Detecting Anomalies in Service Logs by Using Geographic Tagging

Size: px
Start display at page:

Download "Detecting Anomalies in Service Logs by Using Geographic Tagging"

Transcription

1 Detecting Anomalies in Service Logs by Using Geographic Tagging Roman Tekhov Abstract. This article explains what relevant information can be obtained from log files of well known formats, tells how geolocation information can be retrieved, briefly describes existing solutions, introduces the program created to solve the problem and summarizes result obtained from experiments.. Keywords: log analysis, geolocation 1 Introduction The user s credentials may get stolen and the person who accomplished this may use this information in order to impersonate the real owner. In today s globalized world, however, there is a great possibility that the real user and the impostor are physically separated by large distances, possibly located in different countries or even continents. If we could analyze the history of user s requests in terms of locations from which those requests were made, then we could probably detect cases of credential leakage. Service logs typically contain such information, so the problem boils down to the following series of actions: 1. Parse various log files. 2. Retrieve user request information from the logs, i.e. the source host or IP address and the time of each request. 3. Determine the geolocation of each source host or IP address. 4. Compose a scheme of user s movements and detect suspicious cases such as: a. Moving speed that is too large to be really feasible. b. Frequent random moving between different locations, especially distinct ones. c. Requests made from countries that are not considered trust-worthy. d. Movement activity that is too rapid when compared to an average user. Even if the movement takes place in one single city it might indicate that the account is used by multiple people. 2 Retrieving Information from Log Files In order to be useful for our case the log file must contain separate entries about client requests. Each such log entry must contain three things: the user identifier, the source host or IP from which the user performed the request and the exact time of the

2 request. Luckily all major web servers log their data using the corresponding structure. 2.1 Common Log File Format and Apache/NCSA Combined Log Format Common format is a W3C standard format which is used by the Apache server for example. The entries have the following structure: host rfc931 authuser [date] request status bytes The so-called combined log format can be used by Apache as an alternative. The structure is similar to the common format but three additional fields are added: host rfc931 authuser [date] request status bytes refferer user_agent cookie We are only interested in fields host (remote host from which the request was recieved), auhtuser (client username) and date (time of the request) 2.2 W3C Extended Log Format Another W3C standardized format which is used by the Microsoft Internet Information Server for example. This is format is highly customizable and can output lots of different information in custom order. Once again we are only interested in the following fields: c-ip (remote host or IP address), cs-username (username), two separate fields date and time (time of the request). 2.3 OpenVPN Status Log Format OpenVPN is a popular Virtual Private Network implementation. OpenVPN outputs information concerning its currently connected users to a so-called status log file. In case this log is rotated in order to save the history of user actions it is also theoretically possible to analyze the past entries. The structure of the status log entry is the following: Virtual Address,Common Name,Real Address,Last Ref Common Name identifies the user; Real Address represents the remote host and Last Ref the time of the last request.

3 3 Geolocation Once the IP address is obtained it becomes possible to analyze it in order to retrieve the geographical location that this address belongs to. The geolocation software is used to achieve this. Typically such software contains a database of corresponding IP addresses and geographical locations. When the user has an IP address and wishes to know what region it belongs to then he or she submits a query via some interface and the software performs a lookup in the database to retrieve the most probable match. There are several ways how to create such databases: Collect user-submitted data about their location together with the address they submitted from. E.g. in case of a weather forecast site people will most frequently request information concerning their actual whereabouts. Collect the IP addresses from which users connect most frequently together with addresses registered in their account profiles. Use databases of Internet Service Providers. Combine data from multiple different sources. Popular vendors of the geolocation software include Quova IP2Location MaxMind GeoIP All of these vendors offer commercial products. MaxMind also offers an alternative free database called GeoLite that is less accurate but is available for everyone to download. It also offers a number of open-source API-s for working with the database using various languages, e.g. C, Java and Python. Proxy Servers. If the client refers to the server not directly but via a proxy server, then the geolocation will not produce the right result since the real source IP address stays unknown. It is possible, however, to detect the usage of proxies and to report that fact as a sign of suspicion of its own. 4 Created Program The program called FraudDetector got implemented in Java. 4.1 Log File Format Configuration Section 2 of this report only describes some of the most widely spread formats that servers might use to log their data. In practice there are numerous possible ways how such data might be structured so the software has to be configurable enough to support any custom format. All standard formats, like those listed previously, have to be predefined to allow out-of-the-box usage.

4 Format Descriptions. Supported formats are described using a special XML structure in formats.xml file. So far only such formats where a separate single line represents a single user request are supported. Here is a sample description corresponding to Common Log File Format: <format> <name>common</name> <reg-exp> ^([\d.]+) (\S+) (\S+) \[([\w:/]+\s[+\-]\d{4})\] "(.+?)" (\d{3}) (\d+) </reg-exp> <host-part>1</host-part> <user-part>3</user-part> <date-part>4</date-part> <date-format>dd/mmm/yyyy:hh:mm:ss Z</date-format> <date-locale>en</date-locale> </format> Most of the fields provide instructions about how each line of the log should be parsed. The idea is to break the line into logically separated parts. The reg-exp element contains the Java regular expression used to do exactly that. Each part is included in parenthesis which is a way to tell the Java pattern matching mechanism to distinguish a separate group of characters. The host-part, user-part and date-part contain numbers of parts which contain the corresponding data portions. Elements date-format and date-locale serve the purpose of date parsing and contain the date pattern and locale to use. For example consider the following log entry: roman [02/Mar/2010:22:30: ] "GET /test.html HTTP/1.1" It will be broken in 7 parts from which are interested in 3: host ( , part 1), user (roman, part 3) and date (02/Mar/2010:22:30: , part 4). 4.2 Log File Reading and Processing The program can read data from one or multiple log files specified in configuration file. The files might be of different format: format.common=some-common.log, other-common.log format.combined=some-combined.log, other-combined.log The program processes each log in a separate thread parsing each line using the corresponding format description. In keeps track of all encountered users and populates a registry of them and all their requests discovered in logs.

5 4.3 Geolocation Once the data is gathered the program starts to analyze it. If some user has referred from multiple different hosts then there is a possibility of fraud. In this case geolocation of all that users remote hosts is performed using MaxMind database. It is possible to specify the location of the binary database file in the configuration. For development and experiments we use the freely available GeoLite City database. MaxMind open-source Java API is used for actual querying. The retrieved Location object contains information concerning the most probable match obtained from the database. This information includes the following useful fields: Country name and code. City name. Geographical coordinates (latitude and longitude). This information is already enough for applying some analysis metrics listed in introduction, e.g. determine whether the user has referred from lots of different distinct locations or from non trust-worthy countries. 4.4 Movement Calculation Since we have the exact time of each request and the coordinates of the location from which that request was made, it is possible to determine the speed of movements between those locations. Suppose we have 2 consecutive requests from the same user: 1. IP , date :30:23 2. IP , date :35:34 Time between these two requests is 5 minutes and 11 seconds or 0,086 hours. The first IP originates from Tartu, Estonia. The second belongs to Oslo, Norway. The distance between those cities is 926,559 km. It means that the speed of moving from Tartu to Oslo had to be 10725,443 km/h which is not likely to be feasible so there is a large possibility of fraud. At this stage all such suspicious cases are just printed to a specified file as an output. 5 Experiments Work in progress, summary will be present in the final version. 6 Conclusion Conclusion will be based on experiment results.

6 References 1. Logging Control In W3C httpd, 2. Extended Log File Format, 3. MaxMind,

Authentication. Katarina

Authentication. Katarina Authentication Katarina Valalikova @KValalikova k.valalikova@evolveum.com 1 Agenda History Multi-factor, adaptive authentication SSO, SAML, OAuth, OpenID Connect Federation 2 Who am I? Ing. Katarina Valaliková

More information

Web Services in Cincom VisualWorks. WHITE PAPER Cincom In-depth Analysis and Review

Web Services in Cincom VisualWorks. WHITE PAPER Cincom In-depth Analysis and Review Web Services in Cincom VisualWorks WHITE PAPER Cincom In-depth Analysis and Review Web Services in Cincom VisualWorks Table of Contents Web Services in VisualWorks....................... 1 Web Services

More information

Looking Inside the Developer s Toolkit: Web Services for Everyday RPG Consumption. Charles Guarino XML. Charles Guarino

Looking Inside the Developer s Toolkit: Web Services for Everyday RPG Consumption. Charles Guarino XML. Charles Guarino Looking Inside the Developer s Toolkit: Web Services for Everyday RPG Consumption Charles Guarino XML Charles Guarino Central Park Data Systems, Inc. Copyright Central Park Data Systems, Inc. 1 About the

More information

Where is Geolocation of an IP Address?

Where is Geolocation of an IP Address? WHAT IS MY IP HIDE IP CHANGE IP VPN PROXY DDOS WEB S KB FORUMS Where is Geolocation of an IP Address? Your public IP Address is 73.245.1.29. Hide IP with VPN IPv4, IPv6 or Domain Name IP Lookup Here are

More information

Release Presentation. ODS Web Services Version Open Data Services Via Web Services. Release Date: 2014/09/30

Release Presentation. ODS Web Services Version Open Data Services Via Web Services. Release Date: 2014/09/30 Release Presentation ODS Web Services Version 1.1.1 Open Data Services Via Web Services Release Date: 2014/09/30 Deliverables The document represents a companion standard recommendation for interacting

More information

DATABASE SYSTEMS. Introduction to MySQL. Database System Course, 2016

DATABASE SYSTEMS. Introduction to MySQL. Database System Course, 2016 DATABASE SYSTEMS Introduction to MySQL Database System Course, 2016 AGENDA FOR TODAY Administration Database Architecture on the web Database history in a brief Databases today MySQL What is it How to

More information

Oleksandr Kuzomin, Bohdan Tkachenko

Oleksandr Kuzomin, Bohdan Tkachenko International Journal "Information Technologies Knowledge" Volume 9, Number 2, 2015 131 INTELLECTUAL SEARCH ENGINE OF ADEQUATE INFORMATION IN INTERNET FOR CREATING DATABASES AND KNOWLEDGE BASES Oleksandr

More information

geoip2 Documentation Release Gregory Oschwald

geoip2 Documentation Release Gregory Oschwald geoip2 Documentation Release 2.9.0 Gregory Oschwald May 25, 2018 Contents 1 Description 1 2 Installation 3 2.1 Database Reader Extension....................................... 3 3 IP Geolocation Usage

More information

Location-Based Social Software for Mobile Devices. Inventors: Dennis Crowley Alex Rainert New York, NY Brooklyn, NY 11231

Location-Based Social Software for Mobile Devices. Inventors: Dennis Crowley Alex Rainert New York, NY Brooklyn, NY 11231 Title: Location-Based Social Software for Mobile Devices Date: April 28, 2004 Inventors: Dennis Crowley Alex Rainert New York, NY 10002 Brooklyn, NY 11231 dens@dodgeball.com alex@dodgeball.com Abstract

More information

W3C Geolocation API. Making Websites Location-aware

W3C Geolocation API. Making Websites Location-aware W3C Geolocation API Making Websites Location-aware me Director of Consumer Products at Skyhook Wireless Founded Locationaware.org which eventually became W3C Geolocation API Working Group Follow @rsarver

More information

Magento 2 / Google Maps Integration User Guide For Extension Version 1.0.2

Magento 2 / Google Maps Integration User Guide For Extension Version 1.0.2 Magento 2 / Google Maps Integration User Guide For Extension Version 1.0.2 This document details the installation, configuration and functionality of the DP Extensions Google Maps Integration for Magento

More information

BusinessObjects OLAP Intelligence XI

BusinessObjects OLAP Intelligence XI Configuring Overview BusinessObjects OLAP Intelligence XI allows users to connect to and design custom applications against OLAP data sources. OLAP Intelligence XI and its web components use the Microsoft

More information

DIRAC distributed secure framework

DIRAC distributed secure framework Journal of Physics: Conference Series DIRAC distributed secure framework To cite this article: A Casajus et al 2010 J. Phys.: Conf. Ser. 219 042033 View the article online for updates and enhancements.

More information

E-Agricultural Services and Business

E-Agricultural Services and Business E-Agricultural Services and Business The Sustainable Web Portal for Observation Data Naiyana Sahavechaphan, Jedsada Phengsuwan, Nattapon Harnsamut Sornthep Vannarat, Asanee Kawtrakul Large-scale Simulation

More information

Inventions on Extending LDAP functionality- A TRIZ based Analysis

Inventions on Extending LDAP functionality- A TRIZ based Analysis From the SelectedWorks of Umakant Mishra August, 2006 Inventions on Extending LDAP functionality- A TRIZ based Analysis Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/60/ Inventions

More information

DIRAC Distributed Secure Framework

DIRAC Distributed Secure Framework DIRAC Distributed Secure Framework A Casajus Universitat de Barcelona E-mail: adria@ecm.ub.es R Graciani Universitat de Barcelona E-mail: graciani@ecm.ub.es on behalf of the LHCb DIRAC Team Abstract. DIRAC,

More information

A quick guide to... List Segmentation

A quick guide to... List Segmentation A quick guide to... List Segmentation In this guide... Learn how to create razor-sharp list segments based on precise combinations of conditions then use those segments to generate profitable email marketing

More information

Configuring and Monitoring the GeoDB

Configuring and Monitoring the GeoDB CHAPTER 8 This chapter describes how to implement the GeoIP database (GeoDB) proximity computation mechanism in GSS. From the latitudinal and longitudinal information in the GeoDB, GSS decides the proximity,

More information

Understanding ACS 5.4 Configuration

Understanding ACS 5.4 Configuration CHAPTER 2 ACS 5.4 Configuration : This chapter explains the differences in configuration between ACS 3.x and 4.x and ACS 5.4 when you convert the existing 3.x and 4.x configurations to 5.4. This chapter

More information

FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE

FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE David C. Hay Essential Strategies, Inc In the buzzword sweepstakes of 1997, the clear winner has to be Data Warehouse. A host of technologies and techniques

More information

Big Data Analytics CSCI 4030

Big Data Analytics CSCI 4030 High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Queries on streams

More information

Assignment #3 CSCI 201 Spring % of course grade Title Weathermeister Back-End API Integration

