SlideShare ist ein Scribd-Unternehmen logo
Presented By: Somnath Mazumdar
              somnath.mazumdar@ucdconnect.ie
https://www.csi.ucd.ie/users/somnath-mazumdar
z Introduction
z Pros & Cons of Methods
z AWStats
z Google Analytics
z AWStats Vs Google Analytics
z Packet Sniffing
z Approach
z Conclusion
                                 1
z  Weblogs: Activity/transaction information of web
    servers
z  Earlier weblogs are used to count the visitors.
z  Web Analysis: off-site and on-site.
z  On site information retrieval: 1. Page Tag
                     2. Historical Web data Analysis.
z  Usages : 1.Performance
               2.Security
               3.Prediction (Regression/CART)
               4.Reporting&Profiling:    4.1. Web statistics
                                         4.2. Business
Analytics(K-means, MC)
                                                           2
z  Pros:    1. Accuracy: End user data.
             2. Speed of Data Reporting
             3. Data Collection Flexibility
             4. No need of own web server

z  Cons:   1. User or Firewalls can restrict tag L
            2. Tag each page L
            3. cannot report on non-pages hit
            4. Unable to track bandwidth, server
response time or completed downloads.


                                                       3
z  Pros:
       1. Non-invasive data collection
       2. Can track bandwidth and completed downloads
       3. Helps to optimize for search engine
       4. Securely capture http user names
       5. Can track “spiders” or robots.




                                                        4
6. Exact content delivery information
            7. Website content time-to-serve time
            8. Missing or broken pages information

z  Cons:   1. Proxy/caching inaccuracies
            2. No event (javascript, flash or AJAX )
tracking
             3. Log management :Log generation, Log
storage, and log file transfer.



                                                       5
z  Goal: System based or Product based
z  Cost: Freeware or Commercial
z  Storage: Log Storage (3rd party)
z  Report/Tips: Generate report static or real time with
  tips..
      AWStats is a powerful log analyzer creates
advanced web, ftp, mail and streaming server statistics
reports.
      Google Analytics provides in depth product
marketing information and tips (Google Adwords/
AdSense).

                                                          6
z  Freeware
z  Graphically presented reports
z  Customizable reports
z  Reports based on users, OS, browser, location, data
    transfer, bookmark, total visits and so on.
z  Standard and custom log format supported
z  Works from CLI as well as a CGI (Flexibility)
z  Written in Perl
z  Many desired features..
z  But Less visualized/interactive (GA)


                                                          7
z  Issues: 1. DNS look up & Full Year View (time)
            2. Database Format Using "xml" format 3 times
            larger than default.
            3. Feature exclude records from SPAM
        referrer (5 times slower).
            4. To differentiate URLs of dynamic pages
(memory).
            5. Accuracy hampers speed: Keywords ( 1%),
Search Engines (9%) Worms Detection(15%), OS(2%).
            6. Each Extra section reduces AWStats
speed by 8%.
             Wrong setup may eat all memory.

                                                      8
z  Session "unknown"
z  AWStats counts everything as pages
z  Reports cannot be generate based on current/custom
    date
z  Reports cannot be generate based on custom date
    range and on weekly basis.
z  On few Intel Pentium4 / Xeon4 based host systems,
    log file time can not be computed correctly L .




                                                         9
10
z  “Google Analytics shows you how people found your
    site, how they explored it, and how you can enhance
    their visitor experience.”—Google
z  Free
z  Help visitors by providing better keyword search
z  Provide information related to website design.
z  Tagging :Automatic for content management system
    or blogging platform but manual for customize
    website.
z  Confidentiality : Third party data processing.



                                                          11
12
Name                  AWStats            Google Analytics
Based on logs            Yes             Site Search data
Page Tagging              No                    Yes
Hits count        Count everything as     IP address and
                         page                 cookies
Confidentiality      Not an issue       Issue (if not owner)
Meant for           website traffic     Website traffic and
                       analysis.            marketing
                                          effectiveness.
Market Share             NA              Around 49.95% of
                                        top 1,000,000 hosts



                                                            13
z  Power of analysis is limited by the information in logs.
z  Extensive logging that consumes resources.
             ….more we measure, less accurate we
understand …..
             Awstats, Webalizer and Google Analytics
are always different due to different techniques.

      Use AWStats as well as Google Analytics to
              have better prediction



                                                           14
15
z  Packet sniffer can capture and decode data streams
      passing over a digital network.
z    Non-intrusive technology : no log, no page tag.
z    Deploy sniffer into local network of servers to be tracked.
z    Completely transparent for tracked website(s)
z    Supports multiple servers without effecting server
      response time.




