Evaluating Web Server Log Analysis Tools David Strom SD’98 2/13/98.

Slides:



Advertisements
Similar presentations
3.02H Publishing a Website 3.02 Develop webpages..
Advertisements

SIUG Annual Meeting 2010 UNC Charlotte January 28, 2010 SIUG Annual Meeting 2010 Web Logs: Finally! Now What Do We Do With Them? Dan Pfohl, UNC Wilmington.
Urchin & Website Usability. Usability Study Usability study is a repetitive process that involves testing a site and then using the test results to change.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
ManageEngine TM Applications Manager 8 Monitoring Custom Applications.
Automatic Data Collection: Server Logs As with all methods, have to ask: What are the goals for your system? –What constitutes success, or good quality.
The World Wide Web and the Internet Dr Jim Briggs 1WUCM1.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Session Management A290/A590, Fall /25/2014.
© De Montfort University, Web Servers Chris Hand And Howell Istance De Montfort University.
C HAPTER 4 W EB H OSTING. I. I NTRODUCTION To make your Web site visible to the world, it has to be hosted on a Web server. In this tutorial we will teach.
Computer Network (MASQ/NAT/PROXY)
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Alexander Hartmann.  Free service offered by Google that generates detailed statistics about the visitors to a website. A premium version is also available.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
WEB ANALYTICS Prof Sunil Wattal. Business questions How are people finding your website? What pages are the customers most interested in? Is your website.
1 Web Developer Foundations: Using XHTML Chapter 11 Web Page Promotion Concepts.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Making YOUR WEBSITE MORE EFFECTIVE Website Evaluation & Usability September 17 th,
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
SLIR Computer Lab: Orientation and Training December 16, 1998.
Server tools. Site server tools can be utilised to build, host, track and monitor transactions on a business site. There are a wide range of possibilities.
About Dynamic Sites (Front End / Back End Implementations) by Janssen & Associates Affordable Website Solutions for Individuals and Small Businesses.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Jump to first page Tracking users Analyzing how people use your site by Dylan Tweney
Customer Service and Support Sutherland Global Services Consultant Learning Services Microsoft Store.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
1 In the good old days... Years ago… the WWW was made up of (mostly) static documents. –Each URL corresponded to a single file stored on some hard disk.
1 Lies, damn lies and Web statistics A brief introduction to using and abusing web statistics Paul Smith, ILRT July 2006.
2440: 141 Web Site Administration Web Server Monitoring and Analysis Instructor: Enoch E. Damson.
Sustainability: Web Site Statistics Marieke Napier UKOLN University of Bath Bath, BA2 7AY UKOLN is supported by: URL
MIS 424 Professor Sandvig. Overview  Why Analytics?  Two major approaches:  Server logs  Google Analytics.
ColdFusion Security Michael Smith President TeraTech, Inc ColdFusion, Database & VB custom development
1 Welcome to CSC 301 Web Programming Charles Frank.
Log files presented to : Sir Adnan presented by: SHAH RUKH.
Dwayne Forrester Next  A blog is a discussion or informational site published on the World Wide Web and consisting of discrete entries ("posts") typically.
Log Analysis and Intrusion Detection By Srikrishna Gudavalli Venkata Naga Vamsi Krishna Ravi Kiran Yellepeddy.
1 Designing an NT-based Intranet David Strom SD’98 2/13/98.
EVALUATE YOUR SITE’S PERFORMANCE. Web site statistics Affiliate Sales Figures.
Module 2 – User Safety Privacy Attacks on end users Browser vulnerabilities.
Website maintenance best practices CMS User Group Meeting October 21, 2015.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
PHP, Databases, and Cookies Dave Pease IDS496 12/2/2003
WEB SERVER SOFTWARE FEATURE SETS
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Web Measurement. The Web is Different from other Commuication Media More precise measurement of activity on Web sites is available More precise measurement.
Secondary Evidence for User Satisfaction With Community Information Systems Gregory B. Newby University of North Carolina at Chapel Hill ASIS Midyear Meeting.
Hostway Confidential & Proprietary Introduction to Web Hosting.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Web Analytics and Reporting Michal Neuwirth Product Manager – Kentico Software.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
A S P. Outline  The introduction of ASP  Why we choose ASP  How ASP works  Basic syntax rule of ASP  ASP’S object model  Limitations of ASP  Summary.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
ALL THINGS IIS TERRI DONAHUE
Managing State Chapter 13.
CISC103 Web Development Basics: Web site:
W3 Status Analyzer.
Warm Handshake with Websites, Servers and Web Servers:
Password Management Limit login attempts Encrypt your passwords
Enhanced Web Site Design Stanford University Continuing Studies CS 22
Unix System Administration
WEBSITE ADMINISTRATION.  Websites need a home – called a server  Hosting can be Internal or External  Internal You house and maintain the web server.
CISC103 Web Development Basics: Web site:
Configuring Internet-related services
Web Page Concept and Design :
Chapter 8, pp 171 – pp 200 Web Security, by Lincoln D. Stein
Web Servers (IIS and Apache)
Presentation transcript:

Evaluating Web Server Log Analysis Tools David Strom SD’98 2/13/98

SD'98 (c) David Strom, Inc.2 Summary Examine different log files What you can and can’t learn from your logs Pros and cons of various tools

SD'98 (c) David Strom, Inc.3 Different types of log files Access Error Referral Other

