SlideShare a Scribd company logo
Presented By: Somnath Mazumdar
              somnath.mazumdar@ucdconnect.ie
https://www.csi.ucd.ie/users/somnath-mazumdar
z Introduction
z Pros & Cons of Methods
z AWStats
z Google Analytics
z AWStats Vs Google Analytics
z Packet Sniffing
z Approach
z Conclusion
                                 1
z  Weblogs: Activity/transaction information of web
    servers
z  Earlier weblogs are used to count the visitors.
z  Web Analysis: off-site and on-site.
z  On site information retrieval: 1. Page Tag
                     2. Historical Web data Analysis.
z  Usages : 1.Performance
               2.Security
               3.Prediction (Regression/CART)
               4.Reporting&Profiling:    4.1. Web statistics
                                         4.2. Business
Analytics(K-means, MC)
                                                           2
z  Pros:    1. Accuracy: End user data.
             2. Speed of Data Reporting
             3. Data Collection Flexibility
             4. No need of own web server

z  Cons:   1. User or Firewalls can restrict tag L
            2. Tag each page L
            3. cannot report on non-pages hit
            4. Unable to track bandwidth, server
response time or completed downloads.


                                                       3
z  Pros:
       1. Non-invasive data collection
       2. Can track bandwidth and completed downloads
       3. Helps to optimize for search engine
       4. Securely capture http user names
       5. Can track “spiders” or robots.




                                                        4
6. Exact content delivery information
            7. Website content time-to-serve time
            8. Missing or broken pages information

z  Cons:   1. Proxy/caching inaccuracies
            2. No event (javascript, flash or AJAX )
tracking
             3. Log management :Log generation, Log
storage, and log file transfer.



                                                       5
z  Goal: System based or Product based
z  Cost: Freeware or Commercial
z  Storage: Log Storage (3rd party)
z  Report/Tips: Generate report static or real time with
  tips..
      AWStats is a powerful log analyzer creates
advanced web, ftp, mail and streaming server statistics
reports.
      Google Analytics provides in depth product
marketing information and tips (Google Adwords/
AdSense).

                                                          6
z  Freeware
z  Graphically presented reports
z  Customizable reports
z  Reports based on users, OS, browser, location, data
    transfer, bookmark, total visits and so on.
z  Standard and custom log format supported
z  Works from CLI as well as a CGI (Flexibility)
z  Written in Perl
z  Many desired features..
z  But Less visualized/interactive (GA)


                                                          7
z  Issues: 1. DNS look up & Full Year View (time)
            2. Database Format Using "xml" format 3 times
            larger than default.
            3. Feature exclude records from SPAM
        referrer (5 times slower).
            4. To differentiate URLs of dynamic pages
(memory).
            5. Accuracy hampers speed: Keywords ( 1%),
Search Engines (9%) Worms Detection(15%), OS(2%).
            6. Each Extra section reduces AWStats
speed by 8%.
             Wrong setup may eat all memory.

                                                      8
z  Session "unknown"
z  AWStats counts everything as pages
z  Reports cannot be generate based on current/custom
    date
z  Reports cannot be generate based on custom date
    range and on weekly basis.
z  On few Intel Pentium4 / Xeon4 based host systems,
    log file time can not be computed correctly L .




                                                         9
10
z  “Google Analytics shows you how people found your
    site, how they explored it, and how you can enhance
    their visitor experience.”—Google
z  Free
z  Help visitors by providing better keyword search
z  Provide information related to website design.
z  Tagging :Automatic for content management system
    or blogging platform but manual for customize
    website.
z  Confidentiality : Third party data processing.



                                                          11
12
Name                  AWStats            Google Analytics
Based on logs            Yes             Site Search data
Page Tagging              No                    Yes
Hits count        Count everything as     IP address and
                         page                 cookies
Confidentiality      Not an issue       Issue (if not owner)
Meant for           website traffic     Website traffic and
                       analysis.            marketing
                                          effectiveness.
Market Share             NA              Around 49.95% of
                                        top 1,000,000 hosts



                                                            13
z  Power of analysis is limited by the information in logs.
z  Extensive logging that consumes resources.
             ….more we measure, less accurate we
understand …..
             Awstats, Webalizer and Google Analytics
are always different due to different techniques.

      Use AWStats as well as Google Analytics to
              have better prediction



                                                           14
15
z  Packet sniffer can capture and decode data streams
      passing over a digital network.
z    Non-intrusive technology : no log, no page tag.
z    Deploy sniffer into local network of servers to be tracked.
z    Completely transparent for tracked website(s)
z    Supports multiple servers without effecting server
      response time.




