首页 | 本学科首页   官方微博 | 高级检索  
     


The design and implementation of web mining in web sites security
Authors:Li Jian  Zhang Guo-yin  Gu Guo-chang  Li Jian-li
Affiliation:(1) College of Computer Science and Technology, Harbin Engineering University, 150001 Harbin, China
Abstract:The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency.
Keywords:data mining  web log mining  web sites security  density-based clustering
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号