Assignment #3 CSCI 201 Spring % of course grade Title Weathermeister Back-End API Integration Assignment #3 CSCI 201 4.5% of course grade Title Weathermeister Back-End API Integration Topics Covered Java Classes HTML CSS Basic Java Topics Java Servlets JSP JavaScript AJAX Databases SQL JDBC Overview

More information

Wildlife Enforcement Monitoring System. User Manual. Khoi Nguyen Remi Chandran Ng Chong. type date version. User Manual July 07, 2011 Version 1-1

Wildlife Enforcement Monitoring System. User Manual. Khoi Nguyen Remi Chandran Ng Chong. type date version. User Manual July 07, 2011 Version 1-1 Wildlife Enforcement Monitoring System User Manual Khoi Nguyen Remi Chandran Ng Chong type date version User Manual July 07, 2011 Version 1-1 Extensible Message Gateway User Manual ii About this Document

More information

GOOGLE ANALYTICS HELP PRESENTATION. We Welcome You to. Google Analytics Implementation Guidelines

GOOGLE ANALYTICS HELP PRESENTATION. We Welcome You to. Google Analytics Implementation Guidelines GOOGLE ANALYTICS HELP PRESENTATION We Welcome You to Google Analytics Implementation Guidelines 05/23/2008 Ashi Avalon - Google Analytics Implementation Presentation Page 1 of 28 1) What Is Google Analytics?

More information

Configure WSA to Upload Log Files to CTA System

Configure WSA to Upload Log Files to CTA System Configure WSA to Upload Log Files to CTA System Last updated: January 30, 2018 Contents Conventions Introduction Prerequisites Requirements Components Used Configure Configure the Proxy Connect to Active

More information

Lecture 9a: Sessions and Cookies

Lecture 9a: Sessions and Cookies CS 655 / 441 Fall 2007 Lecture 9a: Sessions and Cookies 1 Review: Structure of a Web Application On every interchange between client and server, server must: Parse request. Look up session state and global

More information

Secure web proxy resistant to probing attacks

Secure web proxy resistant to probing attacks Technical Disclosure Commons Defensive Publications Series December 04, 2017 Secure web proxy resistant to probing attacks Benjamin Schwartz Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

Chapter 1 Introduction to HTML, XHTML, and CSS

Chapter 1 Introduction to HTML, XHTML, and CSS Chapter 1 Introduction to HTML, XHTML, and CSS MULTIPLE CHOICE 1. The world s largest network is. a. the Internet c. Newsnet b. the World Wide Web d. both A and B A PTS: 1 REF: HTML 2 2. ISPs utilize data

More information

Top 10 Considerations for Securing Private Clouds

Top 10 Considerations for Securing Private Clouds Top 10 Considerations for Securing Private Clouds 1 Who s that knocking at my door? If you know who s accessing your cloud, you can head off many problems before they turn into disasters. You should ensure

More information

mole Documentation Release 1.0 Andrés J. Díaz

mole Documentation Release 1.0 Andrés J. Díaz mole Documentation Release 1.0 Andrés J. Díaz May 27, 2013 CONTENTS 1 Installation 3 2 Getting started 5 2.1 1. Configure mole............................................ 5 2.2 2. Start daemons.............................................

More information

Homework: Spatial Search using Apache Solr, SIS and Google Maps Due Date: May 7, 2014

Homework: Spatial Search using Apache Solr, SIS and Google Maps Due Date: May 7, 2014 Homework: Spatial Search using Apache Solr, SIS and Google Maps Due Date: May 7, 2014 1. Introduction So, we re at the end of the road here with assignments. Let s recap what you ve done so far: 1. In

More information

Configure WSA to Upload Log Files to CTA System

Configure WSA to Upload Log Files to CTA System Configure WSA to Upload Log Files to CTA System Last updated: April 19, 2018 Conventions Introduction Prerequisites Requirements Components Used Configure Configure the Proxy Connect to Active Directory

More information

Management Intranet: Integrating Web-based Network Management Applications

Management Intranet: Integrating Web-based Network Management Applications Management Intranet: Integrating Web-based Network Management Applications Jim Turner Cisco Systems Inc. 125 Rio Robles San Jose, CA 95134 USA jiturner@cisco.com Swami Jayaraman Cisco Systems Inc. 125

More information

CS6200 Information Retreival. Crawling. June 10, 2015

CS6200 Information Retreival. Crawling. June 10, 2015 CS6200 Information Retreival Crawling Crawling June 10, 2015 Crawling is one of the most important tasks of a search engine. The breadth, depth, and freshness of the search results depend crucially on

More information

Mobile Phone Monitoring System For Android Operating System

Mobile Phone Monitoring System For Android Operating System Mobile Phone Monitoring System For Android Operating System Ms.M.Kalpana Devi Asst.Professor,SRIT,CBE Ms.D.Vasuki Final Year M.C.A.,Student Abstract The Purpose of the project is to trace out the status

More information

Build

Build Web Dashboard User Manual Build 2.2.0.1 2017-04-05 This is the official user manual on using SAMLite web dashboard to perform reporting and administrative tasks. This manual describes each section of reporting

More information

Software Release Communication 02/07/2014. Topics covered. Solutions You Can Count On

Software Release Communication 02/07/2014. Topics covered. Solutions You Can Count On Topics covered Vea Web... 2 User Access Changes... 4 Dashboard Sharing... 7 Component Upgrade... 8 System Manager Geocode Function... 9 Installer Changes... 11 VEA WEB The initial version of Vea Web, included

More information

ARCHITECTURE ARCHITECTURE OVERVIEW

ARCHITECTURE ARCHITECTURE OVERVIEW ARCHITECTURE ARCHITECTURE OVERVIEW The personalization of the customer experience is in every marketer s mind and this requirement has strong impacts on customer data integration, across channels and applications.

More information

DSNP: A Protocol for Personal Identity and Communication on the Web

DSNP: A Protocol for Personal Identity and Communication on the Web DSNP: A Protocol for Personal Identity and Communication on the Web Dr. Adrian D. Thurston Vancouver, British Columbia, Canada thurston@complang.org Abstract The social web is emerging as a pervasive communication

More information

Statistics, Data Analysis & Econometrics

Statistics, Data Analysis & Econometrics ST009 PROC MI as the Basis for a Macro for the Study of Patterns of Missing Data Carl E. Pierchala, National Highway Traffic Safety Administration, Washington ABSTRACT The study of missing data patterns

More information

MSNPawn Footprinting, Profiling & Assessment with MSN Search. Introduction

MSNPawn Footprinting, Profiling & Assessment with MSN Search. Introduction MSNPawn Footprinting, Profiling & Assessment with MSN Search Introduction Any search engine database is a very powerful source of information for web applications. The Search Engine s spiders are well-powered

More information

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 25 Tutorial 5: Analyzing text using Python NLTK Hi everyone,

More information

The INSERT INTO Method

The INSERT INTO Method Article: Transferring Data from One Table to Another Date: 20/03/2012 Posted by: HeelpBook Staff Source: Link Permalink: Link SQL SERVER TRANSFERRING DATA FROM ONE TABLE TO ANOTHER Every DBA needs to transfer

More information

Screw You and the Script You Rode in On

Screw You and the Script You Rode in On Screw You and the Script You Rode in On David Byrne Managing Consultant dbyrne@trustwave.com Presented by: Charles Henderson Director, Application Security Services chenderson@trustwave.com Introductions

More information

Deep Web Content Mining

Deep Web Content Mining Deep Web Content Mining Shohreh Ajoudanian, and Mohammad Davarpanah Jazi Abstract The rapid expansion of the web is causing the constant growth of information, leading to several problems such as increased

More information

Family Map Server Specification

Family Map Server Specification Family Map Server Specification Acknowledgements Last Modified: January 5, 2018 The Family Map project was created by Jordan Wild. Thanks to Jordan for this significant contribution. Family Map Introduction

More information

Security Enterprise Identity Mapping

Security Enterprise Identity Mapping System i Security Enterprise Identity Mapping Version 6 Release 1 System i Security Enterprise Identity Mapping Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

HTML5 - INTERVIEW QUESTIONS

HTML5 - INTERVIEW QUESTIONS HTML5 - INTERVIEW QUESTIONS http://www.tutorialspoint.com/html5/html5_interview_questions.htm Copyright tutorialspoint.com Dear readers, these HTML5 Interview Questions have been designed specially to

More information

CS 361S - Network Security and Privacy Spring Homework #1

CS 361S - Network Security and Privacy Spring Homework #1 CS 361S - Network Security and Privacy Spring 2017 Homework #1 Due: 11am CST (in class), February 13, 2017 YOUR NAME: Collaboration policy No collaboration is permitted on this assignment. Any cheating

More information

Project #3. Computer Science 2334 Fall Create a Graphical User Interface and import/export software for a Hurricane Database.

Project #3. Computer Science 2334 Fall Create a Graphical User Interface and import/export software for a Hurricane Database. User Request: Project #3 Computer Science 2334 Fall 2007 Milestones: Create a Graphical User Interface and import/export software for a Hurricane Database. 1. Create import software that can read the output

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

We start by providing you with an overview of the key feature of the IBM BPM Process Portal.

We start by providing you with an overview of the key feature of the IBM BPM Process Portal. Lab 1 Process Portal 1.1 Overview This lab exercise will make you familiar with the key capabilities of the ready-to-use Process Portal included with IBM Business Process Manager (BPM). You will experience

More information

EZproxy v6.3.5 Release Notes

EZproxy v6.3.5 Release Notes EZproxy v6.3.5 Release Notes Release Date: November 2017 Last updated: November 20, 2017 Table of Contents Operating System Requirements... 2 Recommended Actions... 2 Release Notes... 3 Administrative

More information

Clicking on Analytics will bring you to the Overview page.