                      Block Diagram of Packet Sniffing
                                                               16
z  Packet sniffer can capture and decode data streams
      passing over a digital network.
z    Non-intrusive technology : no log, no page tag.
z    Deploy sniffer into local network of servers to be tracked.
z    Completely transparent for tracked website(s)
z    Supports multiple servers without effecting server
      response time.




                      Block Diagram of Packet Sniffing
                                                               17
z  Client communication disconnects information
z  Server-side timing information
z  Website content delivery information
z  Full spectrum of hits including non-pages
z  Copes with proxy or browser caching
z  Robots and automated agents data available
z  Website content time-to-serve time




                                                   18
19

Weitere ähnliche Inhalte

Ähnlich wie Weblog analsys

Predictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-timePredictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-time
Aerospike, Inc.
 
Instrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with EnvoyInstrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with Envoy
Daniel Hochman
 
Log aggregation and analysis
Log aggregation and analysisLog aggregation and analysis
Log aggregation and analysis
Dhaval Mehta
 
What is web scraping?
What is web scraping?What is web scraping?
What is web scraping?
Brijesh Prajapati
 
A University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google AnalyticsA University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google Analytics
Chris Traganos
 
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Guglielmo Iozzia
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
RajDodiya4
 
Big data at scrapinghub
Big data at scrapinghubBig data at scrapinghub
Big data at scrapinghub
Dana Brophy
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
Velocidex Enterprises
 
Web Performance Optimization
Web Performance OptimizationWeb Performance Optimization
Web Performance Optimization
Livares Technologies Pvt Ltd
 
Using Elasticsearch for Analytics
Using Elasticsearch for AnalyticsUsing Elasticsearch for Analytics
Using Elasticsearch for Analytics
Vaidik Kapoor
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012
F _
 
Log Files
Log FilesLog Files
Node.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleNode.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scale
Dmytro Semenov
 
Vue d'ensemble Dremio
Vue d'ensemble DremioVue d'ensemble Dremio
Vue d'ensemble Dremio
Modern Data Stack France
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
amiable_indian
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
Abhishek Kumar
 
Serverless_with_MongoDB
Serverless_with_MongoDBServerless_with_MongoDB
Serverless_with_MongoDB
Amazon Web Services
 
Automation + dev ops summit hail hydrate! from stream to lake
Automation + dev ops summit   hail hydrate! from stream to lakeAutomation + dev ops summit   hail hydrate! from stream to lake
Automation + dev ops summit hail hydrate! from stream to lake
Timothy Spann
 
Cloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and FastCloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and Fast
Databricks
 

Ähnlich wie Weblog analsys (20)

Predictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-timePredictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-time
 
Instrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with EnvoyInstrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with Envoy
 
Log aggregation and analysis
Log aggregation and analysisLog aggregation and analysis
Log aggregation and analysis
 
What is web scraping?
What is web scraping?What is web scraping?
What is web scraping?
 
A University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google AnalyticsA University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google Analytics
 
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
 
Big data at scrapinghub
Big data at scrapinghubBig data at scrapinghub
Big data at scrapinghub
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
 
Web Performance Optimization
Web Performance OptimizationWeb Performance Optimization
Web Performance Optimization
 
Using Elasticsearch for Analytics
Using Elasticsearch for AnalyticsUsing Elasticsearch for Analytics
Using Elasticsearch for Analytics
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012
 
Log Files
Log FilesLog Files
Log Files
 
Node.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleNode.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scale
 
Vue d'ensemble Dremio
Vue d'ensemble DremioVue d'ensemble Dremio
Vue d'ensemble Dremio
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
 
Serverless_with_MongoDB
Serverless_with_MongoDBServerless_with_MongoDB
Serverless_with_MongoDB
 
Automation + dev ops summit hail hydrate! from stream to lake
Automation + dev ops summit   hail hydrate! from stream to lakeAutomation + dev ops summit   hail hydrate! from stream to lake
Automation + dev ops summit hail hydrate! from stream to lake
 
Cloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and FastCloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and Fast
 

Kürzlich hochgeladen

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Kürzlich hochgeladen (20)

