Proposal for Easily Detachable Proxy for Personal Information Leakage Detection

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 330)

Abstract

This paper proposes an easily attachable/detachable proxy that helps ordinary computer users detect their personal information leakage caused by malicious software. This proxy can behave as a stealth proxy or as a transparent proxy, meaning that the proxy can be placed at any point in a TCP/IP network. Users of this proxy can detect and stop any suspicious TCP/IP connections by placing the proxy at any appropriate point in their network and by using the bundled controller Web application that controls behavior of the proxy. We have used a Raspberry Pi and HTML5 for the proxy implementation, thus making this method affordable and portable. We evaluated the proxy by placing it at several places in the network, and confirmed that the proxy properly works and helps users detect suspicious TCP/IP connections by visualizing them between their computers and the Internet.

Keywords

security information leakage proxy bridge HTML5 Raspberry Pi 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Liu, Y., Corbett, C., Chiang, K., Archibald, R., Mukherjee, B., Ghosal, D.: SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack. In: 42nd Hawaii International Conference on System Sciences (HICSS), pp. 1–10. IEEE Press, Big Island (2009)Google Scholar
  2. 2.
    Maeta, A., Takahashi, K., Kawamura, T., Sugahara, K.: Implementation of Logging for Information Tracking on Network. In: 2013 International Conference on IT Convergence and Security (ICITCS), pp. 1–4. IEEE Press, Macao (2013)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.School of Science and TechnologyMeiji UniversityKawasakiJapan

Personalised recommendations