Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


January Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the January 2023 Edition of the journal. The last date of research paper submission is December 15, 2022.

Preprocessing Web Logs for Web Intrusion Detection

Priyanka V. Patil, Dharmaraj Patil Published in Security

IJAIS Proceedings on International Conference and workshop on Advanced Computing 2013
Year of Publication: 2013
© 2012 by IJAIS Journal
Download full text
  1. Priyanka V Patil and Dharmaraj Patil. Article: Preprocessing Web Logs for Web Intrusion Detection. IJAIS Proceedings on International Conference and workshop on Advanced Computing 2013 ICWAC(3):11-15, June 2013. BibTeX

    	author = "Priyanka V. Patil and Dharmaraj Patil",
    	title = "Article: Preprocessing Web Logs for Web Intrusion Detection",
    	journal = "IJAIS Proceedings on International Conference and workshop on Advanced Computing 2013",
    	year = 2013,
    	volume = "ICWAC",
    	number = 3,
    	pages = "11-15",
    	month = "June",
    	note = "Published by Foundation of Computer Science, New York, USA"


Rapid growth in web development provides a way to deliver complex business solution. The increase in web dependency increases web hacking activities. An Intrusion detection has been accepted as a decent security system. It is a process used to identify abnormal activities in a computer system. When user visit website his or her clicks recorded in log file. Log file recorded information about each user. Log file contains unnecessary and noisy data which may affect the results of intrusion detection process. We analyzed log file using preprocessing, preprocessing reduce log file size and increase quality of available data. This paper gives a detailed discussion about the preprocessing web logs. Also Misuse based and Anomaly based Intrusion detection techniques. Intrusion detection plays an important role in addressing security problems of web servers and detecting attacks by monitoring computer system. We propose Web intrusion detection system with Misuse and Anomaly detection mode by using web server access logs.


  1. Wang Pu, Wang Jun-qing,2011,Intrusion Detection System with the Data Mining Technologies, pp. 490-492.
  2. ShaimaaSalama et. al. ,2011, Web server logs for preprocessing for web intrusion detection, Published by Canadian Center of Science and Education, Vol. 4, No. 4, pp. 123-133.
  3. L. K. Joshila Grace, V. Maheswari, DhinaharanNagamalai, 2011, Analysis of web logs and web user in web Mining, IJNSA, Vol. 3, No. 1, pp. 99-111.
  4. TheintTheint Aye, 2011, Web Log Cleaning for Mining Of Web Usage Patterns, IEEE, pp. 490- 494.
  5. Duanyang Zhao, QingxiangXu, Zhilin Feng,2010,Analysis and Design for Intrusion Detection System Based on Data Mining, pp. 339-342.
  6. Changxin Song, Ke Ma, 2009, Design of Intrusion Detection System Based on Data Mining Algorithm,ICSPS IEEE, pp. 370-373.
  7. C. J. Ezeife, J. Dong, A. K. Aggarwal, 2007, SensorWebIDS: A Web Mining Intrusion Detection System,International Journal of Web Information Systems, volume 4, pp. 97-120.
  8. Giovanni Vigna, William Robertson, Vishal Kher Richard, A. Kemmerer, 2003, A Stateful Intrusion Detection System forWorld-Wide Web Servers, ACSAC-IEEE,pp. 1-10.
  9. G. Castellano, A. M. Fanelli, M. A. Torsello, 2007, Log Data Preparation for Mining Web Usage Patterns, IADIS International Conference Applied Computing, pp. 371-378.
  10. K. R. Suneetha, Dr. R. Krihnamoorthi, 2009, Identifying User Behavior by Analyzing Web Server Access Log File,IJCSNS , Vol. 9, No. 4, pp. 327-332.
  11. V. Chitraa, Dr. A. S. Davamani, 2010, A Survey on Preprocessing Methods for Web Usage Data, IJCSIS, Vol. 7,No. 3, pp. 78-80. .
  12. A Murali, M Rao,,2005, A Survey on Intrusion Detection Approaches,IEEE, pp. 233-244.
  13. Natesan. P, P. Balasubramanie , G. Gowrison, 2012, Improving the Attack Detection Rate in Network Intrusion Detection using Adaboost Algorithm, Journal of Computer Science,pp. 1041-1048.


Intrusion Detection, Preprocessing Log File, Host Based, Web Logs