SlideShare una empresa de Scribd logo
Presented By: Somnath Mazumdar
              somnath.mazumdar@ucdconnect.ie
https://www.csi.ucd.ie/users/somnath-mazumdar
z Introduction
z Pros & Cons of Methods
z AWStats
z Google Analytics
z AWStats Vs Google Analytics
z Packet Sniffing
z Approach
z Conclusion
                                 1
z  Weblogs: Activity/transaction information of web
    servers
z  Earlier weblogs are used to count the visitors.
z  Web Analysis: off-site and on-site.
z  On site information retrieval: 1. Page Tag
                     2. Historical Web data Analysis.
z  Usages : 1.Performance
               2.Security
               3.Prediction (Regression/CART)
               4.Reporting&Profiling:    4.1. Web statistics
                                         4.2. Business
Analytics(K-means, MC)
                                                           2
z  Pros:    1. Accuracy: End user data.
             2. Speed of Data Reporting
             3. Data Collection Flexibility
             4. No need of own web server

z  Cons:   1. User or Firewalls can restrict tag L
            2. Tag each page L
            3. cannot report on non-pages hit
            4. Unable to track bandwidth, server
response time or completed downloads.


                                                       3
z  Pros:
       1. Non-invasive data collection
       2. Can track bandwidth and completed downloads
       3. Helps to optimize for search engine
       4. Securely capture http user names
       5. Can track “spiders” or robots.




                                                        4
6. Exact content delivery information
            7. Website content time-to-serve time
            8. Missing or broken pages information

z  Cons:   1. Proxy/caching inaccuracies
            2. No event (javascript, flash or AJAX )
tracking
             3. Log management :Log generation, Log
storage, and log file transfer.



                                                       5
z  Goal: System based or Product based
z  Cost: Freeware or Commercial
z  Storage: Log Storage (3rd party)
z  Report/Tips: Generate report static or real time with
  tips..
      AWStats is a powerful log analyzer creates
advanced web, ftp, mail and streaming server statistics
reports.
      Google Analytics provides in depth product
marketing information and tips (Google Adwords/
AdSense).

                                                          6
z  Freeware
z  Graphically presented reports
z  Customizable reports
z  Reports based on users, OS, browser, location, data
    transfer, bookmark, total visits and so on.
z  Standard and custom log format supported
z  Works from CLI as well as a CGI (Flexibility)
z  Written in Perl
z  Many desired features..
z  But Less visualized/interactive (GA)


                                                          7
z  Issues: 1. DNS look up & Full Year View (time)
            2. Database Format Using "xml" format 3 times
            larger than default.
            3. Feature exclude records from SPAM
        referrer (5 times slower).
            4. To differentiate URLs of dynamic pages
(memory).
            5. Accuracy hampers speed: Keywords ( 1%),
Search Engines (9%) Worms Detection(15%), OS(2%).
            6. Each Extra section reduces AWStats
speed by 8%.
             Wrong setup may eat all memory.

                                                      8
z  Session "unknown"
z  AWStats counts everything as pages
z  Reports cannot be generate based on current/custom
    date
z  Reports cannot be generate based on custom date
    range and on weekly basis.
z  On few Intel Pentium4 / Xeon4 based host systems,
    log file time can not be computed correctly L .




                                                         9
10
z  “Google Analytics shows you how people found your
    site, how they explored it, and how you can enhance
    their visitor experience.”—Google
z  Free
z  Help visitors by providing better keyword search
z  Provide information related to website design.
z  Tagging :Automatic for content management system
    or blogging platform but manual for customize
    website.
z  Confidentiality : Third party data processing.



                                                          11
12
Name                  AWStats            Google Analytics
Based on logs            Yes             Site Search data
Page Tagging              No                    Yes
Hits count        Count everything as     IP address and
                         page                 cookies
Confidentiality      Not an issue       Issue (if not owner)
Meant for           website traffic     Website traffic and
                       analysis.            marketing
                                          effectiveness.
Market Share             NA              Around 49.95% of
                                        top 1,000,000 hosts



                                                            13
z  Power of analysis is limited by the information in logs.
z  Extensive logging that consumes resources.
             ….more we measure, less accurate we
understand …..
             Awstats, Webalizer and Google Analytics
are always different due to different techniques.

      Use AWStats as well as Google Analytics to
              have better prediction



                                                           14
15
z  Packet sniffer can capture and decode data streams
      passing over a digital network.
z    Non-intrusive technology : no log, no page tag.
z    Deploy sniffer into local network of servers to be tracked.
z    Completely transparent for tracked website(s)
z    Supports multiple servers without effecting server
      response time.




