Dataset analysis of proxy logs detecting to curb propagations in network attacks

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The exponential growth of Internet has brought a monolithic change in the level of malicious attacks, leading to the emergence proxy servers, which indeed have proven to apotheosis hiding place for the Internet intruders. The collected logs of these proxy servers contain portentous information, and its dissection can help in analyzing the deviation of abnormal activities form the normal ones. How to figure out their network of networks, identify possible offenders, and strike the heartland of their safe haven has become an upcoming challenge for universal law enforcement agents. This paper considers exactly what kind of elements should be explored once an offensive behavior has been noticed in proxy logs. It scrutinizes (i) the Time Stamp gap of sequential records (ii) the parameters of digital action (iii) the appearance of special parameters (iv) the patterns in the log files. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Kao, D. Y., Wang, S. J., Huang, F. F. Y., Bhatia, S., & Gupta, S. (2008). Dataset analysis of proxy logs detecting to curb propagations in network attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5075 LNCS, pp. 245–250). https://doi.org/10.1007/978-3-540-69304-8_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free