The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illeg...The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency.展开更多
Results of the 2007/08 survey "Energy--the present and the future" conducted on a population of 1439 students from Zagreb University have shown that after school and television, internet is the third major source of...Results of the 2007/08 survey "Energy--the present and the future" conducted on a population of 1439 students from Zagreb University have shown that after school and television, internet is the third major source of knowledge for the participants. Therefore, "NEMIS" web site (www.nemis.zpf.fer.hr) was launched at the end of the 2008. NEMIS is a Croatian acronym for "Nuclear Energy--Mysticism and Reality". The site was envisioned as a place where interested visitors could get information, prepared by experts, on all the issues relating to nuclear energy. The main objectives of the work reported in this paper are to present the structure of the NEMIS web site and to analyze the activity on the site during the last three years. Based on the performed analysis, future activities on the site are set and discussed.展开更多
You’ve built a great web site.It’s well designed,it encourages customer interaction,and it’s filledwith compelling,well-organized content.Now comes the tough reality:Creating a great site doesn’tautomatically mean...You’ve built a great web site.It’s well designed,it encourages customer interaction,and it’s filledwith compelling,well-organized content.Now comes the tough reality:Creating a great site doesn’tautomatically mean customers will visit it.With millions of web sites today,chances are slim that a customerwill randomly happen onto your site.That’s why it’s imperative that you use many strategies to get your web site noticed by the morethan 100 million people who now surf the Web.Here are seven ideas to help get you started:展开更多
With the sharp increase of hacking attacks over the last couple of years, web application security has become a key concern. SQL injection is one of the most common types of web hacking and has been widely written and...With the sharp increase of hacking attacks over the last couple of years, web application security has become a key concern. SQL injection is one of the most common types of web hacking and has been widely written and used in the wild. This paper analyzes the principle of SQL injection attacks on Web sites, presents methods available to prevent IIS + ASP + MSSQL web applications from these kinds of attacks, including secure coding within the web application, proper database configuration, deployment of IIS. The result is verified by WVS report.展开更多
文摘The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency.
文摘Results of the 2007/08 survey "Energy--the present and the future" conducted on a population of 1439 students from Zagreb University have shown that after school and television, internet is the third major source of knowledge for the participants. Therefore, "NEMIS" web site (www.nemis.zpf.fer.hr) was launched at the end of the 2008. NEMIS is a Croatian acronym for "Nuclear Energy--Mysticism and Reality". The site was envisioned as a place where interested visitors could get information, prepared by experts, on all the issues relating to nuclear energy. The main objectives of the work reported in this paper are to present the structure of the NEMIS web site and to analyze the activity on the site during the last three years. Based on the performed analysis, future activities on the site are set and discussed.
文摘You’ve built a great web site.It’s well designed,it encourages customer interaction,and it’s filledwith compelling,well-organized content.Now comes the tough reality:Creating a great site doesn’tautomatically mean customers will visit it.With millions of web sites today,chances are slim that a customerwill randomly happen onto your site.That’s why it’s imperative that you use many strategies to get your web site noticed by the morethan 100 million people who now surf the Web.Here are seven ideas to help get you started:
文摘With the sharp increase of hacking attacks over the last couple of years, web application security has become a key concern. SQL injection is one of the most common types of web hacking and has been widely written and used in the wild. This paper analyzes the principle of SQL injection attacks on Web sites, presents methods available to prevent IIS + ASP + MSSQL web applications from these kinds of attacks, including secure coding within the web application, proper database configuration, deployment of IIS. The result is verified by WVS report.