Proxy Identifier Based on Patterns in Traffic Flows
Proxies are used commonly on today’s Internet. On one hand, end users can choose to use proxies for hiding their identities for privacy reasons. On the other hand, ubiquitous systems can use it for intercepting the traffic for purposes such as caching. In addition, attackers can use such technologies to anonymize their malicious behaviours and hide their identities. Identification of such behaviours is important for defense applications since it can facilitate the assessment of security threats.
The objective of this paper is to identify proxy traffic as seen in a traffic log file without any access to the proxy server or the clients behind it. To achieve this: (i) we employ a mixture of log files to represent real-life proxy behavior, and (ii) we design and develop a data driven machine learning based approach to provide recommendations for the automatic identification of such behaviours. Our results show that we are able to achieve our objective with a promising performance even though the problem is very challenging.
Similar IEEE Project Titles:
- Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers.
- High-Throughput Low-Complexity Systolic Montgomery Multiplication Over GF(2^m) based on Trinomials.
- Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation.
- Spatial Mode Side Channels in Free-Space QKD Implementations.
- Postprocessing of the Oblivious Key in Quantum Private Query.
- New Regular Radix-8 Scheme for Elliptic Curve Scalar Multiplication without Pre-Computation.
- Automatic Application of Power Analysis Countermeasures.
- Security Considerations in Minutiae-based Fuzzy Vaults.
- Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel.
- Weaving an Assurance Case from Design: A Model-Based Approach.
- Compressing Sets and Multisets of Sequences.
- Authentication protocol for an ambient assisted living system.
- Security for the Internet of Things: A Survey of Existing Protocols and Open Research issues.
- Maximum Information Release While Ensuring Opacity in Discrete Event Systems.
- Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks.
- Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness.
- A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations.
- VProof: Lightweight Privacy-Preserving Vehicle Location Proofs.
- New Parallel Approaches for Scalar Multiplication in Elliptic Curve over Fields of Small Characteristic.
Basic tools like substitution and permutation used in cryptographi