New approach to detect suspicious activity using HTTP-proxy honeypots | IEEE Conference Publication | IEEE Xplore