z-logo
open-access-imgOpen Access
An Approach to Understand the End User Behavior through Log Analysis
Author(s) -
Nikhil Kumar Singh,
Deepak Singh Tomar,
Bhola Nath Roy
Publication year - 2010
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/953-1330
Subject(s) - computer science , data science , information retrieval
the end user in the web environment is a mind- numbing task. Huge amount of operational data is generated when end user interacts in web environment. This generated operational data is stored in various logs and may be useful source of capturing the end user activates. Pointing out the suspicious user in a web environment is a challenging task. To conduct efficient investigation in cyber space the available logs should be correlated. In this paper a prototype system is developed and implemented which is based on relational algebra to build the chain of evidence. The prototype system is used to preprocess the real generated data from logs and classify the suspicious user based on decision tree. At last various challenges in the logs managements are presented. Keywordsforensic; log file; correlation; decision tree,chain of evidence ,cyber crime;.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom