Joe Stewart writes, "This paper discusses the abuse of misconfigured HTTP proxy servers, taking a detailed look at the types of traffic that flow through this underground network. Also discussed is the use of a "honeyproxy", a server designed to look like a misconfigured HTTP proxy. Using such a tool we can spy on the Internet underground without the need for a full-blown honeypot.. . .
Joe Stewart writes, "This paper discusses the abuse of misconfigured HTTP proxy servers, taking a detailed look at the types of traffic that flow through this underground network. Also discussed is the use of a "honeyproxy", a server designed to look like a misconfigured HTTP proxy. Using such a tool we can spy on the Internet underground without the need for a full-blown honeypot.

There's no need to portscan huge blocks of IP addresses looking for open proxy servers. Lists of open proxy servers can be found in seconds with a simple Google search. These lists are frequently updated, and some even include bandwidth statistics about each server. However, it should be noted that most of these proxy servers are not supposed to be public. It is very common to for a novice administrator to set up a proxy or HTTP cache with access rights from anywhere. There are programs available on the Internet to automatically redirect your traffic through different proxies. Some of these programs even chain proxies together for additional protection.

The link for this article located at Joe Stewart is no longer available.