• No results found

Web server access logs

Analyzing Web Access Logs using Spark with Hadoop

Analyzing Web Access Logs using Spark with Hadoop

... ABSTRACT Web usage mining is a process for finding a user navigation patterns in web server access ...user’s access any online website, web access logs are ...

5

Agglomerative Approach for Identification and Elimination of Web Robots from Web Server Logs to Extract Knowledge about Actual Visitors

Agglomerative Approach for Identification and Elimination of Web Robots from Web Server Logs to Extract Knowledge about Actual Visitors

... of web robots traffic from web server access ...of web robots detection techniques, these techniques are broadly classified in to two category offline and real ...time web robot ...

10

VISUALIZING WEB SERVER LOGS INSIGHTS WITH ELASTIC STACK– A CASE STUDY OF UMMAIL’S ACCESS LOGS

VISUALIZING WEB SERVER LOGS INSIGHTS WITH ELASTIC STACK– A CASE STUDY OF UMMAIL’S ACCESS LOGS

... is logs data. Likewise, logs data analytics is practised in many industries for different purposes, including website/system performance improvement, web development, information architecture, ...

17

Web Server Logs Preprocessing for Web Intrusion Detection

Web Server Logs Preprocessing for Web Intrusion Detection

... referrer logs may or may not be enabled at the server. Access log file contains data of all incoming requests and lets you track and get information about clients of the ...internal server ...

11

Advanced Techniques for Analyzing Web Server Logs

Advanced Techniques for Analyzing Web Server Logs

... Keywords: Web Server Logs, DAPHNE, SDS ...Wide Web (WWW) is growing very fast and the need for tools to efficiently analyze web server logs is ...common web ...

7

Mining Web Access Logs of an On-line Newspaper

Mining Web Access Logs of an On-line Newspaper

... to web browsing. The data recorded in server logs reflects the (possibly concurrent) access of a Web site by multiple users, and only the IP address, agent, and server side ...

8

Mining On-line Newspaper Web Access Logs

Mining On-line Newspaper Web Access Logs

... WEB ACCESS PATTERNS Figure 2 – Overview of the web access mining ...process. Web servers register a web log entry for every single access they get, recording important ...

8

Web Server Logs Analyze Using the XML Technologies

Web Server Logs Analyze Using the XML Technologies

... the server log file to XML, we use the XSLT language [2] to analyze the XML ...first access, the first visit server resource and the referrer visitor ...

9

An Enhanced Framework For Performing Pre- Processing On Web Server Logs

An Enhanced Framework For Performing Pre- Processing On Web Server Logs

... The Web Log DB exports w eb log data to databases via ODBC. Web Log DB uses ODBC to perform database inserts data using SQ L ...queries. Web Log DB allows you to use the applications you have become ...

5

Mining and Tracking Evolving Web User Trends from Large Web Server Logs

Mining and Tracking Evolving Web User Trends from Large Web Server Logs

... using web usage mining techniques to help track the behav- ior of their website users, and hence, better understand and satisfy their users’ needs and maintain their ...few web usage mining algorithms were ...

20

Analysis of KFUPM Web Traffic Using Proxy Access Logs

Analysis of KFUPM Web Traffic Using Proxy Access Logs

... characterization, web server workload and performance studies, characterization of client/user behavior, and web proxy performance ...of web related document sizes and other attributes ...

5

Identifying User Sessions from Web Server Logs with Integer Programming

Identifying User Sessions from Web Server Logs with Integer Programming

... This paper addresses the problem of estimating individual user sessions from web logs (sessionization). For testing purposes, we were granted special permission to track the browsing activities of users on ...

24

PREPROCESSING OF WEB LOGS

PREPROCESSING OF WEB LOGS

... A Web log is a file to which the Web server writes information each time a user requests a resource from that particular ...a web usage mining model (Web-Log preprocessing) aims to ...

6

Detection of attack-targeted scans from the Apache HTTP Server access logs

Detection of attack-targeted scans from the Apache HTTP Server access logs

... Also, thanks to ontological model, zero day attacks could be effec- tively detected. Their paper also includes a comparison between the proposed Semantic Model and ModSecurity. There are several differences between our ...

9

Detection of attack-targeted scans from the apache HTTP server access logs

Detection of attack-targeted scans from the apache HTTP server access logs

... on access log ...the web applications could be correctly created and ...with logs has some ...by web servers. Another negative aspects are the size of logs and parsing ...the ...

54

Discovering Web Server Logs Patterns Using Generalized Association Rules Algorithm

Discovering Web Server Logs Patterns Using Generalized Association Rules Algorithm

... When web users interact with a site, data recording their behavior is stored in web server ...a Web site (Srivastava, ...inter-page access co-occurrence to estimate the ...

19

Augmented Session Similarity Based Framework for Measuring Web User Concern from Web Server Logs

Augmented Session Similarity Based Framework for Measuring Web User Concern from Web Server Logs

... Wide Web, most of the institutes are presently putting their data on the web and offer online services ...the Web to seek information and gain knowledge by navigating ...the web hosting ...

7

DEVELOPMENT OF WEB USAGE MINING TOOLS TO ANALYZE THE WEB SERVER LOGS USING ARTIFICIAL INTELLIGENCE TECHNIQUES

DEVELOPMENT OF WEB USAGE MINING TOOLS TO ANALYZE THE WEB SERVER LOGS USING ARTIFICIAL INTELLIGENCE TECHNIQUES

... of web usage mining tools to handle the web server ...the web server ...using web usage mining algorithms. The development tools used Active Server Pages and Ms ...

13

Data Pre-processing on Web Server Logs for Generalized Association Rules Mining Algorithm

Data Pre-processing on Web Server Logs for Generalized Association Rules Mining Algorithm

... files, Web service providers can begin the process of assessing and evaluating their networked information ...Current Web usage statistics generally center on the analysis of the Access Log, thus ...

8

ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING

ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING

... the web server the entry is made in the error ...the server has been configured to deny the client access. The server reports the file-system path of the requested ...

12

Show all 10000 documents...

Related subjects