Publication:
Web proxy log classification for burst behavior

dc.contributor.authorNattapol Kiatkumjounwongen_US
dc.contributor.authorSudsanguan Ngamsuriyarojen_US
dc.contributor.authorAnon Plangprasopchoken_US
dc.contributor.otherMahidol Universityen_US
dc.contributor.otherThailand National Electronics and Computer Technology Centeren_US
dc.date.accessioned2018-12-21T07:22:37Z
dc.date.accessioned2019-03-14T08:03:29Z
dc.date.available2018-12-21T07:22:37Z
dc.date.available2019-03-14T08:03:29Z
dc.date.issued2017-02-08en_US
dc.description.abstract© 2016 IEEE. Many organizations and most Internet service providers need to keep the history of web accesses in the form of proxy logs. Such logs would be later used for web usage as well as for investigating abnormal activities including an abuse, a misuse or fraud. This paper classifies web proxy logs into normal, non-burst and burst. To filter out normal logs, we use Apriori algorithm in Weka mining tool to detect the outlier based on the duration and the bandwidth of logs for file categories. Burst logs are separated out from outlier logs using the threshold rates computed for file types. The experimental results show the majority of about 80% for normal logs, and burst logs count for about 2% which should be further investigated for unusual behavior. Since the number of logs kept on storage would be very huge, it would take a long time to process them timely. Thus, we measure the performance of parallel log processing on a Hadoop system with varying data size and the number of nodes. We found that the speedup of log processing is well corresponded to the increasing workload, and it would be convincing to process logs in real time.en_US
dc.identifier.citationIEEE Region 10 Annual International Conference, Proceedings/TENCON. (2017), 472-477en_US
dc.identifier.doi10.1109/TENCON.2016.7848044en_US
dc.identifier.issn21593450en_US
dc.identifier.issn21593442en_US
dc.identifier.other2-s2.0-85015402538en_US
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/20.500.14594/42440
dc.rightsMahidol Universityen_US
dc.rights.holderSCOPUSen_US
dc.source.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85015402538&origin=inwarden_US
dc.subjectComputer Scienceen_US
dc.subjectEngineeringen_US
dc.titleWeb proxy log classification for burst behavioren_US
dc.typeConference Paperen_US
dspace.entity.typePublication
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85015402538&origin=inwarden_US

Files

Collections