Netinfo Security ›› 2017, Vol. 17 ›› Issue (3): 33-38.doi: 10.3969/j.issn.1671-1122.2017.03.006
• Orginal Article • Previous Articles Next Articles
Jing YANG(), Xin ZHAO, Tianliang LU
Received:
Online:
Published:
Abstract:
With the rapid development of Internet applications, the security threat is becoming more and more serious, especially network intrusion attacks. At present, it is necessary for intrusion detection to analyze the log data. The website log file is a file that records various original information, such as web server receiving processing requests and run-time errors, but the effect of analyzing log data remains to be further improvement. This paper analyzed the characteristics of four log analysis tools,Logs2intrusions, Web Log Explorer, Light Year SEO Log Analysis System, Backfire Website Analyzer, and proposed the comprehensive forensic analysis technique based on the advantage of these tools. The technique, which have a certain value in combating cybercrime and maintaining network space security, achieve the rapid analysis of the log data from the large quantities of intrusion attacks, and improve the recognition accuracy of network intrusion attack.
Key words: network intrusion detection, logs2intrusions, Web Log Explorer, system log
CLC Number:
TN919.8
Jing YANG, Xin ZHAO, Tianliang LU. Research on Comprehensive Forensic Analysis Based on Logs2intrusions and Web Log Explorer[J]. Netinfo Security, 2017, 17(3): 33-38.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2017.03.006
http://netinfo-security.org/EN/Y2017/V17/I3/33