Analysis of Web Server Log Files and Attack Detection

被引:0
|
作者
Faradzhullaev, R. [1 ]
机构
[1] Azerbaijan Acad Sci, Inst Informat Technol, Ul F Agaeva 9, AZ-1141 Baku, Azerbaijan
关键词
Web site; security; HTTP query; theory of probability; Chebyshev inequality; detection method; anomalous queries;
D O I
10.3103/S0146411608010082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Problems of web application security and antihacker protection are very topical. Queries that users send to a web application via the Internet are registered in log files of the web server. Analyzing log files allows detecting anomalous changes that take place on the web server and identifying attacks. In this work, different methods are used to analyze log files and detect anomalies. The proposed methods allow detecting anomalous queries received from malicious users in log files of the web server.
引用
下载
收藏
页码:50 / 54
页数:5
相关论文
共 50 条
  • [21] Log Analysis in a HTTP Proxy Server for Accurately Estimating Web QoE
    Sawabe, Anan
    Yoshida, Hiroshi
    Nogami, Kousuke
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [22] Formal Analysis of Log Files
    Barringer, Howard
    Groce, Alex
    Havelund, Klaus
    Smith, Margaret
    JOURNAL OF AEROSPACE COMPUTING INFORMATION AND COMMUNICATION, 2010, 7 (11): : 365 - 390
  • [23] Gathering and mining information from Web log files
    Agosti, Maristella
    Di Nunzio, Giorgio Maria
    DIGITAL LIBRARIES: RESEARCH AND DEVELOPMENT, 2007, 4877 : 104 - 113
  • [24] Conceptualizing Mining of Firm's Web Log Files
    Ruangsak TRAKUNPHUTTHIRAK
    Yen CHEUNG
    Vincent C.S.LEE
    Journal of Systems Science and Information, 2017, (06) : 489 - 510
  • [25] Comparing Web and Touch Screen Transaction Log Files
    Nicholas, David
    Huntington, Paul
    Williams, Peter
    JOURNAL OF MEDICAL INTERNET RESEARCH, 2001, 3 (02) : 32 - 45
  • [26] Query expansion using web access log files
    Zhu, Y
    Gruenwald, L
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2005, 3588 : 686 - 695
  • [27] Data Mining in the SIMBAD Database Web Log Files
    Wenger, Marc
    Oberto, Anais
    ASTRONOMICAL DATA ANALYSIS SOFTWARE AND SYSTEMS XIX, 2010, 434 : 453 - 456
  • [28] Attack Detection Application with Attack Tree for Mobile System using Log Analysis
    Kim, Duhoe
    Shin, Dongil
    Shin, Dongkyoo
    Kim, Yong-Hyun
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (01): : 184 - 192
  • [29] Fast attack detection system using log analysis and attack tree generation
    Duhoe Kim
    Yong-Hyun Kim
    Dongil Shin
    Dongkyoo Shin
    Cluster Computing, 2019, 22 : 1827 - 1835
  • [30] Fast attack detection system using log analysis and attack tree generation
    Kim, Duhoe
    Kim, Yong-Hyun
    Shin, Dongil
    Shin, Dongkyoo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1827 - 1835