APLIKASI PENCARI INFORMASI PERMINTAAN LAYANAN WEB YANG ERROR MENGGUNAKAN ALGORITMA BOYER-MOORE

2016 ◽  
Vol 1 (1) ◽  
pp. 001
Author(s):  
Harry Setya Hadi

String searching is a common process in the processes that made the computer because the text is the main form of data storage. Boyer-Moore is the search string from right to left is considered the most efficient methods in practice, and matching string from the specified direction specifically an algorithm that has the best results theoretically. A system that is connected to a computer network that literally pick a web server that is accessed by multiple users in different parts of both good and bad aim. Any activity performed by the user, will be stored in Web server logs. With a log report contained in the web server can help a web server administrator to search the web request error. Web server log is a record of the activities of a web site that contains the data associated with the IP address, time of access, the page is opened, activities, and access methods. The amount of data contained in the resulting log is a log shed useful information.

2012 ◽  
Vol 3 (1) ◽  
pp. 30
Author(s):  
Mona M. Abu Al-Khair ◽  
M. Koutb ◽  
H. Kelash

Each year the number of consumers and the variety of their interests increase. As a result, providers are seeking ways to infer the customer's interests and to adapt their websites to make the content of interest more easily accessible. Assume that past navigation behavior as an indicator of the user's interests. Then, the records of this behavior, kept in the web-server logs, can be mined to extract the user's interests. On this principal, recommendations can be generated, to help old and new website's visitors to find the information about their interest faster.


Author(s):  
Dilip Singh Sisodia

Web robots are autonomous software agents used for crawling websites in a mechanized way for non-malicious and malicious reasons. With the popularity of Web 2.0 services, web robots are also proliferating and growing in sophistication. The web servers are flooded with access requests from web robots. The web access requests are recorded in the form of web server logs, which contains significant knowledge about web access patterns of visitors. The presence of web robot access requests in log repositories distorts the actual access patterns of human visitors. The human visitors' actual web access patterns are potentially useful for enhancement of services for more satisfaction or optimization of server resources. In this chapter, the correlative access patterns of human visitors and web robots are discussed using the web server access logs of a portal.


Author(s):  
Yijun Gao

This study analyzed the Web server logs from the People's Daily Online and revealed some interesting findings: Pageview numbers of the mportant news in editors’ mind on the most obvious sections of the homepage, are not significantly different than those of the "common" news put on the less obvious sections.Cette étude a porté sur l'analyse des fichiers de journalisation de serveurs Web du Quotidien du Peuple en ligne et a révélé quelques données intéressantes : le nombre de pages vues pour les dépêches jugées importantes par la rédaction et placées en évidence de la page d'accueil n'est pas significativement différent du nombre de pages vues pour les dépêches plus « courantes » placés moins en évidence. 


2012 ◽  
Vol 37 (3) ◽  
pp. 1-5 ◽  
Author(s):  
K. Sudheer Reddy ◽  
G. Partha Saradhi Varma ◽  
I. Ramesh Babu

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Husna Sarirah Husin ◽  
James Thom ◽  
Xiuzhen Zhang

