[HTML][HTML] Detection of attack-targeted scans from the Apache HTTP Server access logs
A web application could be visited for different purposes. It is possible for a web site to be
visited by a regular user as a normal (natural) visit, to be viewed by crawlers, bots, spiders …
visited by a regular user as a normal (natural) visit, to be viewed by crawlers, bots, spiders …
Good bot, bad bot: Characterizing automated browsing activity
As the web keeps increasing in size, the number of vulnerable and poorly-managed
websites increases commensurately. Attackers rely on armies of malicious bots to discover …
websites increases commensurately. Attackers rely on armies of malicious bots to discover …
Web runner 2049: Evaluating third-party anti-bot services
Given the ever-increasing number of malicious bots scouring the web, many websites are
turning to specialized services that advertise their ability to detect bots and block them. In …
turning to specialized services that advertise their ability to detect bots and block them. In …
Data preprocessing evaluation for web log mining: reconstruction of activities of a web visitor
Presumptions of each data analysis are data themselves, regardless of the analysis focus
(visit rate analysis, optimization of portal, personalization of portal, etc.). Results of selected …
(visit rate analysis, optimization of portal, personalization of portal, etc.). Results of selected …
Effective web log mining and online navigational pattern prediction
A Guerbas, O Addam, O Zaarour, M Nagi… - knowledge-based …, 2013 - Elsevier
Accurate web log mining results and efficient online navigational pattern prediction are
undeniably crucial for tuning up websites and consequently helping in visitors' retention …
undeniably crucial for tuning up websites and consequently helping in visitors' retention …
A soft computing approach for benign and malicious web robot detection
The accurate detection of web robot sessions from a web server log is essential to take
accurate traffic-level measurements and to protect the performance and privacy of …
accurate traffic-level measurements and to protect the performance and privacy of …
Detection of Web site visitors based on fuzzy rough sets
Despite emerging of Web 2.0 applications and increasing requirements to well-behaved
Web robots, malicious ones can reveal irreparable risks for Web sites. Regardless of …
Web robots, malicious ones can reveal irreparable risks for Web sites. Regardless of …
Characterization and classification of malicious Web traffic
K Goseva-Popstojanova, G Anastasovski… - Computers & …, 2014 - Elsevier
Web systems commonly face unique set of vulnerabilities and security threats due to their
high exposure, access by browsers, and integration with databases. This study is focused on …
high exposure, access by browsers, and integration with databases. This study is focused on …
An integrated method for real time and offline web robot detection
D Doran, SS Gokhale - Expert systems, 2016 - Wiley Online Library
Recent academic and industry reports confirm that web robots dominate the traffic seen by
web servers across the Internet. Because web robots crawl in an unregulated fashion, they …
web servers across the Internet. Because web robots crawl in an unregulated fashion, they …
Systems and methods of handling internet spiders
J Alexander - US Patent 7,987,173, 2011 - Google Patents
Aspects relate to identifying Internet spiders with an approach involving a plurality of
instances of one or more URLs, which reference resources available from a first domain …
instances of one or more URLs, which reference resources available from a first domain …