Clicking on Analytics will bring you to the Overview page. YouTube Analytics - formerly known as Insight - is an extremely powerful set of tools that can provide you with a lot of information about your videos, your audience, and your customers. Clicking on Analytics

More information

CHAPTER 7 WEB SERVERS AND WEB BROWSERS

CHAPTER 7 WEB SERVERS AND WEB BROWSERS CHAPTER 7 WEB SERVERS AND WEB BROWSERS Browser INTRODUCTION A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information

More information

[GET] Mass GeoIP Lookup Tool + Source Code

[GET] Mass GeoIP Lookup Tool + Source Code [GET] Mass GeoIP Lookup Tool + Source Code 1. Good morning everyone \o/ here i've made a tool for easily auditing location data from large lists of IP addresses to use it, just copy any block of text containing

More information

User Guide. Version 1.5 Copyright 2006 by Serials Solutions, All Rights Reserved.

User Guide. Version 1.5 Copyright 2006 by Serials Solutions, All Rights Reserved. User Guide Version 1.5 Copyright 2006 by Serials Solutions, All Rights Reserved. Central Search User Guide Table of Contents Welcome to Central Search... 3 Starting Your Search... 4 Basic Search & Advanced

More information

ScholarOne Manuscripts. COGNOS Reports User Guide

ScholarOne Manuscripts. COGNOS Reports User Guide ScholarOne Manuscripts COGNOS Reports User Guide 1-May-2018 Clarivate Analytics ScholarOne Manuscripts COGNOS Reports User Guide Page i TABLE OF CONTENTS USE GET HELP NOW & FAQS... 1 SYSTEM REQUIREMENTS...

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

Information Extraction Techniques in Terrorism Surveillance

Information Extraction Techniques in Terrorism Surveillance Information Extraction Techniques in Terrorism Surveillance Roman Tekhov Abstract. The article gives a brief overview of what information extraction is and how it might be used for the purposes of counter-terrorism

More information

Using the vrealize Orchestrator Operations Client. vrealize Orchestrator 7.5

Using the vrealize Orchestrator Operations Client. vrealize Orchestrator 7.5 Using the vrealize Orchestrator Operations Client vrealize Orchestrator 7.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Talend Component tgoogledrive

Talend Component tgoogledrive Talend Component tgoogledrive Purpose and procedure This component manages files on a Google Drive. The component provides these capabilities: 1. Providing only the client for other tgoogledrive components

More information

Family Map Server Specification

Family Map Server Specification Family Map Server Specification Acknowledgements The Family Map project was created by Jordan Wild. Thanks to Jordan for this significant contribution. Family Map Introduction Family Map is an application

More information

Family Map Server Specification

Family Map Server Specification Family Map Server Specification Acknowledgements The Family Map project was created by Jordan Wild. Thanks to Jordan for this significant contribution. Family Map Introduction Family Map is an application

More information

Dynamic code downloading using Java TM (Using the java.rmi.server.codebase Property)

Dynamic code downloading using Java TM (Using the java.rmi.server.codebase Property) Pagina 1 Dynamic code downloading using Java TM RMI (Using the java.rmi.server.codebase Property) This tutorial is organized as follows: 1. Starting out 2. What is a codebase? 3. How does it work? 4. Using

More information

Malware and Vulnerability Check Point. 1. Find Problems 2. Tell Vendors 3. Share with Community

Malware and Vulnerability Check Point. 1. Find Problems 2. Tell Vendors 3. Share with Community Malware and Vulnerability Research @ Check Point 1. Find Problems 2. Tell Vendors 3. Share with Community TR-069 quick tour / DEF CON recap Motivation The TR-069 Census 2014 Research Highlights Mass Pwnage

More information

CS 3201 Computer Networks 2014/2015 Handout: Lab 4

CS 3201 Computer Networks 2014/2015 Handout: Lab 4 CS 3201 Computer Networks 2014/2015 Handout: Lab 4 Lab Content: - IP Addressing - IP Ports TCP/IP Fundamentals TCP/IP Settings - TCP/IP is a protocol that requires a little bit of knowledge to configure

More information

DATABASE SYSTEMS. Introduction to MySQL. Database System Course, 2018

DATABASE SYSTEMS. Introduction to MySQL. Database System Course, 2018 DATABASE SYSTEMS Introduction to MySQL Database System Course, 2018 CAUTION! *This class is NOT a recitation* We will NOT discuss the course material relevant to the exam and homework assignment We have

More information

LMS Instructions. To watch a video simply click on a category, then select the title you would like to train on and click play.

