Log Analysis Using Temporal Logic and Reconstruction Approach: Web Server Case
نویسندگان
چکیده
We present a post-mortem log analysis method based on Temporal Logic (TL), Event Processing Language (EPL), and reconstruction approach. After showing that the proposed method could be adapted to any misuse event or attack, we specifically investigate the case of web server misuses. To this end, we examine five different misuses on WordPress web servers, and generate corresponding log files of these attacks for forensic analysis. Then we establish attack patterns and formalize them by means of a special case of temporal logic, i.e. many sorted first order metric temporal logic (MSFOMTL). Later on, we implement these attack patterns in the EPL, and performed experimental log analysis by using a time window mechanism sliding on sorted log records to evaluate effectiveness and efficacy of our proposed method. We found that our approach is potentially capable of providing a platform where investigators can define/store/share misuse patterns using a common language while providing fast and accurate forensic analysis on large log files.
منابع مشابه
The Reconstruction of the Interleaved Sessions from a Server Log
Session reconstruction is an essential step in Web usage mining. The quality of reconstructed sessions affects the result of Web usage mining. This paper presents a new approach of reconstructing sessions from Web server logs using the Markov chain model combined with a competitive algorithm. The proposed approach has the ability to reconstruct interleaved sessions from server logs. It is robus...
متن کاملA committee machine approach for predicting permeability from well log data: a case study from a heterogeneous carbonate reservoir, Balal oil Field, Persian Gulf
Permeability prediction problem has been examined using several methods such as empirical formulas, regression analysis and intelligent systems especially neural networks and fuzzy logic. This study proposes an improved and novel model for predicting permeability from conventional well log data. The methodology is integration of empirical formulas, multiple regression and neuro-fuzzy in a commi...
متن کاملWeb Usage Mining with Inductive Logic Programming
This paper suggests an experimental approach of how to apply inductive logic programming in the discovery of web usage patterns in the form of first-order rules representing user sessions. Such rules may be used to improve the quality and the performance of a web site. The experiment has been done using the Progol Inductive Logic Programming System, and the data source are log files from an Apa...
متن کاملAn Introduction to the Use of Fuzzy Mathematics in Archeology (Case Study: Virtual Reconstruction of Togrul Tower by Using Fuzzy Reliability)
Nowadays, the use of fuzzy mathematics and fuzzy logic are increasing in various sciences. Archaeology is one of the sciences that is less attended with the methods of fuzzy mathematics and fuzzy logic. Due to the nature of many archaeological data, however, the use of such methods in archaeology can be beneficial. In this research, it has been tried to explain applications of fuzzy logic and f...
متن کاملReliability Analysis of a Series and Parallel Network using Triangular Intuitionistic Fuzzy Sets
This paper describes a novel approach, based on intuitionistic fuzzy set theory for reliability analysis of series and parallel network. The triangular intuitionistic fuzzy sets are used to represent the failure possibility of each basic (terminal) event to get more comprehensive results for the failure possibility of the top event. The proposed technique is demonstrated on a web server LOG dat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JDFSL
دوره 11 شماره
صفحات -
تاریخ انتشار 2016