SD'98 (c) David Strom, Inc.4 Access logs Domain name Date, time Server command processed and result URL of visitor Bytes transmitted

SD'98 (c) David Strom, Inc.5 Sample access log data rm258.fav.usu.edu [31/May/1995:09:03: ] "GET /NEI.html HTTP/1.0" rm258.fav.usu.edu [31/May/1995:09:03: ] "GET /xculture/nei/nei.html HTTP/1.0" rm258.fav.usu.edu [31/May/1995:09:03: ] "GET /gifs/sedlbutton.gif HTTP/1.0" [31/May/1995:09:20: ] "GET /RELs.html HTTP/1.0" Leslie-Francis.tenet.edu [31/May/1995:09:36: ] "GET / HTTP/1.0" ls973.ulib.albany.edu [31/May/1995:09:40: ] "GET /viii1.html HTTP/1.0"

SD'98 (c) David Strom, Inc.6 Errors reported in your logs Clients that time out (or leave in frustration!) Scripts that don’t produce any output Server bugs User authentication or configuration problems

SD'98 (c) David Strom, Inc.7 Sample error log data [Thu May 30 07:25: ] send timed out for bamberg.sedl.org [Thu May 30 07:57: ] send timed out for kenya.sedl.org [Thu May 30 08:23: ] send timed out for ppp092.kyoto- inet.or.jp [Thu May 30 09:15: ] access to /usr/local/www/htdocs/scimath/compass/vol03 failed for , reason: File does not exist [Thu May 30 09:57: ] send timed out for dd compuserve.com [Thu May 30 10:47: ] read timed out for ncia110b.ncia.net

SD'98 (c) David Strom, Inc.8 Referral logs Who links to your site? Who downloads your pages?

SD'98 (c) David Strom, Inc.9 Sample referral log data ->/change/welcome.html - >/welcome.html - >/policy/networks/toc.html - >/policy/networks/toc.html - >/resources/SCIMAST/announcement.html - >/policy/networks/toc.html - >/welcome.html

SD'98 (c) David Strom, Inc.10 Common log format Output by most standard servers Needed by most third-party log analyzers hoohoo.ncsa.uiuc.edu/docs/setup/httpd/Overview.html

SD'98 (c) David Strom, Inc.11 Extended/custom log formats Log whatever you wish in whatever order you wish Useful if you will read them regularly! But can’t work with the analyzers Now in IIS v4, NSCP v3, others.

SD'98 (c) David Strom, Inc.12 What you can learn from your log files Hits per day Domain origins The path people take in and around your web Problem areas

SD'98 (c) David Strom, Inc.13 HITS (How Idiots Track Success) Nobody uses this word anymore Doesn’t really measure individual users, just access Catching servers and proxies mess up these statistics

SD'98 (c) David Strom, Inc.14 Domain origins Where users are coming from -- sometimes Just because they are from ibm.net doesn’t mean they work at IBM! Forgotten accounts, friends and family using the account Hacked user names Proxies don’t help here either

SD'98 (c) David Strom, Inc.15 The path people take in and around your web Search engines help sometimes Which search site was the most popular front door Who links to you and why Is there a pattern or a random walk?

SD'98 (c) David Strom, Inc.16 Problem areas to deal with Broken links (locally) Broken outbound links Time outs (sunspots?)

SD'98 (c) David Strom, Inc.17 What you can’t learn from your logs Who are these people, anyway? –No specific user names –Is it a bot or a real human? How long did they view a page? –Most people don’t spend much time on your web –Where did they go visit next?

SD'98 (c) David Strom, Inc.18 What technologies are available? Built-in analyzer tools Sites that capture user info Secure sites with registration Build your own from perl Third-party tools

SD'98 (c) David Strom, Inc.19 Built-in tools WebSite, website.ora.com IIS with Site Server, Netscape servers, Easy to use but limited

SD'98 (c) David Strom, Inc.20 WebSite Professional v2 Win NT, 95 Best web server for learning about logs, best docs QuickStats module for instant analysis: –single report but nice set of information –shows today, last two days requests and unique hosts –IP addresses of visitors, average requests/hour

SD'98 (c) David Strom, Inc.21 IIS Site Server NT Server v4 w/SP3 only Lots of preconfigured reports Two versions, Express and Full (customized reports) backoffice.microsoft.com/products/siteserve r/express/

SD'98 (c) David Strom, Inc.22 Netscape v3 web servers Various NT, Unix versions Reports for a few variables but nothing too extensive Best to use a third-party tool here

SD'98 (c) David Strom, Inc.23 Sites that capture user info WebCounter, -- third-party hit counter Someone else does the programming and debugging But beyond your control

SD'98 (c) David Strom, Inc.24 Secure sites with registration You know your users But many won’t register, or forget their passwords Requires scripting, database integration, more maintenance

SD'98 (c) David Strom, Inc.25 Build your own from perl Needs some in-house support Works best with Unix-based webs Examples: –refstats, members.aol.com/htmlguru/refstats.html –surfreport, bienlogic.com/SurfReport/

SD'98 (c) David Strom, Inc.26 Third-party tools WebTracker, WebTrends, net.Genesis, MarketWave, IIS Assistant,

SD'98 (c) David Strom, Inc.27 Third-party tools (con’t) Can make very pretty reports Customizable Make sure they support your particular log format Not that expensive, mostly run on Windows