Identification of Anomalous Clients’ Request by Analyzing Server Log File using Apache Hadoop Framework and Tableau

dc.contributor.authorBavathuja, V.
dc.contributor.authorRaahini, S.
dc.contributor.authorRamashini, M.
dc.contributor.authorWimaladharma, S.T.C.I.
dc.date.accessioned2019-04-06T08:33:22Z
dc.date.available2019-04-06T08:33:22Z
dc.date.issued2019-02
dc.description.abstractInformation systems provide information about its state and operation in the form of log records. These records are composed of log entries containing information related to a specific event, which can be related to security. Potential security breaches can be revealed by analyzing log files and looking for anomalies that occurred at a certain time during the device operation. Log files from proxy server of Uva Wellassa University of Sri Lanka will be analyzed using Hadoop Framework and Apache Pig in order to identify anomalous clients’ Request. Anomalous clients’ request identification refers to the problem of finding pattern in data that do not conform to expected behavior. These nonconforming patterns are often referred to as anomalies, outliers or exceptions in different application domains. Log files of a proxy server are created and maintained by the server itself and analyzing theses files will offer a valuable insight into server usage while they can be used in various applications, such as detecting intrusions on the web. The log files will be stored in Hadoop Distributed File System. Data preprocessing and analyzation will be done using Apache Pig: a platform for analyzing large data sets. The analyzed data will be reported through Tableau dashboard. According to the research study, the total number of records after cleaning is 817,426 and 856 unique IP addresses have accessed the proxy server from the period of Thursday, 26 April 2018 01:14:48.138 to the period of Friday, 27 April 2018 10:31:23.834. Several findings including the total visits and bandwidth were found and displayed using graph and charts. This information along with other findings can be applied to find solutions for many legitimate problems such as, user/customer behavior analysis, etc.en_US
dc.identifier.isbn9789550481255
dc.identifier.urihttp://erepo.lib.uwu.ac.lk/bitstream/handle/123456789/134/95.pdf?sequence=1&isAllowed=y
dc.language.isoenen_US
dc.publisherUva Wellassa University of Sri Lankaen_US
dc.subjectComputer Scienceen_US
dc.subjectInformation Scienceen_US
dc.subjectComputing and Information Scienceen_US
dc.titleIdentification of Anomalous Clients’ Request by Analyzing Server Log File using Apache Hadoop Framework and Tableauen_US
dc.title.alternativeInternational Research Conference 2019en_US
dc.typeOtheren_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
95.pdf
Size:
200.21 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: