User Activity Investigation of a Web CRM System Based on the Log Analysis

Size: px
Start display at page:

Download "User Activity Investigation of a Web CRM System Based on the Log Analysis"

Transcription

1 User Activity Investigation of a Web CRM System Based on the Log Analysis Bogdan Trawiski and Marek Wróbel 1 1 Wrocław University of Technology, Institute of Applied Informatics, Wybrzee S. Wyspiaskiego 27, 5-37 Wrocław, Poland trawinski@pwr.wroc.pl, m.wrobel@icentrum.pl Abstract. There are many tools for the analysis of Web system log files based on statistical or web mining methods. However they do not always provide information specific for a given system. In the paper special method for investigation of the activity of web CRM system users is presented. The method has been designed and implemented in the web CRM system at a debt vindication company. There was basic foundation, that analysis should be carried in three time groups, i.e. working days in hours of work, working days beyond hours of work and idle days. Besides, system should make it possible to perform analysis for a chosen employee, position, day, hour and CRM system file. The results of investigation allowed to reveal anomalies in staff activity, what was not possible using common web log analyzer. 1. Introduction For years web logs have been the objects of numerous investigations which have provided valuable information used among others to assess quality of web site design, to trace user behaviour, to detect intrusions or adapt page content to user profiles [2,4,6,7,]. To carry research many tools and methods have been developed. These tools are based on statistical web log analysis and the methods of web log mining [1,5]. One of the most popular and rich in functions web log analyzers is the AWStats [3]. It enables to explore the logs of WWW, ftp and mail servers. Using the AWStats to investigate staff activity of a debt vindication company on the basis of Web CRM system logs has proved to be unsatisfactory [8]. So that, in order to obtain information needed by the company management, a new analytical module for the CRM system has been designed and implemented. Specific method has been elaborated to make it possible to compare the activity of individual employee and individual position with the average activity within an hour, a day, a month. 2. The Web CRM System Investigated The system investigated was a web CRM system used in a debt vindication company. The system has been designed specially for that company to meet its specific needs. It has been implemented using PHP script language and accommodated for cooperation

2 with Apache web server. It assures communication with PostgreSQL database management system. Therefore the system has an efficient database and functionality based on transactions and stored procedures. It has been deployed on the Linux operating system of Fedora distribution. The system consists of several functional modules: Communication announcement board, address book, phone book, document management, client, SMS gate, Office service clients, orders, meetings, Marketing client profitability analysis, company web site management, Accounting data exchange with the Videotel system, Call-center billings, Fax management incoming faxes, faxes sent, describing the content of faxes. Detailed data of the system usage have been collected from the start of its operation. Firstly, the Apache web server maintains logs of all requests. Its monthly logs are saved in text files of the size of approximately 5 MB. Secondly, the PHP code contains an audit procedure which is executed before each script. This procedure writes its own log which holds information of a user, data he sent to forms, etc. Results of exploration of data from the period of the month of May 24 contained in this log are discussed in the present paper. 3. Purpose and Method of the Analysis Analysis of the behaviour of employees is very important, because it provides a big amount of information which can be used to assess and compare their work as well as to find irregularities in their work. An anomaly takes place in such period of time, when an employee works otherwise than his colleagues or than he worked earlier. May be something wrong happens, for example a salesman intends to quit work and collects data of company clients. Important is also to know how heavily the system is used, because then it may be possible to prevent the situation, when overloaded system disturbs staff to work efficiently. The usage of the CRM system was explored using the AWStats analyzer [3]. However information delivered by the AWStats proved to be insufficient to analyze behaviour of employees [8]. In order to obtain information needed by the company management, a special module of analysis has been designed and programmed. There was basic foundation, that analysis should be carried in three time groups, i.e. working days in hours of work, working days beyond hours of work, idle days. In order to optimize the effectiveness of data processing, all data were aggregated for each hour of each day. Moreover, two fields were added to determine working days and working hours. In order to be able to compare data the measure of mean unit activity (MUA) was defined. The MUA is a number of file accesses within successive hour in a given day falling on one user operating this time. For example the MUA of 2 at sixteen o clock on May 6th means that the average number of file accesses per

