Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2014, Vol. 37 ›› Issue (2): 93-98.doi: 10.13190/j.jbupt.2014.02.020

Previous Articles     Next Articles

Research of Web Access Log Analysis of Security Technology

ZHANG Feng1, FU Jun1, YANG Guang-hua1, JING Yi-xin2, TANG Wei2   

  1. 1. China Mobile Research Institute, Beijing 100032, China;
    2. Wuhan Huagonganding Information Technology Company, Wuhan 432100, China
  • Received:2013-10-18 Online:2014-04-28 Published:2014-04-08

Abstract:

With the vigorous development of Chinese Internet industry, Web services are more and more applied to various domains like government, education, finance and telecom to realize services such as e-government affairs, business promotion, online trading. The security threats based on Web services are more than any time before. It is insufficient of the traditional vulnerability scan and defense technology to evaluate the threat trend faced by Web server. Aiming at the analyses on the thread trend of Web server under large-scale complex environment, this paper proposes a method and system based on Web log for security threat analyses. It extracts security threat events from a mass of logs and then makes analyses. With the use of characteristic model of threat behavior, it is able to exactly find all kinds of threats to the Websites. Synthetical comprehensive risk index for this Website is given which could contribute to the Website's aiming at strengthening its integrated defense capability.

Key words: Web security, log analyses, risk evaluation, Web server

CLC Number: