User Activity Investigation of a Web CRM System Based on the Log Analysis
|
|
- Jasper Hart
- 8 years ago
- Views:
Transcription
1 User Activity Investigation of a Web CRM System Based on the Log Analysis Bogdan Trawiski and Marek Wróbel 1 1 Wrocław University of Technology, Institute of Applied Informatics, Wybrzee S. Wyspiaskiego 27, 5-37 Wrocław, Poland trawinski@pwr.wroc.pl, m.wrobel@icentrum.pl Abstract. There are many tools for the analysis of Web system log files based on statistical or web mining methods. However they do not always provide information specific for a given system. In the paper special method for investigation of the activity of web CRM system users is presented. The method has been designed and implemented in the web CRM system at a debt vindication company. There was basic foundation, that analysis should be carried in three time groups, i.e. working days in hours of work, working days beyond hours of work and idle days. Besides, system should make it possible to perform analysis for a chosen employee, position, day, hour and CRM system file. The results of investigation allowed to reveal anomalies in staff activity, what was not possible using common web log analyzer. 1. Introduction For years web logs have been the objects of numerous investigations which have provided valuable information used among others to assess quality of web site design, to trace user behaviour, to detect intrusions or adapt page content to user profiles [2,4,6,7,]. To carry research many tools and methods have been developed. These tools are based on statistical web log analysis and the methods of web log mining [1,5]. One of the most popular and rich in functions web log analyzers is the AWStats [3]. It enables to explore the logs of WWW, ftp and mail servers. Using the AWStats to investigate staff activity of a debt vindication company on the basis of Web CRM system logs has proved to be unsatisfactory [8]. So that, in order to obtain information needed by the company management, a new analytical module for the CRM system has been designed and implemented. Specific method has been elaborated to make it possible to compare the activity of individual employee and individual position with the average activity within an hour, a day, a month. 2. The Web CRM System Investigated The system investigated was a web CRM system used in a debt vindication company. The system has been designed specially for that company to meet its specific needs. It has been implemented using PHP script language and accommodated for cooperation
2 with Apache web server. It assures communication with PostgreSQL database management system. Therefore the system has an efficient database and functionality based on transactions and stored procedures. It has been deployed on the Linux operating system of Fedora distribution. The system consists of several functional modules: Communication announcement board, address book, phone book, document management, client, SMS gate, Office service clients, orders, meetings, Marketing client profitability analysis, company web site management, Accounting data exchange with the Videotel system, Call-center billings, Fax management incoming faxes, faxes sent, describing the content of faxes. Detailed data of the system usage have been collected from the start of its operation. Firstly, the Apache web server maintains logs of all requests. Its monthly logs are saved in text files of the size of approximately 5 MB. Secondly, the PHP code contains an audit procedure which is executed before each script. This procedure writes its own log which holds information of a user, data he sent to forms, etc. Results of exploration of data from the period of the month of May 24 contained in this log are discussed in the present paper. 3. Purpose and Method of the Analysis Analysis of the behaviour of employees is very important, because it provides a big amount of information which can be used to assess and compare their work as well as to find irregularities in their work. An anomaly takes place in such period of time, when an employee works otherwise than his colleagues or than he worked earlier. May be something wrong happens, for example a salesman intends to quit work and collects data of company clients. Important is also to know how heavily the system is used, because then it may be possible to prevent the situation, when overloaded system disturbs staff to work efficiently. The usage of the CRM system was explored using the AWStats analyzer [3]. However information delivered by the AWStats proved to be insufficient to analyze behaviour of employees [8]. In order to obtain information needed by the company management, a special module of analysis has been designed and programmed. There was basic foundation, that analysis should be carried in three time groups, i.e. working days in hours of work, working days beyond hours of work, idle days. In order to optimize the effectiveness of data processing, all data were aggregated for each hour of each day. Moreover, two fields were added to determine working days and working hours. In order to be able to compare data the measure of mean unit activity (MUA) was defined. The MUA is a number of file accesses within successive hour in a given day falling on one user operating this time. For example the MUA of 2 at sixteen o clock on May 6th means that the average number of file accesses per
