Detecting Web Crawlers from Web Server Access Logs with Data Mining Classifiers

  • Dusan Stevanovic
  • Aijun An
  • Natalija Vlajic
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6804)

Abstract

In this study, we introduce two novel features: the consecutive sequential request ratio and standard deviation of page request depth, for improving the accuracy of malicious and non-malicious web crawler classification from static web server access logs with traditional data mining classifiers. In the first experiment we evaluate the new features on the classification of known well-behaved web crawlers and human visitors. In the second experiment we evaluate the new features on the classification of malicious web crawlers, unknown visitors, well-behaved crawlers and human visitors. The classification performance is evaluated in terms of classification accuracy, and F1 score. The experimental results demonstrate the potential of the two new features to improve the accuracy of data mining classifiers in identifying malicious and well-behaved web crawler sessions.

Keywords

Web Crawler Detection Web Server Access Logs Data Mining Classification DDoS WEKA 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wilson, C.: Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Foreign Affairs, Defense, and Trade Division, United States Governemnt (2008)Google Scholar
  2. 2.
  3. 3.
    Tan, P.N., Kumar, V.: Patterns, Discovery of Web Robot Sessions Based on their Navigation. Data Mining and Knowledge Discovery 6, 9–35 (2002)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Bomhardt, C., Gaul, W., Schmidt-Thieme, L.: Web Robot Detection - Preprocessing Web Logfiles for Robot Detection. In: Proc. SISCLADAG, Bologna, Italy (2005)Google Scholar
  5. 5.
    Stassopoulou, A., Dikaiakos, M.D.: Web robot detection: A probabilistic reasoning approach. Computer Networks: The International Journal of Computer and Telecommunications Networking 53, 265–278 (2009)CrossRefMATHGoogle Scholar
  6. 6.
    Doran, D., Gokhale, S.S.: Web robot detection techniques: overview and limitations. Data Mining and Knowledge Discovery, 1–28 (June 2010)Google Scholar
  7. 7.
    User-Agents.org (January 2011), http://www.user-agents.org
  8. 8.
    Bots vs. Browsers (January 2011), http://www.botsvsbrowsers.com/
  9. 9.
    Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Francisco (1993)Google Scholar
  10. 10.
    Cohen, W.W.: Fast effective rule induction. In: ICML 1995, pp. 115–123 (1995)Google Scholar
  11. 11.
    Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Elsevier, San Francisco (2006)MATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Dusan Stevanovic
    • 1
  • Aijun An
    • 1
  • Natalija Vlajic
    • 1
  1. 1.Department of Computer Science and EngineeringYork UniversityTorontoCanada

Personalised recommendations