                      Block Diagram of Packet Sniffing
                                                               16
z  Packet sniffer can capture and decode data streams
      passing over a digital network.
z    Non-intrusive technology : no log, no page tag.
z    Deploy sniffer into local network of servers to be tracked.
z    Completely transparent for tracked website(s)
z    Supports multiple servers without effecting server
      response time.




                      Block Diagram of Packet Sniffing
                                                               17
z  Client communication disconnects information
z  Server-side timing information
z  Website content delivery information
z  Full spectrum of hits including non-pages
z  Copes with proxy or browser caching
z  Robots and automated agents data available
z  Website content time-to-serve time




                                                   18
19

More Related Content

Similar to Weblog analsys

Predictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-timePredictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-time
Aerospike, Inc.
 
Instrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with EnvoyInstrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with Envoy
Daniel Hochman
 
Log aggregation and analysis
Log aggregation and analysisLog aggregation and analysis
Log aggregation and analysis
Dhaval Mehta
 
What is web scraping?
What is web scraping?What is web scraping?
What is web scraping?
Brijesh Prajapati
 
A University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google AnalyticsA University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google Analytics
Chris Traganos
 
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Guglielmo Iozzia
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
RajDodiya4
 
Big data at scrapinghub
Big data at scrapinghubBig data at scrapinghub
Big data at scrapinghub
Dana Brophy
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
Velocidex Enterprises
 
Web Performance Optimization
Web Performance OptimizationWeb Performance Optimization
Web Performance Optimization
Livares Technologies Pvt Ltd
 
Using Elasticsearch for Analytics
Using Elasticsearch for AnalyticsUsing Elasticsearch for Analytics
Using Elasticsearch for Analytics
Vaidik Kapoor
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012F _
 
Log Files
Log FilesLog Files
Node.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleNode.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scale
Dmytro Semenov
 
Vue d'ensemble Dremio
Vue d'ensemble DremioVue d'ensemble Dremio
Vue d'ensemble Dremio
Modern Data Stack France
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecuritiesamiable_indian
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
Abhishek Kumar
 
Serverless_with_MongoDB
Serverless_with_MongoDBServerless_with_MongoDB
Serverless_with_MongoDB
Amazon Web Services
 
Automation + dev ops summit hail hydrate! from stream to lake
Automation + dev ops summit   hail hydrate! from stream to lakeAutomation + dev ops summit   hail hydrate! from stream to lake
Automation + dev ops summit hail hydrate! from stream to lake
Timothy Spann
 
Cloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and FastCloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and Fast
Databricks
 

Similar to Weblog analsys (20)

Predictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-timePredictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-time
 
Instrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with EnvoyInstrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with Envoy
 
Log aggregation and analysis
Log aggregation and analysisLog aggregation and analysis
Log aggregation and analysis
 
What is web scraping?
What is web scraping?What is web scraping?
What is web scraping?
 
A University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google AnalyticsA University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google Analytics
 
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
 
Big data at scrapinghub
Big data at scrapinghubBig data at scrapinghub
Big data at scrapinghub
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
 
Web Performance Optimization
Web Performance OptimizationWeb Performance Optimization
Web Performance Optimization
 
Using Elasticsearch for Analytics
Using Elasticsearch for AnalyticsUsing Elasticsearch for Analytics
Using Elasticsearch for Analytics
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012
 
Log Files
Log FilesLog Files
Log Files
 
Node.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleNode.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scale
 
Vue d'ensemble Dremio
Vue d'ensemble DremioVue d'ensemble Dremio
Vue d'ensemble Dremio
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
 
Serverless_with_MongoDB
Serverless_with_MongoDBServerless_with_MongoDB
Serverless_with_MongoDB
 
Automation + dev ops summit hail hydrate! from stream to lake
Automation + dev ops summit   hail hydrate! from stream to lakeAutomation + dev ops summit   hail hydrate! from stream to lake
Automation + dev ops summit hail hydrate! from stream to lake
 
Cloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and FastCloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and Fast
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Weblog analsys

