A Generator of Synthetic Access Logs that Contain Realistic User Behavior Patterns
نویسندگان
چکیده
Generating high quality synthetic data for testing algorithms and system implementations is challenging. This research designed and developed a tool called QUAlity Synthetic Information Log Generator (Quasi-Log) to facilitate the development and testing of a new series of Information Discovery Systems (IDS) that focus on detecting User Behavior Patterns to improve the quality, security and potential profitability of systems. Quasi-Log is a powerful and highly configurable synthetic event log generation engine with advanced support for semantic attributes and value sets, attribute correlations, event sequence pattern definitions and user behaviour pattern definitions. In this paper we discuss the design of Quasi-Log and provide empirical results to demonstrate that our tool is effective at generating semi-random log files that exhibit these interesting properties.
منابع مشابه
تشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی
Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...
متن کاملSynthesizing Scenario-based Dataset for User Behavior Pattern Mining
User behavior pattern mining has drawn great attention in business and security areas. Realistic and accurate datasets are required for evaluating various user behavior pattern mining approaches, their implementations and optimization results. Synthetic datasets are crucial due to restricted access to production datasets, security and privacy issues, meeting specific needs of consumers, or the ...
متن کاملSimulation of Real-world Event Repositories for Evaluation of Data Analytics Solutions: Case of User Behavior Pattern Recovery
Due to the lack of access to the real-world event-log repositories in critical domains such as healthcare and banking, the evaluation and maintenance of data analytics algorithms has become a challenge. Generating synthetic log repositories that simulate a variety of complex real-world event-log repositories will be an effective way of producing benchmarks to evaluate data analytics algorithms ...
متن کاملA User-Oriented Synthetic Workload Generator
v A user-oriented synthetic workload generator that simulates users' file access behavior based on real workload characterization is described. The model for this workload generator is (i) user-oriented and job-unspecific, (ii) represents file I/O operations at the system call level, (iii) allows general distributions for the usage measures, and (iv) assumes independence in the file I/O operati...
متن کاملHierarchical Characterization and Generation of Blogosphere Workloads
We present a thorough characterization of the access patterns in blogspace, which comprises a rich interconnected web of blog postings and comments by an increasingly prominent user community that collectively define what has become known as the blogosphere. Our characterization of over 35 million read, write, and management requests spanning a 28-day period is done at three different levels. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015