                      Block Diagram of Packet Sniffing
                                                               16
z  Packet sniffer can capture and decode data streams
      passing over a digital network.
z    Non-intrusive technology : no log, no page tag.
z    Deploy sniffer into local network of servers to be tracked.
z    Completely transparent for tracked website(s)
z    Supports multiple servers without effecting server
      response time.




                      Block Diagram of Packet Sniffing
                                                               17
z  Client communication disconnects information
z  Server-side timing information
z  Website content delivery information
z  Full spectrum of hits including non-pages
z  Copes with proxy or browser caching
z  Robots and automated agents data available
z  Website content time-to-serve time




                                                   18
19

Más contenido relacionado

Similar a Weblog analsys

Predictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-timePredictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-time
Aerospike, Inc.
 
Instrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with EnvoyInstrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with Envoy
Daniel Hochman
 
Log aggregation and analysis
Log aggregation and analysisLog aggregation and analysis
Log aggregation and analysis
Dhaval Mehta
 
What is web scraping?
What is web scraping?What is web scraping?
What is web scraping?
Brijesh Prajapati
 
A University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google AnalyticsA University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google Analytics
Chris Traganos
 
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Guglielmo Iozzia
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
RajDodiya4
 
Big data at scrapinghub
Big data at scrapinghubBig data at scrapinghub
Big data at scrapinghub
Dana Brophy
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
Velocidex Enterprises
 
Web Performance Optimization
Web Performance OptimizationWeb Performance Optimization
Web Performance Optimization
Livares Technologies Pvt Ltd
 
Using Elasticsearch for Analytics
Using Elasticsearch for AnalyticsUsing Elasticsearch for Analytics
Using Elasticsearch for Analytics
Vaidik Kapoor
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012F _
 
Log Files
Log FilesLog Files
Node.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleNode.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scale
Dmytro Semenov
 
Vue d'ensemble Dremio
Vue d'ensemble DremioVue d'ensemble Dremio
Vue d'ensemble Dremio
Modern Data Stack France
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecuritiesamiable_indian
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
Abhishek Kumar
 
Serverless_with_MongoDB
Serverless_with_MongoDBServerless_with_MongoDB
Serverless_with_MongoDB
Amazon Web Services
 
Automation + dev ops summit hail hydrate! from stream to lake
Automation + dev ops summit   hail hydrate! from stream to lakeAutomation + dev ops summit   hail hydrate! from stream to lake
Automation + dev ops summit hail hydrate! from stream to lake
Timothy Spann
 
Cloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and FastCloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and Fast
Databricks
 

Similar a Weblog analsys (20)

Predictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-timePredictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-time
 
Instrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with EnvoyInstrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with Envoy
 
Log aggregation and analysis
Log aggregation and analysisLog aggregation and analysis
Log aggregation and analysis
 
What is web scraping?
What is web scraping?What is web scraping?
What is web scraping?
 
A University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google AnalyticsA University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google Analytics
 
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
 
Big data at scrapinghub
Big data at scrapinghubBig data at scrapinghub
Big data at scrapinghub
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
 
Web Performance Optimization
Web Performance OptimizationWeb Performance Optimization
Web Performance Optimization
 
Using Elasticsearch for Analytics
Using Elasticsearch for AnalyticsUsing Elasticsearch for Analytics
Using Elasticsearch for Analytics
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012
 
Log Files
Log FilesLog Files
Log Files
 
Node.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleNode.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scale
 
Vue d'ensemble Dremio
Vue d'ensemble DremioVue d'ensemble Dremio
Vue d'ensemble Dremio
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
 
Serverless_with_MongoDB
Serverless_with_MongoDBServerless_with_MongoDB
Serverless_with_MongoDB
 
Automation + dev ops summit hail hydrate! from stream to lake
Automation + dev ops summit   hail hydrate! from stream to lakeAutomation + dev ops summit   hail hydrate! from stream to lake
Automation + dev ops summit hail hydrate! from stream to lake
 
Cloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and FastCloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and Fast
 

Último

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Último (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Weblog analsys

