Netinfo Security ›› 2017, Vol. 17 ›› Issue (3): 33-38.doi: 10.3969/j.issn.1671-1122.2017.03.006

• Orginal Article • Previous Articles     Next Articles

Research on Comprehensive Forensic Analysis Based on Logs2intrusions and Web Log Explorer

Jing YANG(), Xin ZHAO, Tianliang LU   

  1. School of Information Technology and Network Security, People’s Public Security University of China, Beijing 102600, China
  • Received:2016-11-01 Online:2017-03-20 Published:2020-05-12

Abstract:

With the rapid development of Internet applications, the security threat is becoming more and more serious, especially network intrusion attacks. At present, it is necessary for intrusion detection to analyze the log data. The website log file is a file that records various original information, such as web server receiving processing requests and run-time errors, but the effect of analyzing log data remains to be further improvement. This paper analyzed the characteristics of four log analysis tools,Logs2intrusions, Web Log Explorer, Light Year SEO Log Analysis System, Backfire Website Analyzer, and proposed the comprehensive forensic analysis technique based on the advantage of these tools. The technique, which have a certain value in combating cybercrime and maintaining network space security, achieve the rapid analysis of the log data from the large quantities of intrusion attacks, and improve the recognition accuracy of network intrusion attack.

Key words: network intrusion detection, logs2intrusions, Web Log Explorer, system log

CLC Number: