74,523 Hits in 7.7 sec

Using google analytics to support cybersecurity forensics

Han Qin, Kit Riehle, Haozhen Zhao
2017 2017 IEEE International Conference on Big Data (Big Data)  
Rather than evaluating pieces of web traffic individually, the methodology seeks to emulate real user behavior by creating a new unit of analysis: the user session.  ...  To better understand the threat of malicious cyber actors, this study develops a methodology to monitor and evaluate web activity using data archived from Google Analytics.  ...  To address this challenge, the study develops a new unit of analysis: the user session.  ... 
doi:10.1109/bigdata.2017.8258385 dblp:conf/bigdataconf/QinRZ17 fatcat:hawhc7n7hfe2hphkzinj5y6nhq

Analysis and detection of low quality information in social networks

De Wang
2014 2014 IEEE 30th International Conference on Data Engineering Workshops  
For evolutionary study of low quality information, we present the results on large-scale study on Web spam and email spam over a long period of time.  ...  Furthermore, we provide activity-based detection approaches to filter out low quality information in social networks: click traffic analysis of short URL spam, behavior analysis of URL spam and information  ...  ACKNOWLEDGMENTS This research has been partially funded by National Science Foundation by CNS/SAVI (1250260), IUCRC/FRP (1127904) , CISE/CNS (1138666), RAPID (1138666), CISE/CRI (0855180), NetSE (0905493  ... 
doi:10.1109/icdew.2014.6818354 dblp:conf/icde/Wang14 fatcat:4gjrbwesubguvetpz25cdnpmmy

Web robot detection techniques: overview and limitations

Derek Doran, Swapna S. Gokhale
2010 Data mining and knowledge discovery  
Therefore, to aid in the development of a practically applicable robot detection technique, this survey presents a critical analysis and comparison of the prevalent detection approaches.  ...  Finally, we discuss why the contemporary techniques fail to offer a general solution to the robot detection problem and propose a set of key ingredients necessary for strong Web robot detection.  ...  H A is given by the percentage of requests in a session that are for an html, htm, jsp, or asp type resource. These metrics are combined to develop an automatic classifier for Web robot traffic.  ... 
doi:10.1007/s10618-010-0180-z fatcat:p5y2lsboafhjjc6yg2lntflyjq

Web analytics tools and web metrics tools: An overview and comparative analysis

Ivan Bekavac, Daniela Garbin Praničević
2015 Croatian Operational Research Review  
The aim of the paper is to compare and analyze the impact of web analytics tools for measuring the performance of a business model.  ...  The second section is a quantitative focus shifting from theory to an empirical approach, and which subsequently presents output data resulting from a study based on perceived user satisfaction of web  ...  Web analytics tools for mobile websites with a growing importance in line with an increase in website turnover caused by the use of mobile devices.  ... 
doi:10.17535/crorr.2015.0029 fatcat:zrtxxxbe6jg5pjjlmugmywn7dm

Modeling Support for Simulating Traffic Intensive Web Applications

Ka-I Pun, Kin-Chan Pau, Yain-Whar Si
2008 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology  
This paper describes our ongoing research on developing a modeling support environment for simulating traffic intensive Web applications.  ...  In addition, every hit does not necessarily lead to a successful completion of a transaction since users can navigate away to other Web sites during the browsing.  ...  Modeling support for simulating traffic intensive Web application Simulating traffic intensive Web application The aim of this project is to develop an integrated modeling environment for simulating  ... 
doi:10.1109/wiiat.2008.132 dblp:conf/iat/PunPS08 fatcat:nxwb5tsjq5cyvjf4p3e42hp47y

Performance modeling of web access over HSPA networks

Manuel Alvarez-Campana, Enrique Vazquez, Joan Vinyes
2010 International Congress on Ultra Modern Telecommunications and Control Systems  
The study focuses on Web traffic and includes analytical and simulation results, providing a basis for dimensioning and admission control in HSPA networks given the intended user quality of experience.  ...  The results show that the downlink channel capacity can be shared by several tens of Web users with a satisfactory quality.  ...  Secondly, we have developed a simulator, based on OPNET Modeler, that includes a more detailed model of the HSPA behavior and the Web traffic generated by the users.  ... 
doi:10.1109/icumt.2010.5676559 dblp:conf/icumt/Alvarez-CampanaVV10 fatcat:v5ycim43anfz5gok6vj22y2ovu

Modeling A Session-Based Bots' Arrival Process At A Web Server

Grazyna Suchacka, Daria Wotzka
2017 ECMS 2017 Proceedings edited by Zita Zoltay Paprika, Péter Horák, Kata Váradi, Péter Tamás Zwierczyk, Ágnes Vidovics-Dancs, János Péter Rádics  
The aim of our analysis was to develop a model of a session-based bot arrival process on a Web server which may be then implemented in a bot traffic generator integrated with a Web server simulator.  ...  The paper deals with the problem of modeling key features of the Web traffic generated by Internet bots, observed at the input of a Web server.  ...  ACKNOWLEDGEMENT Grażyna Suchacka is a member of the consortium ICT COST Action IC1406 "High-Performance Modeling and Simulation for Big Data Applications" (cHiPSet).  ... 
doi:10.7148/2017-0605 dblp:conf/ecms/SuchackaW17 fatcat:d7yx62o2brchfn6mu63yqwwncy

A Traffic Tracking Analysis Model for the Effective Management of E-commerce Transactions

