cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Baechle
Advocate I

Request for Assistance: Article on chained proxy systems to misdirect net forensics

Community:

 

I am looking for a Journal pub (IEEE Security & Privacy, etc.) that discusses nefariously chaining computers together to share an IP address in an effort to misdirect or hide forensic artifacts.  This can be through the use of direct connections like Ethernet-to-USB, or through configuring a computer as a Wireless Access Point (Windows 10 Internet Connection Sharing); as opposed to using a Remote Access Trojan or some other remote control system.

 

Thank you!

 

Sincerely,

 

Eric B.

2 Replies
mgorman
Contributor II
Baechle
Advocate I

Michael,

 


@mgorman wrote:

https://ieeexplore.ieee.org/document/6579417

 

https://www.researchgate.net/publication/270899481_Proxy_Server_Experiment_and_Network_Security_with...

 

Didn't read them, but they look promising for your topic.


Thank you!  These two resources are on the right track.  They're discussing the use of proxy servers to obfuscate a remote identity.  I'm looking more for resources discussing using a compromised computer as a hop point or proxy pivot point in attack.

 

Happy new year!

 

Sincerely,

 

Eric B.