  • 1. Presented By: Somnath Mazumdar somnath.mazumdar@ucdconnect.ie https://www.csi.ucd.ie/users/somnath-mazumdar
  • 2. z Introduction z Pros & Cons of Methods z AWStats z Google Analytics z AWStats Vs Google Analytics z Packet Sniffing z Approach z Conclusion 1
  • 3. z  Weblogs: Activity/transaction information of web servers z  Earlier weblogs are used to count the visitors. z  Web Analysis: off-site and on-site. z  On site information retrieval: 1. Page Tag 2. Historical Web data Analysis. z  Usages : 1.Performance 2.Security 3.Prediction (Regression/CART) 4.Reporting&Profiling: 4.1. Web statistics 4.2. Business Analytics(K-means, MC) 2
  • 4. z  Pros: 1. Accuracy: End user data. 2. Speed of Data Reporting 3. Data Collection Flexibility 4. No need of own web server z  Cons: 1. User or Firewalls can restrict tag L 2. Tag each page L 3. cannot report on non-pages hit 4. Unable to track bandwidth, server response time or completed downloads. 3
  • 5. z  Pros: 1. Non-invasive data collection 2. Can track bandwidth and completed downloads 3. Helps to optimize for search engine 4. Securely capture http user names 5. Can track “spiders” or robots. 4
  • 6. 6. Exact content delivery information 7. Website content time-to-serve time 8. Missing or broken pages information z  Cons: 1. Proxy/caching inaccuracies 2. No event (javascript, flash or AJAX ) tracking 3. Log management :Log generation, Log storage, and log file transfer. 5
  • 7. z  Goal: System based or Product based z  Cost: Freeware or Commercial z  Storage: Log Storage (3rd party) z  Report/Tips: Generate report static or real time with tips.. AWStats is a powerful log analyzer creates advanced web, ftp, mail and streaming server statistics reports. Google Analytics provides in depth product marketing information and tips (Google Adwords/ AdSense). 6
  • 8. z  Freeware z  Graphically presented reports z  Customizable reports z  Reports based on users, OS, browser, location, data transfer, bookmark, total visits and so on. z  Standard and custom log format supported z  Works from CLI as well as a CGI (Flexibility) z  Written in Perl z  Many desired features.. z  But Less visualized/interactive (GA) 7
  • 9. z  Issues: 1. DNS look up & Full Year View (time) 2. Database Format Using "xml" format 3 times larger than default. 3. Feature exclude records from SPAM referrer (5 times slower). 4. To differentiate URLs of dynamic pages (memory). 5. Accuracy hampers speed: Keywords ( 1%), Search Engines (9%) Worms Detection(15%), OS(2%). 6. Each Extra section reduces AWStats speed by 8%. Wrong setup may eat all memory. 8
  • 10. z  Session "unknown" z  AWStats counts everything as pages z  Reports cannot be generate based on current/custom date z  Reports cannot be generate based on custom date range and on weekly basis. z  On few Intel Pentium4 / Xeon4 based host systems, log file time can not be computed correctly L . 9
  • 11. 10
  • 12. z  “Google Analytics shows you how people found your site, how they explored it, and how you can enhance their visitor experience.”—Google z  Free z  Help visitors by providing better keyword search z  Provide information related to website design. z  Tagging :Automatic for content management system or blogging platform but manual for customize website. z  Confidentiality : Third party data processing. 11
  • 13. 12
  • 14. Name AWStats Google Analytics Based on logs Yes Site Search data Page Tagging No Yes Hits count Count everything as IP address and page cookies Confidentiality Not an issue Issue (if not owner) Meant for website traffic Website traffic and analysis. marketing effectiveness. Market Share NA Around 49.95% of top 1,000,000 hosts 13
  • 15. z  Power of analysis is limited by the information in logs. z  Extensive logging that consumes resources. ….more we measure, less accurate we understand ….. Awstats, Webalizer and Google Analytics are always different due to different techniques. Use AWStats as well as Google Analytics to have better prediction 14
  • 16. 15
  • 17. z  Packet sniffer can capture and decode data streams passing over a digital network. z  Non-intrusive technology : no log, no page tag. z  Deploy sniffer into local network of servers to be tracked. z  Completely transparent for tracked website(s) z  Supports multiple servers without effecting server response time. Block Diagram of Packet Sniffing 16
  • 18. z  Packet sniffer can capture and decode data streams passing over a digital network. z  Non-intrusive technology : no log, no page tag. z  Deploy sniffer into local network of servers to be tracked. z  Completely transparent for tracked website(s) z  Supports multiple servers without effecting server response time. Block Diagram of Packet Sniffing 17
  • 19. z  Client communication disconnects information z  Server-side timing information z  Website content delivery information z  Full spectrum of hits including non-pages z  Copes with proxy or browser caching z  Robots and automated agents data available z  Website content time-to-serve time 18
  • 20. 19