Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks

  • Authors:
  • Da-Yu Kao;Shiuh-Jeng Wang;Frank Fu-Yuan Huang;Sajal Bhatia;Saurabh Gupta

  • Affiliations:
  • Department of Crime Prevention and Corrections, Central Police University, Taoyuan, Taiwan;Department of Information Management, Central Police University, Taoyuan, Taiwan 333;Department of Crime Prevention and Corrections, Central Police University, Taoyuan, Taiwan;Department of Communication and Computer Engineering, LNM Institute of Information Technology, Jaipur, India;Department of Communication and Computer Engineering, LNM Institute of Information Technology, Jaipur, India

  • Venue:
  • PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The exponential growth of Internet has brought a monolithic change in the level of malicious attacks, leading to the emergence proxy servers, which indeed have proven to apotheosis hiding place for the Internet intruders. The collected logs of these proxy servers contain portentous information, and its dissection can help in analyzing the deviation of abnormal activities form the normal ones. How to figure out their network of networks, identify possible offenders, and strike the heartland of their safe haven has become an upcoming challenge for universal law enforcement agents. This paper considers exactly what kind of elements should be explored once an offensive behavior has been noticed in proxy logs. It scrutinizes (i) the Time Stamp gap of sequential records (ii) the parameters of digital action (iii) the appearance of special parameters (iv) the patterns in the log files.