Security Incident Detection Using Multidimensional Analysis of the Web Server Log Files

Author(s):  
Grzegorz Kołaczek ◽  
Tomasz Kuzemko
2016 ◽  
Vol 1 (1) ◽  
pp. 001
Author(s):  
Harry Setya Hadi

String searching is a common process in the processes that made the computer because the text is the main form of data storage. Boyer-Moore is the search string from right to left is considered the most efficient methods in practice, and matching string from the specified direction specifically an algorithm that has the best results theoretically. A system that is connected to a computer network that literally pick a web server that is accessed by multiple users in different parts of both good and bad aim. Any activity performed by the user, will be stored in Web server logs. With a log report contained in the web server can help a web server administrator to search the web request error. Web server log is a record of the activities of a web site that contains the data associated with the IP address, time of access, the page is opened, activities, and access methods. The amount of data contained in the resulting log is a log shed useful information.


Author(s):  
Дмитрий Рубвальтер ◽  
Dmitry Rubvalter ◽  
Александр Либкинд ◽  
Alexander Libkind ◽  
Валентина Маркусова ◽  
...  

A multidimensional analysis of the state of Russian studies on the education issues over 1993–2016 was carried out based on the materials of the data contained in the Web of Science (SSCI, A & HCI and SCI-E databases). There were determined the dynamics and trends of a number of relevant indicators, such as the number of Russian publications by year, the share of these publications in the global flow of publications on education issues, the dynamics of the share of publications made in co-authorship with foreign colleagues, etc. A number of distributions of Russian publications on educational issues was compiled and analyzed: by journals, by Russian regions and cities, by organizations and authors of the publications. It was found that most of these distributions were characterized by a high level of non-uniformity. A list of journals (125 titles) in which Russian works on education issues had been published was compiled. Russian organizations (308) and domestic researchers (about two thousand) engaged in studying the issues of education were identified. It was discovered that more than 200 organizations and about 400 academicians from 60 foreign countries had participated in Russian studies on the education issues.


Author(s):  
Jozef Kapusta ◽  
Michal Munk ◽  
Dominik Halvoník ◽  
Martin Drlík

If we are talking about user behavior analytics, we have to understand what the main source of valuable information is. One of these sources is definitely a web server. There are multiple places where we can extract the necessary data. The most common ways are to search for these data in access log, error log, custom log files of web server, proxy server log file, web browser log, browser cookies etc. A web server log is in its default form known as a Common Log File (W3C, 1995) and keeps information about IP address; date and time of visit; ac-cessed and referenced resource. There are standardized methodologies which contain several steps leading to extract new knowledge from provided data. Usu-ally, the first step is in each one of them to identify users, users’ sessions, page views, and clickstreams. This process is called pre-processing. Main goal of this stage is to receive unprocessed web server log file as input and after processing outputs meaningful representations which can be used in next phase. In this pa-per, we describe in detail user session identification which can be considered as most important part of data pre-processing. Our paper aims to compare the us-er/session identification using the STT with the identification of user/session us-ing cookies. This comparison was performed concerning the quality of the se-quential rules generated, i.e., a comparison was made regarding generation useful, trivial and inexplicable rules.


2009 ◽  
Vol 43 (1) ◽  
pp. 203-205 ◽  
Author(s):  
Chetan Kumar ◽  
K. Sekar

The identification of sequence (amino acids or nucleotides) motifs in a particular order in biological sequences has proved to be of interest. This paper describes a computing server,SSMBS, which can locate and display the occurrences of user-defined biologically important sequence motifs (a maximum of five) present in a specific order in protein and nucleotide sequences. While the server can efficiently locate motifs specified using regular expressions, it can also find occurrences of long and complex motifs. The computation is carried out by an algorithm developed using the concepts of quantifiers in regular expressions. The web server is available to users around the clock at http://dicsoft1.physics.iisc.ernet.in/ssmbs/.