Purpose The purpose of the study is to use web serer logs in analyzing the changes of user behavior in reading online news, in terms of desktop and mobile users. Advances in mobile technology and social media have paved the way for online news consumption to evolve. There is an absence of research into the changes of user behavior in terms of desktop versus mobile users, particularly by analyzing the server logs. Design/methodology/approach In this paper, the authors investigate the evolution of user behavior using logs from the Malaysian newspaper Berita Harian Online in April 2012 and April 2017. Web usage mining techniques were used for pre-processing the logs and identifying user sessions. A Markov model is used to analyze navigation flows, and association rule mining is used to analyze user behavior within sessions. Findings It was found that page accesses have increased tremendously, particularly from Android phones, and about half of the requests in 2017 are referred from Facebook. Navigation flow between the main page, articles and section pages has changed from 2012 to 2017; while most users started navigation with the main page in 2012, readers often started with an article in 2017. Based on association rules, National and Sports are the most frequent section pages in 2012 and 2017 for desktop and mobile. However, based on the lift and conviction, these two sections are not read together in the same session as frequently as might be expected. Other less popular items have higher probability of being read together in a session. Research limitations/implications The localized data set is from Berita Harian Online; although unique to this particular newspaper, the findings and the methodology for investigating user behavior can be applied to other online news. On another note, the data set could be extended to be more than a month. Although initially data for the year 2012 was collected, unfortunately only the data for April 2012 is complete. Other months have missing days. Therefore, to make an impartial comparison for the evolution of user behavior in five years, the Web server logs for April 2017 were used. Originality/value The user behavior in 2012 and 2017 was compared using association rules and Markov flow. Different from existing studies analyzing online newspaper Web server logs, this paper uniquely investigates changes in user behavior as a result of mobile phones becoming a mainstream technology for accessing the Web.


2013 ◽  
Vol 12 (01) ◽  
pp. 1350006 ◽  
Author(s):  
M. Koutb ◽  
H. Kelash ◽  
M. Abu Al-Khair

Each year the number of consumers and the variety of their interests increase. As a result, providers are seeking ways to infer the customer's interests and to adapt their websites to make the content of interest more easily accessible. Assume that past navigation behaviour as an indicator of the user's interests. Then, the records of this behaviour, kept in the web-server logs, can be mined to extract the user's interests. On this principal, recommendations can be generated, to help old and new website's visitors to find the information about their interest faster.


Author(s):  
Yijun Gao

With the help of webometrics techniques, we could explore whether or not the Web surfer’s online interest reflects the public opinion off-line. This paper investigates the Chinese Web user’s interest regarding the United States and Japan, and demonstrates that Web server log data could be a good source for us to gauge the public opinion on specific domestic and international issues.À l'aide de techniques webométriques, nous avons pu déterminer si les intérêts des internautes reflétaient l'opinion publique hors ligne. Cette communication porte sur les intérêts des internautes chinois pour les États-Unis et le Japon et démontre que les données des journaux de serveurs web peuvent être utiles pour prendre le pouls de l'opinion publique sur certains enjeux nationaux et internationaux.


Author(s):  
Sayalee Ghule

Log records contain data generally Client Title, IP Address, Time Stamp, Get to Ask, number of Bytes Exchanged, Result Status, URL that Intimated, and Client Chairman. The log records are kept up by the internet servers. By analysing these log records gives a flawless thought to the client. The wide Web may be a solid store of web pages that gives the Net clients piles of information. With the change in the number and complexity of Websites, the degree of the net has gotten to be massively wide. Web Utilization Mining may be a division of web mining that consolidates the application of mining strategies to web server logs in coordination to expel the behaviour of clients. Log records contain basic data around the execution of a framework. This data is frequently utilized for investigating, operational profiling, finding quirks, recognizing security dangers, measuring execution,


2020 ◽  
Vol 8 (1) ◽  
pp. 49-58
Author(s):  
Muhammad Yusup ◽  
Maisyaroh Maisyaroh ◽  
Laila Septiana

Gytech Indosantara Mandiri Ltd. in the last few years experienced many Cybercrime attacks on the Web Server which caused many moral and material losses. Therefore, it is necessary to consider ways to fight and prevent attacks on the webserver. One way to fight and prevent attacks is to use the Attack Signatures method by using ModSecurity and fail2ban as a Web Application Firewall (WAF). ModSecurity is used to detect and prevent the occurrence of Cyber Crime in the Http and https services. Whereas Fail2ban is used to prevent Bruteforce attacks on ssh, FTP and telnet services. Modesecurity, which acts as a Web Application Firewall (WAF) will send logs to Fail2ban when exploits occur on the Web Server. Meanwhile, Fail2ban will block the Attacker's IP address so that both can be used as a Web Application Firewall or can be used as layer 7 network security.


Sign in / Sign up

Export Citation Format

Share Document