Yue Sun, Sen Jing, Ranxin Gao, Bin Dong, Wei Chen, Xiaotian Xu
{"title":"Research on the Detection and Analysis Technology in Web Application Attacks Logs","authors":"Yue Sun, Sen Jing, Ranxin Gao, Bin Dong, Wei Chen, Xiaotian Xu","doi":"10.1109/ISCEIC53685.2021.00034","DOIUrl":null,"url":null,"abstract":"In order to improve the security protection ability and service quality of web application system, this paper focused on the analysis of attack types and characteristics of typical web application and studied the identification and detection technology of attacks logs with eigenvalue and semantic analysis. Finally, a multi-source aggregation analysis technology architecture of attacks logs for web application is proposed. Based on association analysis strategy, this architecture can effectively identify the attack behavior, predict the attack situation, and effectively improve the ability in resisting external threats of web application.","PeriodicalId":342968,"journal":{"name":"2021 2nd International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCEIC53685.2021.00034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In order to improve the security protection ability and service quality of web application system, this paper focused on the analysis of attack types and characteristics of typical web application and studied the identification and detection technology of attacks logs with eigenvalue and semantic analysis. Finally, a multi-source aggregation analysis technology architecture of attacks logs for web application is proposed. Based on association analysis strategy, this architecture can effectively identify the attack behavior, predict the attack situation, and effectively improve the ability in resisting external threats of web application.