3 one user within this hour was 2. The analysis was carried out for data for the period of May 24. Within this month the Web system was loaded heavily mainly during working days and the number of users was between 5 and 6. Every day the server received from 25 to 3 thousand requests, what generated 2-3 MB of data transfer. It means that for a working days there was approximately 1 request per second and the loading about KB. So the monthly data transfer reached 5 GB. 4. Results of the Investigation 4.1. The analysis of daily activity The purpose of first series of analysis was to show how the activity changed on a dayby-day basis within one month. Figures 1 and 2 show the distribution of activity (MUA) on working days in hours of work and working days beyond hours of work respectively. At first sight, it can be seen, that activity was unnatural big beyond hours of work on May 6 th w orking days in May 24 Fig. 1. Daily activity of whole staff during working days in hours of work in May w orking days in May 24 Fig. 2. Daily activity of whole staff during working days beyond hours of work Further analyses of the activity of work postings enabled to detect the position of work and the employee responsible for this anomaly (Fig. 3). In Figure 3 the dashed

4 line shows the activity of all postings while the continuous line presents the activity of the first posting only w orking days in May 24 Fig. 3. Daily activity of the first posting in May hours Fig. 4. Hourly activity of whole staff during work days in May The analysis of hourly activity The analysis provides information of what is the distribution of staff activity on individual hours of a day. Figure 4 shows how the activity changed on a hour-by-hour basis during working days in May 24. It can be easily noticed, that working day began at eight o clock and ended at sixteen o clock. The anomaly of greater activity at nineteen o clock can also be noticed. But the Figure 5 presenting hourly activity on May 6 th indicates the anomaly clearly. In the Figure 5 a continuous line shows the activity on a given day, while a dashed line presents an average activity within whole month. It can be seen that until seventeen o clock daily activity was similar to monthly one, but later it started to increase.

5 hours Fig. 5. Hourly activity of whole staff on May 6th The analysis of the activity of position, employee and file The analysis of the activity of position revealed that the activity of first position (negotiators) did not conform to the average activity. It led to the conclusion that exactly the negotiators were responsible for the anomaly. The graphs representing the behaviour of individual employees allowed to determine which negotiator worked abnormally. In turn the graph in Figure 6 indicated which files were used heavily that day. It turned out later, that instead of performing his usual work, the negotiator was describing the content of fax documents. number of uses Fig. 6. File activity on May 6th beyond working hours 5. Conclusions and Future Works All the tools and functions implemented to trace the behaviour of the company staff have proved to be useful. The anomalies could be detected and observed thoroughly. Due to the possibility to filter data and to compare individual data with average values, new information has been revealed. Such information was not available using common web log analyzer. The analysis carried separately for working days and idle days as well as for working hours has also turned out helpful. Using the measure of

6 mean unit activity (MUA) has produced statistics on which anomalies were shown clearly. It is planned to develop new analytical functions of our tools, as the possibility to define the range of days, hours, groups of employees and files. In order to make our investigations closer to human perception of time new fuzzy time periods have been designed. They are night, dawn, morning, lunch time, afternoon and evening. The definitions of the fuzzy time periods are shown in Figure 7. Besides, implementing of some intelligent mechanisms will enable us to detect anomalies automatically. degree of membership morning lunch time hours Fig. 7. Fuzzy definitions of time periods References 1. Ajith, A.: Business Intelligence from Web Usage Mining. Journal of Information & Knowledge Management 2 (23) Eirinaki M., Vazirgiannis M.: Web mining for web personalization. ACM Transactions on Internet Technology 3 (23) Free powerful and featureful tool that generates advanced web, ftp or mail server statistics, graphically (24) 4. Kruegel, C., Vigna, G.: Anomaly detection of web-based attacks. In Proceedings of the th ACM Conference on Computer and Communications Security (23) 5. Robertson, J.: The Value of Web Statistics (21) 222/km_2_27_2a.html 6. Srivastava, J., Cooley, R., Deshpande, M., Tan, P-T.: Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data. SIGKDD Explorations 1 (2) Wong, C., Shiu, S., Pal, S.: Mining Fuzzy Association Rules for web access case adaptation. In Proceedings of the Workshop Program at the Fourth International Conference on Case- Based Reasoning (21) 8. Wróbel, M.: CRM Systems. Design and Implementation for a Chosen Company. M.Sc. Thesis (in Polish). Wrocław University of Technology (24). Zawitz, M. W.: Web statistics - Measuring user activity. Bureau of Justice Statistics (18)

Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination

Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination 8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,

More information

A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors

A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors S. Bhuvaneswari P.G Student, Department of CSE, A.V.C College of Engineering, Mayiladuthurai, TN, India. bhuvanacse8@gmail.com

More information

A Design and Implementation of a Web Server Log File Analyzer

A Design and Implementation of a Web Server Log File Analyzer A Design and Implementation of a Web Server Log File Analyzer Yu-Hsin Cheng 1, Chien-Hung Huang 2 1 Department of Information Management, Ling Tung University No. 1, Ling tung Rd., Taichung, Taiwan 2 Department

More information

Research and Development of Data Preprocessing in Web Usage Mining

Research and Development of Data Preprocessing in Web Usage Mining Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the

More information

Preprocessing Web Logs for Web Intrusion Detection

Preprocessing Web Logs for Web Intrusion Detection Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer

More information

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Jaswinder Kaur #1, Dr. Kanwal Garg #2 #1 Ph.D. Scholar, Department of Computer Science & Applications Kurukshetra University,

More information

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI

More information

A Survey on Web Mining From Web Server Log

A Survey on Web Mining From Web Server Log A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering

More information

DEVELOPMENT OF WEB USAGE MINING TOOLS TO ANALYZE THE WEB SERVER LOGS USING ARTIFICIAL INTELLIGENCE TECHNIQUES

DEVELOPMENT OF WEB USAGE MINING TOOLS TO ANALYZE THE WEB SERVER LOGS USING ARTIFICIAL INTELLIGENCE TECHNIQUES DEVELOPMENT OF WEB USAGE MINING TOOLS TO ANALYZE THE WEB SERVER LOGS USING ARTIFICIAL INTELLIGENCE TECHNIQUES Mohd Helmy Abd Wahab, Nik Shahidah Afifi Md. Taujuddin, Zarina Tukiran Department of Computer

More information

Analysis of Server Log by Web Usage Mining for Website Improvement

Analysis of Server Log by Web Usage Mining for Website Improvement IJCSI International Journal of Computer Science Issues, Vol., Issue 4, 8, July 2010 1 Analysis of Server Log by Web Usage Mining for Website Improvement Navin Kumar Tyagi 1, A. K. Solanki 2 and Manoj Wadhwa

More information

Selecting the Right Active Directory Security Reports for Your Business

Selecting the Right Active Directory Security Reports for Your Business Selecting the Right Active Directory Security Reports for Your Business Avril Salter 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED.

More information

Towards Virtual Course Evaluation Using Web Intelligence

Towards Virtual Course Evaluation Using Web Intelligence Towards Virtual Course Evaluation Using Web Intelligence M.E. Zorrilla 1, D. Marín 1, and E. Álvarez 2 1 Department of Mathematics, Statistics and Computation, University of Cantabria. Avda. de los Castros

More information

ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING

ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING ISTANBUL UNIVERSITY JOURNAL OF ELECTRICAL & ELECTRONICS ENGINEERING YEAR VOLUME NUMBER : 2007 : 7 : 2 (379-386) ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING

More information

Higher Education Web Information System Usage Analysis with a Data Webhouse

Higher Education Web Information System Usage Analysis with a Data Webhouse Higher Education Web Information System Usage Analysis with a Data Webhouse Carla Teixeira Lopes 1 and Gabriel David 2 1 ESTSP/FEUP, Portugal carla.lopes@fe.up.pt 2 INESC-Porto/FEUP, Portugal gtd@fe.up.pt