Sylvanus A. Ehikioya, Shenghong Lu
2020 International Journal of Networked and Distributed Computing (IJNDC)  
In addition to basic analysis, we implement advanced analysis such as path analysis tree and user clustering. Path analysis is pivotal for Web site management and marketing in e-commerce.  ...  In modeling the tracking and analysis approach, we used a formal technique to guide quality assurance imperatives.  ...  Noreika and Drąsutis [32] propose website activity data analysis model based on a composition of website traffic and structure analysis models with intelligent methods.  ... 
doi:10.2991/ijndc.k.200515.006 doaj:dcc0822e04114c1787b127adc0cd5281 fatcat:2v5vymv3pfazhb6c7muqy3237e

The Effectiveness of Centralized Payment Network Advertisements on Digital Branding during the COVID-19 Crisis

Damianos P. Sakas, Ioannis Dimitrios G. Kamperos, Dimitrios P. Reklitis, Nikolaos T. Giannakopoulos, Dimitrios K. Nasiopoulos, Marina C. Terzi, Nikos Kanellos
2022 Sustainability  
In the final stage, an agent-based model is outlined in order to simulate and forecast a company's brand name visibility and user behavior.  ...  Crises are always challenging for banking systems. In the case of COVID-19, centralized payment networks and FinTech companies' websites have been affected by user behavior globally.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su14063616 fatcat:khh74cwoqzhr7dq4agtoewsmli

Empirical Models of End-User Network Behavior from NETI@home Data Analysis

Charles R Simpson, Dheeraj Reddy, George F Riley
2008 Simulation (San Diego, Calif.)  
There are two forms of models presented. The first models traffic for a specific TCP or UDP port. The second models all TCP or UDP traffic for an enduser.  ...  The simulation of computer networks requires accurate models of user behavior. To this end, we present empirical models of end-user network traffic derived from the analysis of NETI@home data.  ...  We use the model created for TCP port 80, the most common port used by World Wide Web servers, as an example, as it was studied in [13] .  ... 
doi:10.1177/0037549708099041 fatcat:6yzgyusn7fej5jrwpfnlffmvoq

Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace [chapter]

Haitao Xu, Zhao Li, Chen Chu, Yuanmi Chen, Yifan Yang, Haifeng Lu, Haining Wang, Angelos Stavrou
2018 Lecture Notes in Computer Science  
Based on data samples of traffic originating from web bots and normal users, we conduct a comparative analysis to uncover the behavioral patterns of web bots different from normal users.  ...  In this paper, we first propose an efficient approach to detect web bot traffic in a large e-commerce marketplace and then perform an in-depth analysis on the characteristics of web bot traffic.  ...  We would like to thank the anonymous reviewers for their valuable feedback. This work was partially supported by the U.S. NSF grant CNS-1618117 and DARPA XD3 Project HR0011-16-C-0055.  ... 
doi:10.1007/978-3-319-98989-1_8 fatcat:qgxn4jb4ofdqxms3oi7j2nuaoi

Source Traffic Modeling of Wireless Applications

Phuoc Tran-Gia, Dirk Staehle, Kenji Leibnitz
2001 AEU - International Journal of Electronics and Communications  
To plan these networks detailed models of data users with diverse applications are required. The purpose of this study is to provide practically usable traffic models for data users in GPRS networks.  ...  A practical model of mobile HTTP users, based on an extrapolation of WWW users in current wire-line networks, is presented; this model is expected to be accurate enough to be used in simulation studies  ...  user behavior model For a model of an activity phase it has to be clarified in which way E-Mail is used.  ... 
doi:10.1078/1434-8411-00005 fatcat:bqgei4wpyvfo3pag7vzrioglx4

Big Data Contribution in Desktop and Mobile Devices Comparison, Regarding Airlines' Digital Brand Name Effect

Damianos P. Sakas, Nikolaos Th. Giannakopoulos
2021 Big Data and Cognitive Computing  
We then proceeded in developing an exploratory model using Fuzzy Cognitive Mapping, as well as a predictive and simulation model using Agent-Based Modeling.  ...  In the first phase of the research, we gathered web data from 10 airline firms during an observation period of 180 days.  ...  A recent study found that 50.48% of web traffic originates from mobile devices, while desktop traffic accounts for 46.51% of total web traffic [36] .  ... 
doi:10.3390/bdcc5040048 fatcat:m2ghneuqanfppdcdifb5zomp6u

A Survey on User Profiling Model forAnomaly Detection in Cyberspace

rash Habibi = Lashkari, Min Chen, Ali A. Ghorbani, Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB) Fredericton, Canada, Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB) Fredericton, Canada, Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB) Fredericton, Canada
2018 Journal of Cyber Security and Mobility  
Bradley et al. [7] developed a case-based user profiling system for content personalization. The system aims to retrieving a set of jobs that meet a user's job search requirements.  ...  His research focuses on cybersecurity, big data security analysis, Internet traffic analysis and the detection of malware and cyber-attacks as well as generating cybersecurity datasets.  ...  Based on a case study, he developed a user profile from network behavior by analyzing the intercepted network packets.  ... 
doi:10.13052/jcsm2245-1439.814 fatcat:awodb7sgx5eg5i74fyog7bv77q

Structural analysis of behavioral networks from the Internet

M R Meiss, F Menczer, A Vespignani
2008 Journal of Physics A: Mathematical and Theoretical  
For example, we find that the structure of the behavioral network associated with Web activity is characterized by such extreme heterogeneity as to challenge any simple attempt to model Web server traffic  ...  We present a characterization of the properties of the behavioral networks generated by several million users of the Abilene (Internet2) network.  ...  This work is funded in part by NSF awards 0348940 and 0513650 to FM and AV respectively, and by the Indiana University School of Informatics.  ... 
doi:10.1088/1751-8113/41/22/224022 fatcat:65ft2ayatjfo3nbmof6pdbehom
« Previous Showing results 1 — 15 out of 74,523 results