[1] Agosti, Maristella, Crivellari, et al. Web log analysis:a review of a decade of studies about information acquisition, inspection and interpretation of user interaction[J]. Data Mining and Knowledge Discovery, 2010, 24(3): 663-696.[2] 钱秀槟, 李锦川, 方星. 信息安全事件定位中的Web日志分析方法[J]. 信息网络安全, 2010 (6): 79-80. Qian Xiubin, Li Jinchuan, Fang Xing. Information security event location in the web log analysis method[J]. Information Network Security, 2010(6): 79-80.[3] 武斌, 郑康锋, 杨义先. Honeynet中的告警日志分析[J]. 北京邮电大学学报, 2008, 31(6): 63-66. Wu Bin, Zheng Kangfeng, Yang Yixian. Analysis of alert correlation in honeynet[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(6): 63-66.[4] Suneetha K R, Krishnamoorthi R. Identifying user behavior by analyzing web server access log file[J]. IJCSNS International Journal of Computer Science and Network Security, 2009, 9(4): 327-332.[5] Hallam-Baker P M, Behlendorf B. Extended log file format[EB/OL]. 1996. http://www.w3.org/TR/WD-logfile.html. |