3 one user within this hour was 2. The analysis was carried out for data for the period of May 24. Within this month the Web system was loaded heavily mainly during working days and the number of users was between 5 and 6. Every day the server received from 25 to 3 thousand requests, what generated 2-3 MB of data transfer. It means that for a working days there was approximately 1 request per second and the loading about KB. So the monthly data transfer reached 5 GB. 4. Results of the Investigation 4.1. The analysis of daily activity The purpose of first series of analysis was to show how the activity changed on a dayby-day basis within one month. Figures 1 and 2 show the distribution of activity (MUA) on working days in hours of work and working days beyond hours of work respectively. At first sight, it can be seen, that activity was unnatural big beyond hours of work on May 6 th w orking days in May 24 Fig. 1. Daily activity of whole staff during working days in hours of work in May w orking days in May 24 Fig. 2. Daily activity of whole staff during working days beyond hours of work Further analyses of the activity of work postings enabled to detect the position of work and the employee responsible for this anomaly (Fig. 3). In Figure 3 the dashed
4 line shows the activity of all postings while the continuous line presents the activity of the first posting only w orking days in May 24 Fig. 3. Daily activity of the first posting in May hours Fig. 4. Hourly activity of whole staff during work days in May The analysis of hourly activity The analysis provides information of what is the distribution of staff activity on individual hours of a day. Figure 4 shows how the activity changed on a hour-by-hour basis during working days in May 24. It can be easily noticed, that working day began at eight o clock and ended at sixteen o clock. The anomaly of greater activity at nineteen o clock can also be noticed. But the Figure 5 presenting hourly activity on May 6 th indicates the anomaly clearly. In the Figure 5 a continuous line shows the activity on a given day, while a dashed line presents an average activity within whole month. It can be seen that until seventeen o clock daily activity was similar to monthly one, but later it started to increase.
5 hours Fig. 5. Hourly activity of whole staff on May 6th The analysis of the activity of position, employee and file The analysis of the activity of position revealed that the activity of first position (negotiators) did not conform to the average activity. It led to the conclusion that exactly the negotiators were responsible for the anomaly. The graphs representing the behaviour of individual employees allowed to determine which negotiator worked abnormally. In turn the graph in Figure 6 indicated which files were used heavily that day. It turned out later, that instead of performing his usual work, the negotiator was describing the content of fax documents. number of uses Fig. 6. File activity on May 6th beyond working hours 5. Conclusions and Future Works All the tools and functions implemented to trace the behaviour of the company staff have proved to be useful. The anomalies could be detected and observed thoroughly. Due to the possibility to filter data and to compare individual data with average values, new information has been revealed. Such information was not available using common web log analyzer. The analysis carried separately for working days and idle days as well as for working hours has also turned out helpful. Using the measure of
6 mean unit activity (MUA) has produced statistics on which anomalies were shown clearly. It is planned to develop new analytical functions of our tools, as the possibility to define the range of days, hours, groups of employees and files. In order to make our investigations closer to human perception of time new fuzzy time periods have been designed. They are night, dawn, morning, lunch time, afternoon and evening. The definitions of the fuzzy time periods are shown in Figure 7. Besides, implementing of some intelligent mechanisms will enable us to detect anomalies automatically. degree of membership morning lunch time hours Fig. 7. Fuzzy definitions of time periods References 1. Ajith, A.: Business Intelligence from Web Usage Mining. Journal of Information & Knowledge Management 2 (23) Eirinaki M., Vazirgiannis M.: Web mining for web personalization. ACM Transactions on Internet Technology 3 (23) Free powerful and featureful tool that generates advanced web, ftp or mail server statistics, graphically (24) 4. Kruegel, C., Vigna, G.: Anomaly detection of web-based attacks. In Proceedings of the th ACM Conference on Computer and Communications Security (23) 5. Robertson, J.: The Value of Web Statistics (21) 222/km_2_27_2a.html 6. Srivastava, J., Cooley, R., Deshpande, M., Tan, P-T.: Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data. SIGKDD Explorations 1 (2) Wong, C., Shiu, S., Pal, S.: Mining Fuzzy Association Rules for web access case adaptation. In Proceedings of the Workshop Program at the Fourth International Conference on Case- Based Reasoning (21) 8. Wróbel, M.: CRM Systems. Design and Implementation for a Chosen Company. M.Sc. Thesis (in Polish). Wrocław University of Technology (24). Zawitz, M. W.: Web statistics - Measuring user activity. Bureau of Justice Statistics (18)
Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination
8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,
More informationA Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors
A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors S. Bhuvaneswari P.G Student, Department of CSE, A.V.C College of Engineering, Mayiladuthurai, TN, India. bhuvanacse8@gmail.com
More informationA Design and Implementation of a Web Server Log File Analyzer
A Design and Implementation of a Web Server Log File Analyzer Yu-Hsin Cheng 1, Chien-Hung Huang 2 1 Department of Information Management, Ling Tung University No. 1, Ling tung Rd., Taichung, Taiwan 2 Department
More informationResearch and Development of Data Preprocessing in Web Usage Mining
Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the
More informationPreprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
More informationAnalyzing the Different Attributes of Web Log Files To Have An Effective Web Mining
Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Jaswinder Kaur #1, Dr. Kanwal Garg #2 #1 Ph.D. Scholar, Department of Computer Science & Applications Kurukshetra University,
More informationIdentifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
More informationA Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
More informationDEVELOPMENT OF WEB USAGE MINING TOOLS TO ANALYZE THE WEB SERVER LOGS USING ARTIFICIAL INTELLIGENCE TECHNIQUES
DEVELOPMENT OF WEB USAGE MINING TOOLS TO ANALYZE THE WEB SERVER LOGS USING ARTIFICIAL INTELLIGENCE TECHNIQUES Mohd Helmy Abd Wahab, Nik Shahidah Afifi Md. Taujuddin, Zarina Tukiran Department of Computer
More informationAnalysis of Server Log by Web Usage Mining for Website Improvement
IJCSI International Journal of Computer Science Issues, Vol., Issue 4, 8, July 2010 1 Analysis of Server Log by Web Usage Mining for Website Improvement Navin Kumar Tyagi 1, A. K. Solanki 2 and Manoj Wadhwa
More informationSelecting the Right Active Directory Security Reports for Your Business
Selecting the Right Active Directory Security Reports for Your Business Avril Salter 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED.
More informationTowards Virtual Course Evaluation Using Web Intelligence
Towards Virtual Course Evaluation Using Web Intelligence M.E. Zorrilla 1, D. Marín 1, and E. Álvarez 2 1 Department of Mathematics, Statistics and Computation, University of Cantabria. Avda. de los Castros
More informationANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING
ISTANBUL UNIVERSITY JOURNAL OF ELECTRICAL & ELECTRONICS ENGINEERING YEAR VOLUME NUMBER : 2007 : 7 : 2 (379-386) ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING
More informationHigher Education Web Information System Usage Analysis with a Data Webhouse
Higher Education Web Information System Usage Analysis with a Data Webhouse Carla Teixeira Lopes 1 and Gabriel David 2 1 ESTSP/FEUP, Portugal carla.lopes@fe.up.pt 2 INESC-Porto/FEUP, Portugal gtd@fe.up.pt
More informationKOINOTITES: A Web Usage Mining Tool for Personalization
KOINOTITES: A Web Usage Mining Tool for Personalization Dimitrios Pierrakos Inst. of Informatics and Telecommunications, dpie@iit.demokritos.gr Georgios Paliouras Inst. of Informatics and Telecommunications,
More informationReturn On Investment XpoLog Center
Return On Investment XpoLog Center ROI Management of XpoLog Center Business white paper May 2015 In This Document: 1. ROI Metrics and Examples 2. Total Summary of ROI and TCO 3. Real Life Use Cases and
More informationDiscovery and Usage data for Software License Management
Discovery and Usage data for Software License Management Is Microsoft SCCM the best solution? Many organizations use Microsoft s SCCM product as their primary software discovery method. Because SCCM is
More informationTraffic Analyzer Based on Data Flow Patterns
AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System
More informationMasterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5)
Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5) CQURE Academy (3 days) Trainer: Grzegorz Tworek Grzegorz has extensive experience on Virtualization, Security, Infrastructure and
More informationStudent Management Information System for Polish Universities at its Tenth Anniversary
Student Management Information System for Polish Universities at its Tenth Anniversary Mariusz Czerniak Computer Center, Nicolaus Copernicus University, Plac Rapackiego, 87-00 Toruń, POLAND, Mariusz.Czerniak@umk.pl.