More information

KOINOTITES: A Web Usage Mining Tool for Personalization

KOINOTITES: A Web Usage Mining Tool for Personalization KOINOTITES: A Web Usage Mining Tool for Personalization Dimitrios Pierrakos Inst. of Informatics and Telecommunications, dpie@iit.demokritos.gr Georgios Paliouras Inst. of Informatics and Telecommunications,

More information

Return On Investment XpoLog Center

Return On Investment XpoLog Center Return On Investment XpoLog Center ROI Management of XpoLog Center Business white paper May 2015 In This Document: 1. ROI Metrics and Examples 2. Total Summary of ROI and TCO 3. Real Life Use Cases and

More information

Discovery and Usage data for Software License Management

Discovery and Usage data for Software License Management Discovery and Usage data for Software License Management Is Microsoft SCCM the best solution? Many organizations use Microsoft s SCCM product as their primary software discovery method. Because SCCM is

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5)

Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5) Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5) CQURE Academy (3 days) Trainer: Grzegorz Tworek Grzegorz has extensive experience on Virtualization, Security, Infrastructure and

More information

Student Management Information System for Polish Universities at its Tenth Anniversary

Student Management Information System for Polish Universities at its Tenth Anniversary Student Management Information System for Polish Universities at its Tenth Anniversary Mariusz Czerniak Computer Center, Nicolaus Copernicus University, Plac Rapackiego, 87-00 Toruń, POLAND, Mariusz.Czerniak@umk.pl.

More information

An Enhanced Framework For Performing Pre- Processing On Web Server Logs

An Enhanced Framework For Performing Pre- Processing On Web Server Logs An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and

More information

Monitoring services in Service Oriented Architecture 1

Monitoring services in Service Oriented Architecture 1 Proceedings of the International Multiconference on ISSN 1896-7094 Computer Science and Information Technology, pp. 735 744 2007 PIPS Monitoring services in Service Oriented Architecture 1 Ilona Bluemke,

More information

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University

More information

Lesson 7 - Website Administration

Lesson 7 - Website Administration Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their

More information

Bisecting K-Means for Clustering Web Log data

Bisecting K-Means for Clustering Web Log data Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining

More information

2 Technologies for Security of the 2 Internet

2 Technologies for Security of the 2 Internet 2 Technologies for Security of the 2 Internet 2-1 A Study on Process Model for Internet Risk Analysis NAKAO Koji, MARUYAMA Yuko, OHKOUCHI Kazuya, MATSUMOTO Fumiko, and MORIYAMA Eimatsu Security Incidents

More information

The Operating System Lock Down Solution for Linux

The Operating System Lock Down Solution for Linux The Operating System Lock Down Solution for Linux The Challenge: Meeting Organizational Security Requirements Linux Operating System Security Operating system (OS) security is a priority for System Administrators

More information

How People Read Books Online: Mining and Visualizing Web Logs for Use Information

How People Read Books Online: Mining and Visualizing Web Logs for Use Information How People Read Books Online: Mining and Visualizing Web Logs for Use Information Rong Chen 1, Anne Rose 2, Benjamin B. Bederson 2 1 Department of Computer Science and Technique College of Computer Science,

More information

Website Development Plans

Website Development Plans Website Development Plans March 23 2014 SITE Expertise M-27, Jia Sarai, Near IIT Delhi, Hauz Khas, New Delhi-110016 Contact:- 01166575782, Email :- contact@siteexpertise.in, Website :- http://siteexpertise.in

More information

World Wide Web Personalization

World Wide Web Personalization World Wide Web Personalization Olfa Nasraoui Department of Computer Engineering and Computer Science Speed School of Engineering University of Louisville Louisville, KY 40292 USA voice: +1 502-852-0191

More information

NSC 93-2213-E-110-045

NSC 93-2213-E-110-045 NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends

More information

Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Web Server (Step 2) Creates HTML page dynamically from record set

Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Web Server (Step 2) Creates HTML page dynamically from record set Dawn CF Performance Considerations Dawn CF key processes Request (http) Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Query (SQL) SQL Server Queries Database & returns

More information

A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin

A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin A Prevention & Notification System By Using Firewall Log Data By Pilan Lin 1 Table Of Content ABSTRACT... 3 1 INTRODUCTION... 4 2. Firewall Log data... 6 2.1 How to collect log data... 6 3. Prevention

More information

Visualizing e-government Portal and Its Performance in WEBVS

Visualizing e-government Portal and Its Performance in WEBVS Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR ccfong@umac.mo Abstract An e-government

More information

Effective User Navigation in Dynamic Website

Effective User Navigation in Dynamic Website Effective User Navigation in Dynamic Website Ms.S.Nithya Assistant Professor, Department of Information Technology Christ College of Engineering and Technology Puducherry, India Ms.K.Durga,Ms.A.Preeti,Ms.V.Saranya

More information

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence Augmented Search for IT Data Analytics New frontier in big log data analysis and application intelligence Business white paper May 2015 IT data is a general name to log data, IT metrics, application data,

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5)

Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5) Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5) by Paula Januszkiewicz (3 days) Paula Januszkiewicz Paula Januszkiewicz is the world-known Security Expert. Loves to perform Penetration

More information

Quality Assurance in Learning Management by Web Mining Usage

Quality Assurance in Learning Management by Web Mining Usage Quality Assurance in Learning Management by Web Mining Usage Imre J. Rudas Óbuda University, John von Neumann Faculty of Informatics rudas@uni-obuda.hu Péter Tóth Óbuda University, Trefort Ágoston Centre

More information

PREPROCESSING OF WEB LOGS

PREPROCESSING OF WEB LOGS PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data

More information

Extension of Decision Tree Algorithm for Stream Data Mining Using Real Data

Extension of Decision Tree Algorithm for Stream Data Mining Using Real Data Fifth International Workshop on Computational Intelligence & Applications IEEE SMC Hiroshima Chapter, Hiroshima University, Japan, November 10, 11 & 12, 2009 Extension of Decision Tree Algorithm for Stream

More information

Web Personalization based on Usage Mining

Web Personalization based on Usage Mining Web Personalization based on Usage Mining Sharhida Zawani Saad School of Computer Science and Electronic Engineering, University of Essex, Wivenhoe Park, Colchester, Essex, CO4 3SQ, UK szsaad@essex.ac.uk

More information

COURSE CONTENT FOR WINTER TRAINING ON Web Development using PHP & MySql

COURSE CONTENT FOR WINTER TRAINING ON Web Development using PHP & MySql COURSE CONTENT FOR WINTER TRAINING ON Web Development using PHP & MySql 1 About WEB DEVELOPMENT Among web professionals, "web development" refers to the design aspects of building web sites. Web development

More information

A Survey on Web Mining Tools and Techniques

A Survey on Web Mining Tools and Techniques A Survey on Web Mining Tools and Techniques 1 Sujith Jayaprakash and 2 Balamurugan E. Sujith 1,2 Koforidua Polytechnic, Abstract The ineorable growth on internet in today s world has not only paved way

More information

GL550 - Enterprise Linux Security Administration

GL550 - Enterprise Linux Security Administration GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such

More information

ClockWork Enterprise 5

ClockWork Enterprise 5 ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork

More information

Augmented Search for Software Testing

Augmented Search for Software Testing Augmented Search for Software Testing For Testers, Developers, and QA Managers New frontier in big log data analysis and application intelligence Business white paper May 2015 During software testing cycles,

More information

AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING

AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 princemary26@gmail.com E. Baburaj Department of omputer Science & Engineering, Sun Engineering

