proxy

Phishing attack detection in proxy logs
Phishing attack detection in proxy logs
Here is a video of the detection of a successful phishing attack contained in a 10 million rows anonymized proxy logs.
Bluecoat Proxy Big Analysis
Bluecoat Proxy Big Analysis
This article is a step-by-step tutorial aiming at loading and analyzing the bluecoat_proxy_big.zip dataset from Public Security Log Sharing in Squey. The first section is devoted the creation of a parsing file that will allow us to load the dataset. Should you be in a hurry, you can skip straight to the analysis as the file is provided below. Parsing file creation Before being able to load the dataset into the application, a parsing file (called format) should be created using the Format Builder tool.