enable their fraud attacks. disabled cookies. This is common to fraud attacks and may be an indicator of 4 Document Version: 1.5

CookiesJavascriptDisabled CustomAttribute1OnLocalBlacklist CustomAttribute1OnLocalWhitelist CustomAttribute2OnLocalBlacklist CustomAttribute2OnLocalWhitelist CustomAttribute3OnLocalBlacklist CustomAttribute3OnLocalWhitelist CustomAttribute4OnLocalBlacklist CustomAttribute4OnLocalWhitelist CustomAttribute5OnLocalBlacklist CustomAttribute5OnLocalWhitelist CustomerIDOnLocalBlacklist CustomerIDOnLocalWhitelist CustomerNameOnLocalBlacklist CustomerNameOnLocalWhitelist DeviceNotFingerprinted disabled cookies and JavaScript. This is common to fraud attacks and may be an indicator of Custom attribute 1 for this transaction is on Vantiv's Custom attribute 1 for this transaction is on Vantiv's Custom attribute 2 for this transaction is on Vantiv's Custom attribute 2 for this transaction is on Vantiv's Custom attribute 3 for this transaction is on Vantiv's Custom attribute 3 for this transaction is on Vantiv's Custom attribute 4 for this transaction is on Vantiv's Custom attribute 4 for this transaction is on Vantiv's Custom attribute 5 for this transaction is on Vantiv's Custom attribute 5 for this transaction is on Vantiv's The customer ID for this transaction is on Vantiv's The customer ID for this transaction is on Vantiv's The customer name for this transaction is on Vantiv's The customer name for this transaction is on Vantiv's ThreatMetrix could not fingerprint the originating device. This is atypical and may indicate a deliberate attempt by the user to cloak his or her identity. Document Version: 1.5 5

DeviceIDOnThreatMetrixGlobalBlacklist DeviceRejectedByNetworkInLastWeek DeviceOnLocalBlacklist DeviceOnLocalWhitelist DeviceOnThreatMetrixGlobalBlacklist DeviceCountriesNotAllowed EmailDistanceTraveled EmailHostnameTooLong EmailHostnameWithNonLetters EmailOnLocalBlacklist EmailOnLocalWhitelist EmailUsernameTooLong The originating device is on the ThreatMetrix global blacklist. The originating device has been rejected by one of ThreatMetrix's customers and/or partners in the last week on the suspicion of fraud. The originating device is on Vantiv's The originating device is on Vantiv's The originating device is on the ThreatMetrix global blacklist. This transaction originated from an IP address located in a country on Vantiv's This email address has been associated with transactions originating from locations at least 1,000 miles apart in the last hour. This is a red flag and warrants caution. The hostname portion (i.e. to the right of "@") of this email address exceeds 30 characters. Email addresses associated with suspicious domain names are often used as part of attacks. Overly long hostnames are a common marker of such domains. The hostname portion (i.e. to the right of "@") of this email address contains non-letter characters (e.g. numbers and special characters). Email addresses associated with suspicious domain names are often used as part of attacks. Hostnames with non-letter characters are a common marker of such domains. The customer email address for this transaction is on Vantiv's The customer email address for this transaction is on Vantiv's The name portion (i.e. to the left of "@") of this email address contains non-letter characters (e.g. numbers and special characters). Email addresses associated with suspicious usernames are often used as part of attacks. Usernames with non-letter characters are a common marker of such domains. 6 Document Version: 1.5