More information

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: ogino@okinawa-ct.ac.jp

More information

ANATOMY OF A CODE RED II ATTACK

ANATOMY OF A CODE RED II ATTACK ANATOMY OF A CODE RED II ATTACK IMPROVING FIREWALL SECURITY USING PATROL FOR CHECK POINT FIREWALL-1 BILL KENNON, SENIOR SOFTWARE CONSULTANT BMC SOFTWARE, INC 1 The Surprise Attack As the NT Systems Administrator

More information

Reporting Installation Checklist

Reporting Installation Checklist This checklist is designed to help you before and during your Websense Enterprise Reporting installation. Print this checklist for reference as you prepare for and perform the installation, especially

More information

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management

More information

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS The web content providers sharing the content over the Internet during the past did not bother about the users, especially in terms of response time,

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion

More information

Online Enrollment and Administration System

Online Enrollment and Administration System FYP Proposal Report Real World Database Development by Kong Koon Kit Chan Yin Mo Leung Shiu Hong Advised by Prof. Frederick H. Lochovsky Submitted in partial fulfillment of the requirements for COMP 4981

More information

The FOSSology project

The FOSSology project The FOSSology project Bruno Cornec October 2012 Version 5.2 HP, EMEA Open Source Profession Lead Introducing Myself Software engineering and Unices since 1988 Mostly Configuration Management Systems (CMS),

More information

5nine Virtual Firewall 2.1 for Microsoft Hyper-V

5nine Virtual Firewall 2.1 for Microsoft Hyper-V KEY POINTS Secure your Hyper-V Virtual Machines & Virtual Servers Control Network Traffic In and Out of Your Virtual Machines & Virtual Servers Restrict Virtual Network Traffic Using Stateful Packet Filtering

More information

Graham Jones. Internet Psychologist. How to choose the right web host

Graham Jones. Internet Psychologist. How to choose the right web host Graham Jones Internet Psychologist How to choose the right web host 2008 Graham Jones All Rights Reserved. No part of this publication may be copied or stored in a retrieval system without the prior written

More information

Why Google Analytics Cannot Be Used For Educational Web Content

Why Google Analytics Cannot Be Used For Educational Web Content Why Google Analytics Cannot Be Used For Educational Web Content Sanda-Maria Dragoş Chair of Computer Systems, Department of Computer Science Faculty of Mathematics and Computer Science Babes-Bolyai University

More information

MySQL databases as part of the Online Business, using a platform based on Linux

MySQL databases as part of the Online Business, using a platform based on Linux Database Systems Journal vol. II, no. 3/2011 3 MySQL databases as part of the Online Business, using a platform based on Linux Ion-Sorin STROE Romanian Academy of Economic Studies Romana Sq, no 6, 1 st

More information

CRM Analytics - Techniques for Analysing Business Data

CRM Analytics - Techniques for Analysing Business Data CRM Analytics - Techniques for Analysing Business Data Steve Zangari Partner Director EMEA Agenda» Brief introduction to Zap» CRM Analytics The importance The challenges The value» Leverage existing technology

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

System Specification. Author: CMU Team

System Specification. Author: CMU Team System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect

More information

Linux versus Windows Hosting Plus complete list of features from CompuTech

Linux versus Windows Hosting Plus complete list of features from CompuTech Linux versus Windows Hosting Plus complete list of features from CompuTech Most hosting companies, including CompuTech Computing, will offer you hosting for your website on servers that are running either

More information

Institutional Repositories: Staff and Skills Set

Institutional Repositories: Staff and Skills Set SHERPA Document Institutional Repositories: Staff and Skills Set University of Nottingham 25 th August 2009 Circulation PUBLIC Mary Robinson University of Nottingham Introduction This document began in

More information

A Review on Network Intrusion Detection System Using Open Source Snort

A Review on Network Intrusion Detection System Using Open Source Snort , pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India Sharmasakshi1009@gmail.com,

More information

W3Perl A free logfile analyzer

W3Perl A free logfile analyzer W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed

More information

Accelerating Audits with Automation: Who s Accessing Your Unstructured Data?

