Group Purchasing
Group Purchasing

Evil Through the Lens of Web Logs

Evil Through the Lens of Web Logs (PDF, 3.42MB)Published: 23 May, 2012
Created by:
Russ McRee

Web logs can be analyzed with specific attention to Internet Background Abuse (IBA), a term to be defined here as a subset of Internet Background Radiation (IBR). Two bands of the IBR spectrum include scanning and misconfiguration and can be applied to Internet Background Abuse where details about attacker and victim patterns are readily available. Via web application specific examples this paper will discuss tooling and methods to analyze attacks exhibiting traits, trends, and tendencies from the attacker and victim perspectives.