cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Showing results for 
Search instead for 
Did you mean: 
Advocate I

Request for Assistance: Article on chained proxy systems to misdirect net forensics

Community:

 

I am looking for a Journal pub (IEEE Security & Privacy, etc.) that discusses nefariously chaining computers together to share an IP address in an effort to misdirect or hide forensic artifacts.  This can be through the use of direct connections like Ethernet-to-USB, or through configuring a computer as a Wireless Access Point (Windows 10 Internet Connection Sharing); as opposed to using a Remote Access Trojan or some other remote control system.

 

Thank you!

 

Sincerely,

 

Eric B.

2 Replies
Newcomer III

Re: Request for Assistance: Article on chained proxy systems to misdirect net forensics

Advocate I

Re: Request for Assistance: Article on chained proxy systems to misdirect net forensics

Michael,

 


@mgorman wrote:

https://ieeexplore.ieee.org/document/6579417

 

https://www.researchgate.net/publication/270899481_Proxy_Server_Experiment_and_Network_Security_with...

 

Didn't read them, but they look promising for your topic.


Thank you!  These two resources are on the right track.  They're discussing the use of proxy servers to obfuscate a remote identity.  I'm looking more for resources discussing using a compromised computer as a hop point or proxy pivot point in attack.

 

Happy new year!

 

Sincerely,

 

Eric B.