LMS Instructions. To watch a video simply click on a category, then select the title you would like to train on and click play. LMS Instructions Welcome to our learning management system! This is a guide and will explain you the basic functions of the LMS. If you are not already logged in you will notice a login option up top in

More information

5 Choosing keywords Initially choosing keywords Frequent and rare keywords Evaluating the competition rates of search

5 Choosing keywords Initially choosing keywords Frequent and rare keywords Evaluating the competition rates of search Seo tutorial Seo tutorial Introduction to seo... 4 1. General seo information... 5 1.1 History of search engines... 5 1.2 Common search engine principles... 6 2. Internal ranking factors... 8 2.1 Web page

More information

The Evaluation of Just-In-Time Hypermedia Engine

The Evaluation of Just-In-Time Hypermedia Engine The Evaluation of Just-In-Time Hypermedia Engine Zong Chen 1, Li Zhang 2 1 (School of Computer Sciences and Engineering, Fairleigh Dickinson University, USA) 2 (Computer Science Department, New Jersey

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

C exam. IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1.

C exam.   IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1. C9510-319.exam Number: C9510-319 Passing Score: 800 Time Limit: 120 min File Version: 1.0 IBM C9510-319 IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile Version: 1.0 Exam A QUESTION

More information

Domain Setup Guide. NetBrain Integrated Edition 7.1. All-in-One Appliance

Domain Setup Guide. NetBrain Integrated Edition 7.1. All-in-One Appliance NetBrain Integrated Edition 7.1 Domain Setup Guide All-in-One Appliance Version 7.1a Last Updated 2018-09-27 Copyright 2004-2018 NetBrain Technologies, Inc. All rights reserved. Contents 1. Setting Up

More information

Ebook : Overview of application development. All code from the application series books listed at:

Ebook : Overview of application development. All code from the application series books listed at: Ebook : Overview of application development. All code from the application series books listed at: http://www.vkinfotek.com with permission. Publishers: VK Publishers Established: 2001 Type of books: Develop

More information

CTI-TC Weekly Working Sessions

CTI-TC Weekly Working Sessions CTI-TC Weekly Working Sessions Meeting Date: October 18, 2016 Time: 15:00:00 UTC Purpose: Weekly CTI-TC Joint Working Session Attendees: Agenda: Jordan - Moderator Darley Christian Hunt Rich Piazza TAXII

More information

WWW Applications for an Internet Integrated Service Architecture

WWW Applications for an Internet Integrated Service Architecture WWW Applications for an Internet Integrated Service Architecture T. V. Do, B. Kálmán, Cs. Király, Zs. Mihály, Zs. Molnár, Zs. Pándi Department of Telecommunications Technical University of Budapest Fax:

More information

Configuration Management for Component-based Systems

Configuration Management for Component-based Systems Configuration Management for Component-based Systems Magnus Larsson Ivica Crnkovic Development and Research Department of Computer Science ABB Automation Products AB Mälardalen University 721 59 Västerås,

More information

Configuring Vulnerability Assessment Devices

Configuring Vulnerability Assessment Devices CHAPTER 10 Revised: November 10, 2007 Vulnerability assessment (VA) devices provide MARS with valuable information about many of the possible targets of attacks and threats. They provide information useful

More information

Datto Disaster Tracking

Datto Disaster Tracking Datto Disaster Tracking Design/Architecture Document Masters of Disaster Nsama Chipalo, Brandon Cole, Aaron Damrau, Jhossue Jimenez, Jacob Peterson Last Updated May 11th, 2015 Table of Contents Table of

More information

Oracle. Exam Questions 1z Java Enterprise Edition 5 Web Services Developer Certified Professional Upgrade Exam. Version:Demo

Oracle. Exam Questions 1z Java Enterprise Edition 5 Web Services Developer Certified Professional Upgrade Exam. Version:Demo Oracle Exam Questions 1z0-863 Java Enterprise Edition 5 Web Services Developer Certified Professional Upgrade Exam Version:Demo 1.Which two statements are true about JAXR support for XML registries? (Choose

More information

Privacy Policy. Last Updated: August 2017

Privacy Policy. Last Updated: August 2017 Privacy Policy Last Updated: August 2017 Here at ConsenSys we know how much you value privacy, and we realize that you care about what happens to the information you provide to us through our website,

More information

DATABASE SYSTEMS. Introduction to MySQL. Database System Course, 2016

DATABASE SYSTEMS. Introduction to MySQL. Database System Course, 2016 DATABASE SYSTEMS Introduction to MySQL Database System Course, 2016 AGENDA FOR TODAY Administration Database Architecture on the web Database history in a brief Databases today MySQL What is it How to

More information

How Facebook knows exactly what turns you on

How Facebook knows exactly what turns you on How Facebook knows exactly what turns you on We have developed our anti tracking system to combat a culture of user data collection which, we believe, has gone too far. These systems operate hidden from

More information

Screen Scraping. Screen Scraping Defintions ( Web Scraping (

Screen Scraping. Screen Scraping Defintions (  Web Scraping ( Screen Scraping Screen Scraping Defintions (http://www.wikipedia.org/) Originally, it referred to the practice of reading text data from a computer display terminal's screen. This was generally done by

More information

Genesys Mobile Services API Reference. Phone Number Validation API

Genesys Mobile Services API Reference. Phone Number Validation API Genesys Mobile Services API Reference Phone Number Validation API 9/25/2018 Contents 1 Phone Number Validation API 1.1 API Query Genesys Mobile Services API Reference 2 Phone Number Validation API This

More information

Lecture 1: Perfect Security

Lecture 1: Perfect Security CS 290G (Fall 2014) Introduction to Cryptography Oct 2nd, 2014 Instructor: Rachel Lin 1 Recap Lecture 1: Perfect Security Scribe: John Retterer-Moore Last class, we introduced modern cryptography and gave

More information

NUS-I2R: Learning a Combined System for Entity Linking

NUS-I2R: Learning a Combined System for Entity Linking NUS-I2R: Learning a Combined System for Entity Linking Wei Zhang Yan Chuan Sim Jian Su Chew Lim Tan School of Computing National University of Singapore {z-wei, tancl} @comp.nus.edu.sg Institute for Infocomm

More information

Take Your SIEM to the Next Level with 3rd Party Tools and Scripts

Take Your SIEM to the Next Level with 3rd Party Tools and Scripts Take Your SIEM to the Next Level with 3rd Party Tools and Scripts SIEM & Tactical Analytics SUMMIT November 2017 Who Am I? Austin Taylor Chief Security Research Engineer @ IronNet Cybersecurity Cyber Warfare

More information

AGRICULTURE BASED ANDROID APPLICATION

AGRICULTURE BASED ANDROID APPLICATION AGRICULTURE BASED ANDROID APPLICATION Prof.Aradhana D 1, Shiva Prasad K S 2, Shrivaishnavi J K 3, P. Sowmya 4, Tina Agarwal 5 1 Department of Computer Science & Engineering Ballari Institute of Technology

More information

SHORT NOTES / INTEGRATION AND MESSAGING

SHORT NOTES / INTEGRATION AND MESSAGING SHORT NOTES / INTEGRATION AND MESSAGING 1. INTEGRATION and MESSAGING is related to HOW to SEND data to and receive from ANOTHER SYSTEM or APPLICATION 2. A WEB SERVICE is a piece of software designed to

More information

Online ID Checker. Version: Thundercat. Team 1

Online ID Checker. Version: Thundercat. Team 1 Version: Thundercat Skyler Beckman, Dylan Fistrovic, Assel Gabdullina, Alex Jahns, Mikhail Kim, Calvin Sauer, Almas Talgambayev 1 Table of Contents Purpose Summary of Requirements User Requirements Client

More information

Web Application Footprinting & Assessment with MSN Search Tricks

Web Application Footprinting & Assessment with MSN Search Tricks Web Application Footprinting & Assessment with MSN Search Tricks Introduction Any search engine database is a very powerful source of information for web applications. The Search Engine s spiders are well-powered

More information

1 Connectionless Routing

1 Connectionless Routing UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing

More information

CHAPTER - 3 PREPROCESSING OF WEB USAGE DATA FOR LOG ANALYSIS

CHAPTER - 3 PREPROCESSING OF WEB USAGE DATA FOR LOG ANALYSIS CHAPTER - 3 PREPROCESSING OF WEB USAGE DATA FOR LOG ANALYSIS 48 3.1 Introduction The main aim of Web usage data processing is to extract the knowledge kept in the web log files of a Web server. By using

More information

Timelog System on Android OS

Timelog System on Android OS Degree project Timelog System on Android OS I Author: Mohammad Ali Rezaei Date: 2012-12-15 Subject: Computer Science Level: Master Course code: 5DV00E Abstract Usage of smart phones has become more common

More information

An open source A-GNSS reference server

An open source A-GNSS reference server International Global Navigation Satellite Systems Society IGNSS Symposium 2007 The University of New South Wales, Sydney, Australia 4 6 December, 2007 An open source A-GNSS reference server Thomas S. Yan,

More information

The Internet The Internet

The Internet The Internet The Internet The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number

More information

RSA NetWitness Logs. Cisco IronPort Web Security Appliance (WSA) Event Source Log Configuration Guide. Last Modified: Tuesday, January 9, 2018

RSA NetWitness Logs. Cisco IronPort Web Security Appliance (WSA) Event Source Log Configuration Guide. Last Modified: Tuesday, January 9, 2018 RSA NetWitness Logs Event Source Log Configuration Guide Cisco IronPort Web Security Appliance (WSA) Last Modified: Tuesday, January 9, 2018 Event Source Product Information: Vendor: Cisco Event Source:

More information

Q&As. Microsoft MTA Software Development Fundamentals. Pass Microsoft Exam with 100% Guarantee

Q&As. Microsoft MTA Software Development Fundamentals. Pass Microsoft Exam with 100% Guarantee 98-361 Q&As Microsoft MTA Software Development Fundamentals Pass Microsoft 98-361 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information