1. Du
W. (2019). Computer & Internet Security: A Hands-on Approach (2nd ed.). Syracuse University. In Chapter 22: Web Security
the text discusses the role of web proxies as intermediaries that can log all user web activities. Section 22.1.2 describes how proxies see all HTTP requests
making their logs a comprehensive source for monitoring user traffic.
2. Al-Qerem
A.
& Alauthman
M. (2019). Detecting anomalous user behavior using proxy server logs. International Journal of Advanced Computer Science and Applications
10(11). This paper explicitly details the use of proxy server logs for security analysis
stating
"The proxy server log files contain a huge amount of information about the users’ behavior and their interests... such as client IP address
timestamp
requested URL..." (Section II
Paragraph 2). This supports their utility in identifying unusual traffic patterns. DOI: https://doi.org/10.14569/IJACSA.2019.0101101
3. Saltzer
J. H.
& Kaashoek
M. F. (2009). Principles of Computer System Design: An Introduction. MIT OCW
Course 6.033
Spring 2009. Chapter 9
"Security
" discusses the use of firewalls and proxies as "choke points" for monitoring and controlling network traffic. The principle establishes that a centralized logging point like a proxy is the most effective place to analyze traffic from many internal clients to the external network (Section 9.5.2).