Font Size: a A A

Design And Analysis Of The Web Security Log Analying System

Posted on:2010-06-19Degree:MasterType:Thesis
Country:ChinaCandidate:X D LiuFull Text:PDF
GTID:2178360278465845Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, a large number of domestic large-scale sites were born, such as Sina, Sohu, Netease and so on. Small and medium-sized ones are just numberous. It was only paid more attention to the speed of the external access for the users, but not the users' experience. It should be done to monitor the access of the web, while maintaining a large number of servers online by technical personnel. The troubleshooting was done as soon as possible through monitoring data to understand the status of the server running.In this paper, the logs Mining about user access were studied and analyzed, pointing to malicious attacks to Web sites, the crawling of search engines frequently, etc.The results of the logs were analyzed too, on the basis of understanding the HTTP protocol-related contents. The system solutions were designed, including core analysis system, the results of the analysis and display system, server maintenance information system. Through the system in time query to the previous time period analysis of the server log requests received, which was about the type, status, as well as the number of requests, such as quantity, time period through the last server operating data to determine the logic ofstrict procedures, and user experience good or bad, of the existence ofmalicious users to request, search engines to crawl, too frequent and soon.Papers main job:1. Mining access logs of Web users were mined, analysed,and statisticsed, analysis results will be stored in a database. Directly openning the log file would consume a relatively expensive memory and related resources if the problems need to be resolved since the log file would be relatively large for the websits with a large quantity of visits in a hour. The problem was just filtering the log files and statistiscsing the results to resolve the problem timely for the personels to maintain the websites. The importance and application was that the problems was found promptly and the losts were minimized.2. The statistics data were managed effectively and searched momently with the database system designed efficiently and reasonablely, and bugs were then eliminated, which was the key problem for web maintaining. The common sever-side abnomals were concerned during the database designing. The returned code 500, 503 were frequently encounterd by clients. Time-taken, the time consumed is a important parameter, which represents the one responsed in the server-side and a important index of the efficiency of program running . The more time cosuming, the lower efficiency of the server-side, and the access speed become slower in the client side as a result. So the users would give low think of the website.
Keywords/Search Tags:HTTP log, user agent proxy, log mining
PDF Full Text Request
Related items