Accelerating Audits with Automation: Who s Accessing Your Unstructured Data? Contents of This Paper Available Tools... 2 The Solution... 2 A Closer Look... 2 Accessing Folders... 3 Who s Authorizing Users... 4 Tracking Key Files... 5 Tracking the Last User of a File... 5 Matching

More information

Clustering as an add-on for firewalls

Clustering as an add-on for firewalls Clustering as an add-on for firewalls C. Caruso & D. Malerba Dipartimento di Informatica, University of Bari, Italy. Abstract The necessary spread of the access points to network services makes them vulnerable

More information

Web Site Hosting Services

Web Site Hosting Services Web Site Hosting Services Putting your Web Site online with robust, reliable service Web hosting is what you need to put a website online on the internet it s the space where your website lives. Different

More information

Data mining for the analysis of content interaction in web-based learning and training systems

Data mining for the analysis of content interaction in web-based learning and training systems Data mining for the analysis of content interaction in web-based learning and training systems C. Pahl Dublin City University, School of Computing, Dublin 9, Ireland Abstract Data mining is based on the

More information

A Sun Javafx Based Data Analysis Tool for Real Time Web Usage Mining

A Sun Javafx Based Data Analysis Tool for Real Time Web Usage Mining A Sun Javafx Based Data Analysis Tool for Real Time Web Usage Mining Kiran Patidar Department of Computer Engineering Padmashree Dr.D.Y. Patil Institute of Engineering And Technology Pimpri,Pune Abstract-

More information

Web Forensic Evidence of SQL Injection Analysis

Web Forensic Evidence of SQL Injection Analysis International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University

More information

Intrusion Detection System using Log Files and Reinforcement Learning

Intrusion Detection System using Log Files and Reinforcement Learning Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT

More information

LOCAL CRM APPLICATION FOR BILLBOARD ADVERTISING COMPANY

LOCAL CRM APPLICATION FOR BILLBOARD ADVERTISING COMPANY advertising company, billboard, customer relationship management, cloud computing, software as a service, Radosław URBAŃSKI * LOCAL CRM APPLICATION FOR BILLBOARD ADVERTISING COMPANY Abstract The article

More information

AXT JOBS GUI Users Guide

AXT JOBS GUI Users Guide AXT JOBS GUI Users Guide Content 1 Preface... 3 1.1 Audience... 3 1.2 Typographic conventions... 3 1.3 Requirements... 3 1.4 Acknowledgements... 3 1.5 Additional information... 3 2 Introduction... 3 3

More information

Framework of Web Applications for Protection against Illegal Access

Framework of Web Applications for Protection against Illegal Access Framework of Web Applications for Protection against Illegal Access V Satoru Torii V Yoshiki Higashikado V Takayoshi Kurita (Manuscript received December 15, 2003) The use of Web-based application servers

More information

Security from the Cloud

Security from the Cloud Security from the Cloud Remote Vulnerability Scanning Writer: Peter Technical Review: David Contact: info@hackertarget.com Published: April 2008 Summary: This white paper describes advantages of using

More information

Network Traffic Monitoring With Attacks and Intrusion Detection System

Network Traffic Monitoring With Attacks and Intrusion Detection System International Journal of Education and Science Research Review E-ISSN 2348-6457 Volume-3, Issue-2 April- 2016 Network Traffic Monitoring With Attacks and Intrusion Detection System Vivek Kumar Pathak,

More information

DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support

DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support Rok Rupnik, Matjaž Kukar, Marko Bajec, Marjan Krisper University of Ljubljana, Faculty of Computer and Information

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

The Complete Telecommunications Solution. Telecommunications Resellers. Mobile Virtual Network Operators (MVNO) Internet Service Providers

The Complete Telecommunications Solution. Telecommunications Resellers. Mobile Virtual Network Operators (MVNO) Internet Service Providers TELCO-bill The Complete Telecommunications Solution One single bill, per customer account, that combines all services, equipment and payments into the next generation of bill presentment that all demanding

