Search results for "Server"

showing 10 items of 586 documents

Verification of Web traffic burstiness and self-similarity for multiple online stores

2017

Developing realistic Web traffic models is essential for a reliable Web server performance evaluation. Very significant Web traffic properties that have been identified so far include burstiness and self-similarity. Very few relevant studies have been devoted to e-commerce traffic, however. In this paper, we investigate burstiness and self-similarity factors for seven different online stores using their access log data. Our findings show that both features are present in all the analyzed e-commerce datasets. Furthermore, a strong correlation of the Hurst parameter with the average request arrival rate was discovered (0.94). Estimates of the Hurst parameter for the Web traffic in the online …

Web serverSelf-similarityComputer scienceSelf-Similarity02 engineering and technologyE-commerceWeb trafficcomputer.software_genreE-Commerce01 natural sciences010104 statistics & probabilityHurst parameterWeb trafficWeb server0202 electrical engineering electronic engineering information engineeringRange (statistics)Web storeBurstiness0101 mathematicsLog analysisbusiness.industry020206 networking & telecommunicationsHurst indexBurstinessHTTP trafficbusinesscomputerComputer network
researchProduct

Practical Aspects of Log File Analysis for E-Commerce

2013

The paper concerns Web server log file analysis to discover knowledge useful for online retailers. Data for one month of the online bookstore operation was analyzed with respect to the probability of making a purchase by e-customers. Key states and characteristics of user sessions were distinguished and their relations to the session state connected with purchase confirmation were analyzed. Results allow identification of factors increasing the probability of making a purchase in a given Web store and thus, determination of user sessions which are more valuable in terms of e-business profitability. Such results may be then applied in practice, e.g. in a method for personalized or prioritize…

Web serverService (systems architecture)DatabaseComputer sciencebusiness.industryE-commercecomputer.software_genreWorld Wide WebIdentification (information)Web pageWeb log analysis softwareWeb servicebusinesscomputerData Web
researchProduct

Delfos: the Oracle to Predict NextWeb User's Accesses

2007

Despite the wide and intensive research efforts focused on Web prediction and prefetching techniques aimed to reduce user's perceived latency, few attempts to implement and use them in real environments have been done, mainly due to their complexity and supposed limitations that low user available bandwidths imposed few years ago. Nevertheless, current user bandwidths open a new scenario for prefetching that becomes again an interesting option to improve web performance. This paper presents Delfos, a framework to perform web predictions and prefetching on a real environment that tries to cover the existing gap between research and praxis. Delfos is integrated in the web architecture without…

Web serverWebsite architectureDatabaseComputer sciencecomputer.internet_protocolWeb performanceService-oriented architectureWeb servicecomputer.software_genreSoftware architecturecomputerServer-sideOracle21st International Conference on Advanced Networking and Applications (AINA '07)
researchProduct

Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic

2018

Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…

Web serverbusiness.industryComputer scienceNetwork packetDenial-of-service attackIntrusion detection systemEncryptioncomputer.software_genreApplication layerData stream clusteringbusinesscomputerVirtual networkComputer network
researchProduct

Web Server Support for e-Customer Loyalty through QoS Differentiation

2013

The paper deals with the problem of offering predictive service in e-commerce Web server systems under overload. Due to unpredictability of Web accesses, such systems often fail to effectively handle peak traffic, which results in long delays and incomplete transactions. As a consequence, online retailers miss an opportunity to attract new customers, retain the loyalty of regular customers, and increase profits. We propose a method for priority-based admission control and scheduling of requests at the Web server system in order to differentiate Quality of Service (QoS) with regard to user-perceived delays, i.e., Web page response times provided by the system (as opposed to HTTP request resp…

Web serverbusiness.industryComputer scienceQuality of serviceRequest–responseE-commerceAdmission controlcomputer.software_genreLoyalty business modelScheduling (computing)Web pagebusinesscomputerComputer network
researchProduct

Improving the quality of e-commerce web service: what is important for the request scheduling algorithm?

