ABSTRACT

Most hackers realize that their actions on the Internet can be traced back to them through their IP address. If illegal activity is committed on a server, law enforcement may be able to get permission to review the logs. Serious hackers who are trying to avoid detection are well aware of some of the methods that can be utilized in order to avoid having their IP address traced. However, if the network administrator thoroughly reviews their logs, they may notice web proxies are being used through analysis of web traffic. They can then choose to ban the web proxy sites, but there are an extremely large number of these types of sites, so banning all web proxies is an extremely difficult task. If an attacker is able to penetrate the reader internal network, they can do some serious damage now, and possible even more damage in the coming years.