Author(s):  
Noel Jerke ◽  
Darin Beard
Keyword(s):  

2020 ◽  
Author(s):  
Snehal D. Karpe ◽  
Vikas Tiwari ◽  
Sowdhamini Ramanathan

AbstractInsect Olfactory Receptors (ORs) are diverse family of membrane protein receptors responsible for most of the insect olfactory perception and communication, and hence they are of utmost importance for developing repellents or pesticides. Hence, accurate gene prediction of insect ORs from newly sequenced genomes is an important but challenging task. We have developed a dedicated web-server, ‘insectOR’, to predict and validate insect OR genes using multiple gene prediction algorithms, accompanied by relevant validations. It is possible to employ this sever nearly automatically and perform rapid prediction of the OR gene loci from thousands of OR-protein-to-genome alignments, resolve gene boundaries for tandem OR genes and refine them further to provide more complete OR gene models. InsectOR outperformed the popular genome annotation pipelines (MAKER and NCBI eukaryotic genome annotation) in terms of overall sensitivity at base, exon and locus level, when tested on two distantly related insect genomes. It displayed more than 95% nucleotide level precision in both tests. Finally, given the same input data and parameters, InsectOR missed less than 2% gene loci, in contrast to 55% loci missed by MAKER for Drosophila melanogaster. The web-server is freely available on the web at http://caps.ncbs.res.in/insectOR/. All major browsers are supported. Website is implemented in Python with Jinja2 for templating and bootstrap framework which uses HTML, CSS and JavaScript/Ajax. The core pipeline is written in Perl.


Data Mining ◽  
2013 ◽  
pp. 1312-1319
Author(s):  
Marco Scarnò

CASPUR allows many academic Italian institutions located in the Centre-South of Italy to access more than 7 million articles through a digital library platform. The behaviour of its users were analyzed by considering their “traces”, which are stored in the web server log file. Using several web mining and data mining techniques the author discovered a gradual and dynamic change in the way articles are accessed. In particular there is evidence of a journal browsing increase in comparison to the searching mode. Such phenomenon were interpreted using the idea that browsing better meets the needs of users when they want to keep abreast about the latest advances in their scientific field, in comparison to a more generic searching inside the digital library.


Author(s):  
Ibrahim Mahmood Ibrahim ◽  
Siddeeq Y. Ameen ◽  
Hajar Maseeh Yasin ◽  
Naaman Omar ◽  
Shakir Fattah Kak ◽  
...  

Today, web services rapidly increased and are accessed by many users, leading to massive traffic on the Internet. Hence, the web server suffers from this problem, and it becomes challenging to manage the total traffic with growing users. It will be overloaded and show response time and bottleneck, so this massive traffic must be shared among several servers. Therefore, the load balancing technologies and server clusters are potent methods for dealing with server bottlenecks. Load balancing techniques distribute the load among servers in the cluster so that it balances all web servers. The motivation of this paper is to give an overview of the several load balancing techniques used to enhance the efficiency of web servers in terms of response time, throughput, and resource utilization. Different algorithms are addressed by researchers and get good results like the pending job, and IP hash algorithms achieve better performance.


2011 ◽  
pp. 259-273
Author(s):  
Carlos D. Santos ◽  
Márcio A. Gonçalves ◽  
Fabio Kon

Open source communities such as the ones responsible for Linux and Apache became well known for producing, with volunteer labor innovating over the Internet, high-quality software that has been widely adopted by organizations. In the web server market, Apache has dominated in terms of market share for over 15 years, outperforming corporations and research institutions. The resource-based view (RBV) of firms posits that an organization outperforms its competitors because it has valuable, rare, imperfectly imitable, and non-substitutable resources. Accordingly, one concludes that Apache possesses such resources to sustain its competitive advantage. However, one does not know what those resources are. This chapter is an effort to locate them, answering the question: “What resources enable Apache to outperform its for-profit competitors consistently?” This research draws on the RBV to develop a series of propositions about Apache’s internal resources and organizational capabilities. For each proposition developed, methods for their empirical validation are proposed, and future research directions are provided.


Sign in / Sign up

Export Citation Format

Share Document