More informationAn Enhanced Framework For Performing Pre- Processing On Web Server Logs
An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and
More informationMonitoring services in Service Oriented Architecture 1
Proceedings of the International Multiconference on ISSN 1896-7094 Computer Science and Information Technology, pp. 735 744 2007 PIPS Monitoring services in Service Oriented Architecture 1 Ilona Bluemke,
More informationAn analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
More informationLesson 7 - Website Administration
Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their
More informationBisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
More information2 Technologies for Security of the 2 Internet
2 Technologies for Security of the 2 Internet 2-1 A Study on Process Model for Internet Risk Analysis NAKAO Koji, MARUYAMA Yuko, OHKOUCHI Kazuya, MATSUMOTO Fumiko, and MORIYAMA Eimatsu Security Incidents
More informationThe Operating System Lock Down Solution for Linux
The Operating System Lock Down Solution for Linux The Challenge: Meeting Organizational Security Requirements Linux Operating System Security Operating system (OS) security is a priority for System Administrators
More informationHow People Read Books Online: Mining and Visualizing Web Logs for Use Information
How People Read Books Online: Mining and Visualizing Web Logs for Use Information Rong Chen 1, Anne Rose 2, Benjamin B. Bederson 2 1 Department of Computer Science and Technique College of Computer Science,
More informationWebsite Development Plans
Website Development Plans March 23 2014 SITE Expertise M-27, Jia Sarai, Near IIT Delhi, Hauz Khas, New Delhi-110016 Contact:- 01166575782, Email :- contact@siteexpertise.in, Website :- http://siteexpertise.in
More informationWorld Wide Web Personalization
World Wide Web Personalization Olfa Nasraoui Department of Computer Engineering and Computer Science Speed School of Engineering University of Louisville Louisville, KY 40292 USA voice: +1 502-852-0191
More informationNSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
More informationWeb Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Web Server (Step 2) Creates HTML page dynamically from record set
Dawn CF Performance Considerations Dawn CF key processes Request (http) Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Query (SQL) SQL Server Queries Database & returns
More informationA Prevention & Notification System By Using Firewall. Log Data. Pilan Lin
A Prevention & Notification System By Using Firewall Log Data By Pilan Lin 1 Table Of Content ABSTRACT... 3 1 INTRODUCTION... 4 2. Firewall Log data... 6 2.1 How to collect log data... 6 3. Prevention
More informationVisualizing e-government Portal and Its Performance in WEBVS
Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR ccfong@umac.mo Abstract An e-government
More informationEffective User Navigation in Dynamic Website
Effective User Navigation in Dynamic Website Ms.S.Nithya Assistant Professor, Department of Information Technology Christ College of Engineering and Technology Puducherry, India Ms.K.Durga,Ms.A.Preeti,Ms.V.Saranya
More informationAugmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence
Augmented Search for IT Data Analytics New frontier in big log data analysis and application intelligence Business white paper May 2015 IT data is a general name to log data, IT metrics, application data,
More informationUnderstanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
More informationMasterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5)
Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5) by Paula Januszkiewicz (3 days) Paula Januszkiewicz Paula Januszkiewicz is the world-known Security Expert. Loves to perform Penetration
More informationQuality Assurance in Learning Management by Web Mining Usage
Quality Assurance in Learning Management by Web Mining Usage Imre J. Rudas Óbuda University, John von Neumann Faculty of Informatics rudas@uni-obuda.hu Péter Tóth Óbuda University, Trefort Ágoston Centre
More informationPREPROCESSING OF WEB LOGS
PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data
More informationExtension of Decision Tree Algorithm for Stream Data Mining Using Real Data
Fifth International Workshop on Computational Intelligence & Applications IEEE SMC Hiroshima Chapter, Hiroshima University, Japan, November 10, 11 & 12, 2009 Extension of Decision Tree Algorithm for Stream
More informationWeb Personalization based on Usage Mining
Web Personalization based on Usage Mining Sharhida Zawani Saad School of Computer Science and Electronic Engineering, University of Essex, Wivenhoe Park, Colchester, Essex, CO4 3SQ, UK szsaad@essex.ac.uk
More informationCOURSE CONTENT FOR WINTER TRAINING ON Web Development using PHP & MySql
COURSE CONTENT FOR WINTER TRAINING ON Web Development using PHP & MySql 1 About WEB DEVELOPMENT Among web professionals, "web development" refers to the design aspects of building web sites. Web development
More informationA Survey on Web Mining Tools and Techniques
A Survey on Web Mining Tools and Techniques 1 Sujith Jayaprakash and 2 Balamurugan E. Sujith 1,2 Koforidua Polytechnic, Abstract The ineorable growth on internet in today s world has not only paved way
More informationGL550 - Enterprise Linux Security Administration
GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such
More informationClockWork Enterprise 5
ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork
More informationAugmented Search for Software Testing
Augmented Search for Software Testing For Testers, Developers, and QA Managers New frontier in big log data analysis and application intelligence Business white paper May 2015 During software testing cycles,
More informationAN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 princemary26@gmail.com E. Baburaj Department of omputer Science & Engineering, Sun Engineering
More informationAn Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: ogino@okinawa-ct.ac.jp
More informationANATOMY OF A CODE RED II ATTACK
ANATOMY OF A CODE RED II ATTACK IMPROVING FIREWALL SECURITY USING PATROL FOR CHECK POINT FIREWALL-1 BILL KENNON, SENIOR SOFTWARE CONSULTANT BMC SOFTWARE, INC 1 The Surprise Attack As the NT Systems Administrator
More informationReporting Installation Checklist
This checklist is designed to help you before and during your Websense Enterprise Reporting installation. Print this checklist for reference as you prepare for and perform the installation, especially
More informationReal-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
More informationCHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS
CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS The web content providers sharing the content over the Internet during the past did not bother about the users, especially in terms of response time,
More informationWhere can I install GFI EventsManager on my network?
Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location
More informationHIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
More informationOnline Enrollment and Administration System
FYP Proposal Report Real World Database Development by Kong Koon Kit Chan Yin Mo Leung Shiu Hong Advised by Prof. Frederick H. Lochovsky Submitted in partial fulfillment of the requirements for COMP 4981
More informationThe FOSSology project
The FOSSology project Bruno Cornec October 2012 Version 5.2 HP, EMEA Open Source Profession Lead Introducing Myself Software engineering and Unices since 1988 Mostly Configuration Management Systems (CMS),
More information5nine Virtual Firewall 2.1 for Microsoft Hyper-V
KEY POINTS Secure your Hyper-V Virtual Machines & Virtual Servers Control Network Traffic In and Out of Your Virtual Machines & Virtual Servers Restrict Virtual Network Traffic Using Stateful Packet Filtering
More informationGraham Jones. Internet Psychologist. How to choose the right web host
Graham Jones Internet Psychologist How to choose the right web host 2008 Graham Jones All Rights Reserved. No part of this publication may be copied or stored in a retrieval system without the prior written
More informationWhy Google Analytics Cannot Be Used For Educational Web Content
Why Google Analytics Cannot Be Used For Educational Web Content Sanda-Maria Dragoş Chair of Computer Systems, Department of Computer Science Faculty of Mathematics and Computer Science Babes-Bolyai University
More informationMySQL databases as part of the Online Business, using a platform based on Linux
Database Systems Journal vol. II, no. 3/2011 3 MySQL databases as part of the Online Business, using a platform based on Linux Ion-Sorin STROE Romanian Academy of Economic Studies Romana Sq, no 6, 1 st
More informationCRM Analytics - Techniques for Analysing Business Data
CRM Analytics - Techniques for Analysing Business Data Steve Zangari Partner Director EMEA Agenda» Brief introduction to Zap» CRM Analytics The importance The challenges The value» Leverage existing technology
More informationRadware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
More informationSystem Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
More informationLinux versus Windows Hosting Plus complete list of features from CompuTech
Linux versus Windows Hosting Plus complete list of features from CompuTech Most hosting companies, including CompuTech Computing, will offer you hosting for your website on servers that are running either
More informationInstitutional Repositories: Staff and Skills Set
SHERPA Document Institutional Repositories: Staff and Skills Set University of Nottingham 25 th August 2009 Circulation PUBLIC Mary Robinson University of Nottingham Introduction This document began in
More informationA Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India Sharmasakshi1009@gmail.com,
More informationW3Perl A free logfile analyzer
W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed
More informationAccelerating Audits with Automation: Who s Accessing Your Unstructured Data?
Contents of This Paper Available Tools... 2 The Solution... 2 A Closer Look... 2 Accessing Folders... 3 Who s Authorizing Users... 4 Tracking Key Files... 5 Tracking the Last User of a File... 5 Matching
More informationClustering as an add-on for firewalls
Clustering as an add-on for firewalls C. Caruso & D. Malerba Dipartimento di Informatica, University of Bari, Italy. Abstract The necessary spread of the access points to network services makes them vulnerable
More informationWeb Site Hosting Services
Web Site Hosting Services Putting your Web Site online with robust, reliable service Web hosting is what you need to put a website online on the internet it s the space where your website lives. Different
More informationData mining for the analysis of content interaction in web-based learning and training systems
Data mining for the analysis of content interaction in web-based learning and training systems C. Pahl Dublin City University, School of Computing, Dublin 9, Ireland Abstract Data mining is based on the
More informationA Sun Javafx Based Data Analysis Tool for Real Time Web Usage Mining
A Sun Javafx Based Data Analysis Tool for Real Time Web Usage Mining Kiran Patidar Department of Computer Engineering Padmashree Dr.D.Y. Patil Institute of Engineering And Technology Pimpri,Pune Abstract-
More informationWeb Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
More informationIntrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
More informationLOCAL CRM APPLICATION FOR BILLBOARD ADVERTISING COMPANY
advertising company, billboard, customer relationship management, cloud computing, software as a service, Radosław URBAŃSKI * LOCAL CRM APPLICATION FOR BILLBOARD ADVERTISING COMPANY Abstract The article
More informationAXT JOBS GUI Users Guide
AXT JOBS GUI Users Guide Content 1 Preface... 3 1.1 Audience... 3 1.2 Typographic conventions... 3 1.3 Requirements... 3 1.4 Acknowledgements... 3 1.5 Additional information... 3 2 Introduction... 3 3
More informationFramework of Web Applications for Protection against Illegal Access
Framework of Web Applications for Protection against Illegal Access V Satoru Torii V Yoshiki Higashikado V Takayoshi Kurita (Manuscript received December 15, 2003) The use of Web-based application servers
More informationSecurity from the Cloud
Security from the Cloud Remote Vulnerability Scanning Writer: Peter Technical Review: David Contact: info@hackertarget.com Published: April 2008 Summary: This white paper describes advantages of using
More informationNetwork Traffic Monitoring With Attacks and Intrusion Detection System
International Journal of Education and Science Research Review E-ISSN 2348-6457 Volume-3, Issue-2 April- 2016 Network Traffic Monitoring With Attacks and Intrusion Detection System Vivek Kumar Pathak,
More informationDMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support
DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support Rok Rupnik, Matjaž Kukar, Marko Bajec, Marjan Krisper University of Ljubljana, Faculty of Computer and Information
More informationWhere can I install GFI EventsManager on my network?
Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location
More informationAugmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
More informationThe Complete Telecommunications Solution. Telecommunications Resellers. Mobile Virtual Network Operators (MVNO) Internet Service Providers
TELCO-bill The Complete Telecommunications Solution One single bill, per customer account, that combines all services, equipment and payments into the next generation of bill presentment that all demanding
More informationPROVIDING INSIGHT FOR OPERATIONAL SUCCESS
idashboards for Operations Management PROVIDING INSIGHT FOR OPERATIONAL SUCCESS idashboards helped Precoat move from manual data mining and paper reports to a system that allows us to identify best practices
More informationQuery Optimization in Teradata Warehouse
Paper Query Optimization in Teradata Warehouse Agnieszka Gosk Abstract The time necessary for data processing is becoming shorter and shorter nowadays. This thesis presents a definition of the active data
More informationFree Network Monitoring Software for Small Networks
Free Network Monitoring Software for Small Networks > WHITEPAPER Introduction Networks are becoming critical components of business success - irrespective of whether you are small or BIG. When network
More informationData Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
More informationHW9 WordPress & Google Analytics
HW9 WordPress & Google Analytics MSCI:3400 Data Communications Due Monday, December 14, 2015 @ 8:00am Late submissions will not be accepted. In this individual assignment you will purchase and configure
More information5 Mistakes to Avoid on Your Drupal Website
5 Mistakes to Avoid on Your Drupal Website Table of Contents Introduction.... 3 Architecture: Content.... 4 Architecture: Display... 5 Architecture: Site or Functionality.... 6 Security.... 8 Performance...
More informationRed Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform
More informationResearch of Postal Data mining system based on big data
3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication
More informationRefog. Maxim Ananov, REFOG Help Desk
Refog Maxim Ananov, REFOG Help Desk 1. How does it work? Is it installed locally or does it work in the cloud? System administrator installs Refog Monitor on a computer that is to be used to. Installation
More informationThe integrated CRM & office management solution The valuable tool to optimize, control and streamline your business The complete solution for your
The integrated CRM & office management solution The valuable tool to optimize, control and streamline your business The complete solution for your administrative, marketing, sales and finance department
More informationRed Hat Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.
More informationimhosted Web Hosting Knowledge Base
imhosted Web Hosting Knowledge Base Getting Started Category Contents Getting Started 1 My site loads slowly, what's wrong? 1 My pages aren't being updated when I upload... 2 Creating secure passwords...
More informationLog analyzer programs for distance education systems
Available online at www.sciencedirect.com Procedia Social and Behavioral Sciences 9 (2010) 1208 1213 WCLTA 2010 Log analyzer programs for distance education systems hsan Güne a *, Muammer Akçay b, Gökhan
More informationLinux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
More information100% NO CODING NO DEVELOPING IMMEDIATE BUSINESS -25% -70% UNLIMITED SCALABILITY DEVELOPMENT TIME SOFTWARE STABILITY
100% UNLIMITED SCALABILITY TOTAL COST OF OWNERSHIP -25% +50% EFFICENCY INCREASE -70% +65% DEVELOPMENT TIME SOFTWARE STABILITY NO CODING NO DEVELOPING IMMEDIATE BUSINESS FlexyGo Rapid Application Builder
More informationNATIONAL CYBER DEFENSE COMPETITION. Competition Scenario
NATIONAL CYBER DEFENSE COMPETITION Competition Scenario IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER Spring 2011 To All IT Consultants: Welcome to CDC Financial! We re proud to be serving our customers
More information