EmailUsernameWithNonLetters EmailOnThreatMetrixGlobalBlacklist EmailRejectedByNetworkInLastWeek FlashBrowserLanguageMismatch FlashCookesJavascriptDisabled FlashCookiesDisabled FlashDisabled FlashImagesCookiesDisabled FlashImagesCookiesJavascriptDisabled FlashImagesDisabled The name portion (i.e. to the left of "@") of this email address contains non-letter characters (e.g. numbers and special characters). Email addresses associated with suspicious usernames are often used as part of attacks. Usernames with non-letter characters are a common marker of such domains. This email address is on the ThreatMetrix global blacklist. A transaction using this email address has been rejected by one of ThreatMetrix's customers and/or partners in the last week on the suspicion of fraud. The language used by the web browser used to submit this transaction does not match the language used by the Flash plug-in. This is atypical and may be an indicator of disabled Flash objects, cookies, and JavaScript. This is common to fraud attacks and may be an indicator of disabled Flash objects and cookies. This is common to fraud attacks and may be an indicator of disabled Flash objects. This is common to fraud attacks and may be an indicator of disabled Flash objects, images, and cookies. This is common to fraud attacks and may be an indicator of disabled Flash objects, images, cookies, and JavaScript. This is common to fraud attacks and may be an indicator of disabled Flash objects and images. This is common to fraud attacks and may be an indicator of Document Version: 1.5 7

FlashImagesJavascriptDisabled FlashJavascriptDisabled FuzzyDeviceOnLocalBlacklist FuzzyDeviceOnLocalWhitelist FuzzyDeviceOnThreatMetrixGlobalBlackli st FuzzyDeviceRejectedByNetworkInLastW eek GeolocationLanguageMismatch HiddenProxy ImagesCookiesDisabled ImagesCookiesJavascriptDisabled ImagesDisabled ImagesJavascriptDisabled IPHasNegativeReputation disabled Flash objects, images, and JavaScript. This is common to fraud attacks and may be an indicator of disabled Flash objects and JavaScript. This is common to fraud attacks and may be an indicator of The originating device appears to be on Vantiv's The originating device appears to be on Vantiv's The originating device appeas to be on the ThreatMetrix global blacklist. The originating device appears to have been rejected by one of ThreatMetrix's customers and/or partners in the last week on the suspicion of fraud. The language detected from the originating web browser is not appropriate for the location. This is atypical and may be an indicator of This transaction was submitted through a hidden web proxy, a method that is sometimes employed when trying to cloak one's identity. disabled images and cookies. This is common to fraud attacks and may be an indicator of disabled images, cookies, and JavaScript. This is common to fraud attacks and may be an indicator of disabled images. This is common to fraud attacks and may be an indicator of disabled images and JavaScript. This is common to fraud attacks and may be an indicator of The originating IP address is a potential threat based upon analysis of its activity across the ThreatMetrix network. 8 Document Version: 1.5

IPOnLocalBlacklist IPOnLocalWhitelist IPOnThreatMetrixGlobalBlacklist JavascriptDisabled KnownVPNISP OpenProxy PaymentCardDistanceTraveled PaymentCardOnThreatMetrixGlobalBlack list PaymentCardRejectedByNetworkInLast Week PhoneNumberOnLocalBlacklist PhoneNumberOnLocalWhitelist PossibleCookieWipingDay PossibleCookieWipingHour The originating IP address is on Vantiv's The originating IP address is on Vantiv's The originating IP address is on the ThreatMetrix global blacklist. disabled JavaScript. This is common to fraud attacks and may be an indicator of This transaction was submitted through a known Virtual Private Network (VPN), a method that is sometimes employed when trying to cloak one's identity. This transaction was submitted through an open web proxy, a method that is sometimes employed when trying to cloak one's identity. This payment card has been associated with transactions originating from locations at least 1,000 miles apart in the last hour. This is a red flag and warrants caution. This payment card is on the ThreatMetrix global blacklist. A transaction using this payment card has been rejected by one of ThreatMetrix's customers and/or partners in the last week on the suspicion of fraud. The customer telephone number for this transaction is on Vantiv's The customer telephone number for this transaction is on Vantiv's The user appears to have cleared his or her browser's cookies 3 or more times in the last day. This is common to fraud attacks and may be an indicator of The user appears to have cleared his or her browser's cookies 3 or more times in the last hour. This is common to fraud attacks and may be an indicator of Document Version: 1.5 9