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Weblog analsys

  • 1. Presented By: Somnath Mazumdar somnath.mazumdar@ucdconnect.ie https://www.csi.ucd.ie/users/somnath-mazumdar
  • 2. z Introduction z Pros & Cons of Methods z AWStats z Google Analytics z AWStats Vs Google Analytics z Packet Sniffing z Approach z Conclusion 1
  • 3. z  Weblogs: Activity/transaction information of web servers z  Earlier weblogs are used to count the visitors. z  Web Analysis: off-site and on-site. z  On site information retrieval: 1. Page Tag 2. Historical Web data Analysis. z  Usages : 1.Performance 2.Security 3.Prediction (Regression/CART) 4.Reporting&Profiling: 4.1. Web statistics 4.2. Business Analytics(K-means, MC) 2
  • 4. z  Pros: 1. Accuracy: End user data. 2. Speed of Data Reporting 3. Data Collection Flexibility 4. No need of own web server z  Cons: 1. User or Firewalls can restrict tag L 2. Tag each page L 3. cannot report on non-pages hit 4. Unable to track bandwidth, server response time or completed downloads. 3
  • 5. z  Pros: 1. Non-invasive data collection 2. Can track bandwidth and completed downloads 3. Helps to optimize for search engine 4. Securely capture http user names 5. Can track “spiders” or robots. 4
  • 6. 6. Exact content delivery information 7. Website content time-to-serve time 8. Missing or broken pages information z  Cons: 1. Proxy/caching inaccuracies 2. No event (javascript, flash or AJAX ) tracking 3. Log management :Log generation, Log storage, and log file transfer. 5
  • 7. z  Goal: System based or Product based z  Cost: Freeware or Commercial z  Storage: Log Storage (3rd party) z  Report/Tips: Generate report static or real time with tips.. AWStats is a powerful log analyzer creates advanced web, ftp, mail and streaming server statistics reports. Google Analytics provides in depth product marketing information and tips (Google Adwords/ AdSense). 6
  • 8. z  Freeware z  Graphically presented reports z  Customizable reports z  Reports based on users, OS, browser, location, data transfer, bookmark, total visits and so on. z  Standard and custom log format supported z  Works from CLI as well as a CGI (Flexibility) z  Written in Perl z  Many desired features.. z  But Less visualized/interactive (GA) 7
  • 9. z  Issues: 1. DNS look up & Full Year View (time) 2. Database Format Using "xml" format 3 times larger than default. 3. Feature exclude records from SPAM referrer (5 times slower). 4. To differentiate URLs of dynamic pages (memory). 5. Accuracy hampers speed: Keywords ( 1%), Search Engines (9%) Worms Detection(15%), OS(2%). 6. Each Extra section reduces AWStats speed by 8%. Wrong setup may eat all memory. 8
  • 10. z  Session "unknown" z  AWStats counts everything as pages z  Reports cannot be generate based on current/custom date z  Reports cannot be generate based on custom date range and on weekly basis. z  On few Intel Pentium4 / Xeon4 based host systems, log file time can not be computed correctly L . 9
  • 11. 10
  • 12. z  “Google Analytics shows you how people found your site, how they explored it, and how you can enhance their visitor experience.”—Google z  Free z  Help visitors by providing better keyword search z  Provide information related to website design. z  Tagging :Automatic for content management system or blogging platform but manual for customize website. z  Confidentiality : Third party data processing. 11
  • 13. 12
  • 14. Name AWStats Google Analytics Based on logs Yes Site Search data Page Tagging No Yes Hits count Count everything as IP address and page cookies Confidentiality Not an issue Issue (if not owner) Meant for website traffic Website traffic and analysis. marketing effectiveness. Market Share NA Around 49.95% of top 1,000,000 hosts 13
  • 15. z  Power of analysis is limited by the information in logs. z  Extensive logging that consumes resources. ….more we measure, less accurate we understand ….. Awstats, Webalizer and Google Analytics are always different due to different techniques. Use AWStats as well as Google Analytics to have better prediction 14
  • 16. 15
  • 17. z  Packet sniffer can capture and decode data streams passing over a digital network. z  Non-intrusive technology : no log, no page tag. z  Deploy sniffer into local network of servers to be tracked. z  Completely transparent for tracked website(s) z  Supports multiple servers without effecting server response time. Block Diagram of Packet Sniffing 16
  • 18. z  Packet sniffer can capture and decode data streams passing over a digital network. z  Non-intrusive technology : no log, no page tag. z  Deploy sniffer into local network of servers to be tracked. z  Completely transparent for tracked website(s) z  Supports multiple servers without effecting server response time. Block Diagram of Packet Sniffing 17
  • 19. z  Client communication disconnects information z  Server-side timing information z  Website content delivery information z  Full spectrum of hits including non-pages z  Copes with proxy or browser caching z  Robots and automated agents data available z  Website content time-to-serve time 18
  • 20. 19