  • 1. Presented By: Somnath Mazumdar somnath.mazumdar@ucdconnect.ie https://www.csi.ucd.ie/users/somnath-mazumdar
  • 2. z Introduction z Pros & Cons of Methods z AWStats z Google Analytics z AWStats Vs Google Analytics z Packet Sniffing z Approach z Conclusion 1
  • 3. z  Weblogs: Activity/transaction information of web servers z  Earlier weblogs are used to count the visitors. z  Web Analysis: off-site and on-site. z  On site information retrieval: 1. Page Tag 2. Historical Web data Analysis. z  Usages : 1.Performance 2.Security 3.Prediction (Regression/CART) 4.Reporting&Profiling: 4.1. Web statistics 4.2. Business Analytics(K-means, MC) 2
  • 4. z  Pros: 1. Accuracy: End user data. 2. Speed of Data Reporting 3. Data Collection Flexibility 4. No need of own web server z  Cons: 1. User or Firewalls can restrict tag L 2. Tag each page L 3. cannot report on non-pages hit 4. Unable to track bandwidth, server response time or completed downloads. 3
  • 5. z  Pros: 1. Non-invasive data collection 2. Can track bandwidth and completed downloads 3. Helps to optimize for search engine 4. Securely capture http user names 5. Can track “spiders” or robots. 4
  • 6. 6. Exact content delivery information 7. Website content time-to-serve time 8. Missing or broken pages information z  Cons: 1. Proxy/caching inaccuracies 2. No event (javascript, flash or AJAX ) tracking 3. Log management :Log generation, Log storage, and log file transfer. 5
  • 7. z  Goal: System based or Product based z  Cost: Freeware or Commercial z  Storage: Log Storage (3rd party) z  Report/Tips: Generate report static or real time with tips.. AWStats is a powerful log analyzer creates advanced web, ftp, mail and streaming server statistics reports. Google Analytics provides in depth product marketing information and tips (Google Adwords/ AdSense). 6
  • 8. z  Freeware z  Graphically presented reports z  Customizable reports z  Reports based on users, OS, browser, location, data transfer, bookmark, total visits and so on. z  Standard and custom log format supported z  Works from CLI as well as a CGI (Flexibility) z  Written in Perl z  Many desired features.. z  But Less visualized/interactive (GA) 7
  • 9. z  Issues: 1. DNS look up & Full Year View (time) 2. Database Format Using "xml" format 3 times larger than default. 3. Feature exclude records from SPAM referrer (5 times slower). 4. To differentiate URLs of dynamic pages (memory). 5. Accuracy hampers speed: Keywords ( 1%), Search Engines (9%) Worms Detection(15%), OS(2%). 6. Each Extra section reduces AWStats speed by 8%. Wrong setup may eat all memory. 8
  • 10. z  Session "unknown" z  AWStats counts everything as pages z  Reports cannot be generate based on current/custom date z  Reports cannot be generate based on custom date range and on weekly basis. z  On few Intel Pentium4 / Xeon4 based host systems, log file time can not be computed correctly L . 9
  • 11. 10
  • 12. z  “Google Analytics shows you how people found your site, how they explored it, and how you can enhance their visitor experience.”—Google z  Free z  Help visitors by providing better keyword search z  Provide information related to website design. z  Tagging :Automatic for content management system or blogging platform but manual for customize website. z  Confidentiality : Third party data processing. 11
  • 13. 12
  • 14. Name AWStats Google Analytics Based on logs Yes Site Search data Page Tagging No Yes Hits count Count everything as IP address and page cookies Confidentiality Not an issue Issue (if not owner) Meant for website traffic Website traffic and analysis. marketing effectiveness. Market Share NA Around 49.95% of top 1,000,000 hosts 13
  • 15. z  Power of analysis is limited by the information in logs. z  Extensive logging that consumes resources. ….more we measure, less accurate we understand ….. Awstats, Webalizer and Google Analytics are always different due to different techniques. Use AWStats as well as Google Analytics to have better prediction 14
  • 16. 15
  • 17. z  Packet sniffer can capture and decode data streams passing over a digital network. z  Non-intrusive technology : no log, no page tag. z  Deploy sniffer into local network of servers to be tracked. z  Completely transparent for tracked website(s) z  Supports multiple servers without effecting server response time. Block Diagram of Packet Sniffing 16
  • 18. z  Packet sniffer can capture and decode data streams passing over a digital network. z  Non-intrusive technology : no log, no page tag. z  Deploy sniffer into local network of servers to be tracked. z  Completely transparent for tracked website(s) z  Supports multiple servers without effecting server response time. Block Diagram of Packet Sniffing 17
  • 19. z  Client communication disconnects information z  Server-side timing information z  Website content delivery information z  Full spectrum of hits including non-pages z  Copes with proxy or browser caching z  Robots and automated agents data available z  Website content time-to-serve time 18
  • 20. 19