PossibleCookieWipingWeek PossibleVPNOrTunnel PossibleVPNConnection PotentialVirtualMachine ProxyHasNegativeReputation ProxyIPHasNegativeReputation ProxyIPOnLocalBlacklist ProxyIPOnLocalWhitelist ProxyIPOnThreatMetrixGlobalBlacklist SatelliteISP SatelliteProxyISP SessionAnomaly The user appears to have cleared his or her browser's cookies 3 or more times in the last week. This is common to fraud attacks and may be an indicator of This transaction may have been submitted through a Virtual Private Network (VPN), a method that is sometimes employed when trying to cloak one's identity. This transaction may have been submitted through a Virtual Private Network (VPN), a method that is sometimes employed when trying to cloak one's identity. This transaction may have been submitted using a Virtual Machine, a method that is sometimes employed when trying to cloak one's identity. The originating IP proxy is a potential threat based upon an analysis of its activity across the ThreatMetrix network. The originating IP address is a potential threat based upon analysis of its activity across the ThreatMetrix network. The originating proxy IP address is on Vantiv's The originating proxy IP address is on Vantiv's The originating proxy IP address is on the ThreatMetrix global blacklist. This transaction was submitted through a Satellite Internet Service Provider, a method that is sometimes employed when trying to cloak one's identity. This transaction was submitted through a Satellite Proxy Internet Service Provider, a method that is sometimes employed when trying to cloak one's identity. Characteristics of the originating device appear to have been modified during the course of the user's web session. This is atypical and may indicate 10 Document Version: 1.5

ShippingAddressTrueIPGeolocationMism atch SuspectedSessionCloaking SuspectedTORNetwork SystemStateAnomaly TimeZoneTrueGeolocationMismatch TransparentProxy TrueIPHasNegativeReputation TrueIPOnLocalBlacklist TrueIPOnLocalWhitelist TrueIPOnThreatMetrixGlobalBlacklist TrueIPProxyIPCityMismatch TrueIPProxyIPGeolocationMismatch The shipping address country does not match that of the True IP address. This may be an indicator of a package redirection/interception/forwarding or re-shipping fraudster attack. The characteristics of the originating browser are consistent with common fraud attacks, and may be an indicator of a fraudster's deliberate attempt to cloak his or her identity. This transactions appears to have originated from a TOR network, a common source of fraud attacks. The system state of the originating device has changed two or more times within the past hour. This is atypical and may indicate The time zone setting on the originating device does not match to the true geolocation of the customer. This is atypical and may be an indicator of This transaction was submitted through a transparent web proxy, a method that is most often used in corporate environments, though also employed when trying to cloak one's identity. The originating IP address is a potential threat based upon analysis of its activity across the ThreatMetrix network. The originating true IP address is on Vantiv's The originating true IP address is on Vantiv's The originating true IP address is on the ThreatMetrix global blacklist. The city of the True IP address does not match that of the Proxy IP address. This may be an indicator of a fraudster's attempt to cloak his or her identity. The geolocation of the True IP address does not match that of the Proxy IP address. This may be an indicator of a fraudster's attempt to cloak his or her identity. Document Version: 1.5 11

TrueIPProxyIPISPMismatch TrueIPProxyIPOrganizationMismatch TrueIPProxyIPRegionMismatch TrueIPRejectedByNetworkInLastWeek UnusualProxyAttributes The Internet Service Provider of the True IP address does not match that of the Proxy IP address. This may be an indicator of a fraudster's attempt to cloak his or her identity. The organization of the True IP address does not match that of the Proxy IP address. This may be an indicator of a fraudster's attempt to cloak his or her identity. The region of the True IP address does not match that of the Proxy IP address. This may be an indicator of a fraudster's attempt to cloak his or her identity. The originating true IP has been rejected by one of ThreatMetrix's customers and/or partners in the last week on the suspicion of fraud. This web proxy used to submit the transaction has unusual attributes (e.g. dialup), which may indicate an attempt to cloak one's identity. 12 Document Version: 1.5