[HTML][HTML] Detection of attack-targeted scans from the Apache HTTP Server access logs

MB Seyyar, FÖ Çatak, E Gül - Applied computing and informatics, 2018 - Elsevier
A web application could be visited for different purposes. It is possible for a web site to be
visited by a regular user as a normal (natural) visit, to be viewed by crawlers, bots, spiders …

Good bot, bad bot: Characterizing automated browsing activity

X Li, BA Azad, A Rahmati… - 2021 IEEE symposium on …, 2021 - ieeexplore.ieee.org
As the web keeps increasing in size, the number of vulnerable and poorly-managed
websites increases commensurately. Attackers rely on armies of malicious bots to discover …

Web runner 2049: Evaluating third-party anti-bot services

B Amin Azad, O Starov, P Laperdrix… - Detection of Intrusions and …, 2020 - Springer
Given the ever-increasing number of malicious bots scouring the web, many websites are
turning to specialized services that advertise their ability to detect bots and block them. In …

Data preprocessing evaluation for web log mining: reconstruction of activities of a web visitor

M Munk, J Kapusta, P Švec - Procedia Computer Science, 2010 - Elsevier
Presumptions of each data analysis are data themselves, regardless of the analysis focus
(visit rate analysis, optimization of portal, personalization of portal, etc.). Results of selected …

Effective web log mining and online navigational pattern prediction

A Guerbas, O Addam, O Zaarour, M Nagi… - knowledge-based …, 2013 - Elsevier
Accurate web log mining results and efficient online navigational pattern prediction are
undeniably crucial for tuning up websites and consequently helping in visitors' retention …

A soft computing approach for benign and malicious web robot detection

M Zabihimayvan, R Sadeghi, HN Rude… - Expert Systems with …, 2017 - Elsevier
The accurate detection of web robot sessions from a web server log is essential to take
accurate traffic-level measurements and to protect the performance and privacy of …

Detection of Web site visitors based on fuzzy rough sets

J Hamidzadeh, M Zabihimayvan, R Sadeghi - Soft Computing, 2018 - Springer
Despite emerging of Web 2.0 applications and increasing requirements to well-behaved
Web robots, malicious ones can reveal irreparable risks for Web sites. Regardless of …

Characterization and classification of malicious Web traffic

K Goseva-Popstojanova, G Anastasovski… - Computers & …, 2014 - Elsevier
Web systems commonly face unique set of vulnerabilities and security threats due to their
high exposure, access by browsers, and integration with databases. This study is focused on …

An integrated method for real time and offline web robot detection

D Doran, SS Gokhale - Expert systems, 2016 - Wiley Online Library
Recent academic and industry reports confirm that web robots dominate the traffic seen by
web servers across the Internet. Because web robots crawl in an unregulated fashion, they …

Systems and methods of handling internet spiders

J Alexander - US Patent 7,987,173, 2011 - Google Patents
Aspects relate to identifying Internet spiders with an approach involving a plurality of
instances of one or more URLs, which reference resources available from a first domain …