The design and implementation of web mining in web sites security

Jian Li , Guo-yin Zhang , Guo-chang Gu , Jian-li Li

Journal of Marine Science and Application ›› 2003, Vol. 2 ›› Issue (1) : 81 -86.

PDF
Journal of Marine Science and Application ›› 2003, Vol. 2 ›› Issue (1) : 81 -86. DOI: 10.1007/BF02935582
Article

The design and implementation of web mining in web sites security

Author information +
History +
PDF

Abstract

The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information, so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density-Based Clustering technique is used to reduce resource cost and obtain better efficiency.

Keywords

data mining / web log mining / web sites security / density-based clustering

Cite this article

Download citation ▾
Jian Li, Guo-yin Zhang, Guo-chang Gu, Jian-li Li. The design and implementation of web mining in web sites security. Journal of Marine Science and Application, 2003, 2(1): 81-86 DOI:10.1007/BF02935582

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Kosala R, Blockeel H. Web mining research: a survey [J]. ACM SIGKDD Explorations, 2000, 1(2): 1-15

[2]

Krishnapuram R, Joshi A, Nasraoui A. Low-complexity fuzzy relational clustering algorithms for web mining [J]. IEEE Transactions on Fuzzy System, 2001, 4(9): 595-607

[3]

Strivastava J, Cooleyz R, Deshpande M, et al. Web usage mining: discovery and applications of usage patterns from web data [J]. ACM SIGKDD Explorations, 2000, 2(2): 12-23

[4]

Mortazavi B. Discovering and mining user Web-page traversal patterns [D]. 2001, Burnaby: Simon Fraser University

[5]

Mobasher B, Dai H, Luo T, et al. Effective personalization based on association rule discovery from Web usage data [A], Web Information and Data Management (WIDM2001) [C]. 2001, Atlanta: ACM Workshop

[6]

MOBASHER B, DAI H, LUO T, et al. Improving the effectiveness of collaborative filtering on anonymous web usage data [A]. 2001 Workshop on Intelligent Techniques for Web Personalization (ITWP2001) [C]. Washington, 2001.

[7]

MOBASHER B, DAI H, LUO T,et al. Integrating Web usage and content mining for more effective personalization [A]. International Conference on E-Commerce and Web Technologies (ECWeb2000) [C]. Greenwich, 2000.

[8]

MADRIA S K, BHOWMICK S S, NG W K,et al. Research issues in Web data mining [A]. Data warehousing and knowledge discovery first international conference [C]. Florence, 1999.

[9]

JOSHI A, KRISHNAPURAM R. On mining Web access logs [A]. ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery 2000 [C]. Dallas, 2000.

[10]

Ester M, Kriegel H P, Xu X. A density-based algorithm for discovering clusters in large spatial databases with noise [A]. The second International Conference on Knowledge Discovery and Data Mining (KDD ’96) [C]. 1996, Menlo Park: AAAI Press

AI Summary AI Mindmap
PDF

130

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/