2005

The paper concerns a new research area that is Quality of Web Service (QoWS). The need for QoWS is motivated by a still growing number of Internet users, by a steady development and diversification of Web services, and especially by popularization of e-commerce applications. The goal of the paper is a critical analysis of the literature concerning scheduling algorithms for e-commerce Web servers. The paper characterizes factors affecting the load of the Web servers and discusses ways of improving their efficiency. Crucial QoWS requirements of the business Web server are identified: serving requests before their individual deadlines, supporting user session integrity, supporting different cl…

Web servermedicine.medical_specialtyService qualitybusiness.industryComputer scienceAccess controlE-commercecomputer.software_genreWorld Wide WebServermedicineThe InternetWeb servicebusinesscomputerWeb modelingSPIE Proceedings
researchProduct

Application of neural network to predict purchases in online store

2016

A key ability of competitive online stores is effective prediction of customers’ purchase intentions as it makes it possible to apply personalized service strategy to convert visitors into buyers and increase sales conversion rates. Data mining and artificial intelligence techniques have proven to be successful in classification and prediction tasks in complex real-time systems, like e-commerce sites. In this paper we proposed a back-propagation neural network model aiming at predicting purchases in active user sessions in a Web store. The neural network training and evaluation was performed using a set of user sessions reconstructed from server log data. The proposed neural network was abl…

Web usage miningService strategyRecallArtificial neural networkWeb miningbusiness.industryComputer scienceneural networklog file analysisE-commerceServer logMachine learningcomputer.software_genreartificial intelligenceSet (abstract data type)Web miningonline storeKey (cryptography)e-commerceWeb storeArtificial intelligencebusinesscomputer
researchProduct

Using association rules to assess purchase probability in online stores

2016

The paper addresses the problem of e-customer behavior characterization based on Web server log data. We describe user sessions with the number of session features and aim to identify the features indicating a high probability of making a purchase for two customer groups: traditional customers and innovative customers. We discuss our approach aimed at assessing a purchase probability in a user session depending on categories of viewed products and session features. We apply association rule mining to real online bookstore data. The results show differences in factors indicating a high purchase probability in session for both customer types. The discovered association rules allow us to formu…

Web usage miningWeb serverclick-stream analysise-CommerceAssociation rule learningComputer sciencebusiness.industrylog file analysisdata mining02 engineering and technologyE-commercecomputer.software_genreSession (web analytics)association rulesWorld Wide WebWeb mining020204 information systemsLog dataClick stream analysis0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerInformation SystemsInformation Systems and e-Business Management
researchProduct

Identifying legitimate Web users and bots with different traffic profiles — an Information Bottleneck approach

2020

Abstract Recent studies reported that about half of Web users nowadays are intelligent agents (Web bots). Many bots are impersonators operating at a very high sophistication level, trying to emulate navigational behaviors of legitimate users (humans). Moreover, bot technology continues to evolve which makes bot detection even harder. To deal with this problem, many advanced methods for differentiating bots from humans have been proposed, a large part of which relies on supervised machine learning techniques. In this paper, we propose a novel approach to identify various profiles of bots and humans which combines feature selection and unsupervised learning of HTTP-level traffic patterns to d…

Web userInformation Systems and ManagementComputer scienceInternet robotFeature selection02 engineering and technologyMachine learningcomputer.software_genreUnsupervised learningSession (web analytics)Management Information SystemsIntelligent agentArtificial Intelligence020204 information systemsMachine learning0202 electrical engineering electronic engineering information engineeringCluster analysisBot detectionbusiness.industryInformation bottleneck methodWeb botServer logHierarchical clusteringUnsupervised learning020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerSoftwareKnowledge-Based Systems
researchProduct

Honeypot utilization for analyzing cyber attacks

2016

Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers' motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.

World Wide WebEngineeringHoneypotSoftwarebusiness.industryPseudoserverEffective methodInformation securitybusinessComputer securitycomputer.software_genrecomputerHackerProccedings of the 10th European Conference on Software Architecture Workshops
researchProduct