Cognitive Threat Analytics: Turn Your Proxy Into Security Device