/proxy_log_analysis

Primary LanguagePythonMIT LicenseMIT

Problem we know about

Theory

I'm speculating the URI being requested can be tied to the bytes_in to detect variances and thereby detect anomalous or strange instances of those URIs. I'm speculating that we can detect not only the malicious jquery javascript being requested (known problem space), but also detect other scripts or files being included which are abnormal and possibly malicious.

Approach

[ ] Explore the data, eat some food, drink some beer, explore data more; repeat.

Custom Data Parser (to move logs into csv format)

Supporting Datasets

TODO

[ ] Remove blocked/denied access from datasets, because it was blocked, ergo is "safe". [ ] move todos to issues.