More information

PROVIDING INSIGHT FOR OPERATIONAL SUCCESS

PROVIDING INSIGHT FOR OPERATIONAL SUCCESS idashboards for Operations Management PROVIDING INSIGHT FOR OPERATIONAL SUCCESS idashboards helped Precoat move from manual data mining and paper reports to a system that allows us to identify best practices

More information

Query Optimization in Teradata Warehouse

Query Optimization in Teradata Warehouse Paper Query Optimization in Teradata Warehouse Agnieszka Gosk Abstract The time necessary for data processing is becoming shorter and shorter nowadays. This thesis presents a definition of the active data

More information

Free Network Monitoring Software for Small Networks

Free Network Monitoring Software for Small Networks Free Network Monitoring Software for Small Networks > WHITEPAPER Introduction Networks are becoming critical components of business success - irrespective of whether you are small or BIG. When network

More information

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Data Mining in Web Search Engine Optimization and User Assisted Rank Results Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management

More information

HW9 WordPress & Google Analytics

HW9 WordPress & Google Analytics HW9 WordPress & Google Analytics MSCI:3400 Data Communications Due Monday, December 14, 2015 @ 8:00am Late submissions will not be accepted. In this individual assignment you will purchase and configure

More information

5 Mistakes to Avoid on Your Drupal Website

5 Mistakes to Avoid on Your Drupal Website 5 Mistakes to Avoid on Your Drupal Website Table of Contents Introduction.... 3 Architecture: Content.... 4 Architecture: Display... 5 Architecture: Site or Functionality.... 6 Security.... 8 Performance...

More information

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform

More information

Research of Postal Data mining system based on big data

Research of Postal Data mining system based on big data 3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication

More information

Refog. Maxim Ananov, REFOG Help Desk

Refog. Maxim Ananov, REFOG Help Desk Refog Maxim Ananov, REFOG Help Desk 1. How does it work? Is it installed locally or does it work in the cloud? System administrator installs Refog Monitor on a computer that is to be used to. Installation

More information

The integrated CRM & office management solution The valuable tool to optimize, control and streamline your business The complete solution for your

The integrated CRM & office management solution The valuable tool to optimize, control and streamline your business The complete solution for your The integrated CRM & office management solution The valuable tool to optimize, control and streamline your business The complete solution for your administrative, marketing, sales and finance department

More information

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.

More information

imhosted Web Hosting Knowledge Base

imhosted Web Hosting Knowledge Base imhosted Web Hosting Knowledge Base Getting Started Category Contents Getting Started 1 My site loads slowly, what's wrong? 1 My pages aren't being updated when I upload... 2 Creating secure passwords...

More information

Log analyzer programs for distance education systems

Log analyzer programs for distance education systems Available online at www.sciencedirect.com Procedia Social and Behavioral Sciences 9 (2010) 1208 1213 WCLTA 2010 Log analyzer programs for distance education systems hsan Güne a *, Muammer Akçay b, Gökhan

More information

Linux VPS with cpanel. Getting Started Guide

Linux VPS with cpanel. Getting Started Guide Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3

More information

100% NO CODING NO DEVELOPING IMMEDIATE BUSINESS -25% -70% UNLIMITED SCALABILITY DEVELOPMENT TIME SOFTWARE STABILITY

100% NO CODING NO DEVELOPING IMMEDIATE BUSINESS -25% -70% UNLIMITED SCALABILITY DEVELOPMENT TIME SOFTWARE STABILITY 100% UNLIMITED SCALABILITY TOTAL COST OF OWNERSHIP -25% +50% EFFICENCY INCREASE -70% +65% DEVELOPMENT TIME SOFTWARE STABILITY NO CODING NO DEVELOPING IMMEDIATE BUSINESS FlexyGo Rapid Application Builder

More information

NATIONAL CYBER DEFENSE COMPETITION. Competition Scenario

NATIONAL CYBER DEFENSE COMPETITION. Competition Scenario NATIONAL CYBER DEFENSE COMPETITION Competition Scenario IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER Spring 2011 To All IT Consultants: Welcome to CDC Financial! We re proud to be serving our customers

More information