Tracking and Analyzing Web Penetration Attacks through Splunk-Driven Log Analysis

Authors

  • Guangqun Zhou
  • Xiangbi Gong
  • Dongming Zhong

DOI:

https://doi.org/10.6919/ICJE.202408_10(8).0001

Keywords:

Web Penetration; Log Analysis; Splunk; Cyber Attacks; Tracking and Tracing.

Abstract

With the popularity of Web applications, Web penetration attacks have become one of the most common types of cyber attacks. This study proposes a method for tracking and analyzing Web penetration attacks based on Splunk log analysis, aiming to identify and track potential network attack behaviors through in-depth analysis of network logs. First, we collected network log data from various sources and used Splunk as the main tool for data preprocessing and analysis. By deeply mining the log data, we were able to identify abnormal patterns and potential attack signs.

Downloads

Download data is not yet available.

References

Mo Huaihai, Li Xiaodong. Web Penetration Testing Information Collection. Technical Research. World of Communications, 2019, 26(03): 33-34.

Zhang Bingshuai. In-Depth Analysis of Web Security. Beijing: Electronic Industry Press, 2015: 106-128.

Shi Liuyang, Fang Yong. Research on Webshell Detection Scheme Based on Web Logs. Information Security Research, 2015, (1): 66-73.

Mo Huaihai, Li Xiaodong. Research on Web Penetration Testing Information Collection Technology. World of Communications, 2019, 26(03): 33-34.

Wu Hanqing. White Hat Talks Web Security (Second Edition). Electronic Industry Press, August 2023.

Splunk Official Documentation: https://docs.splunk.com/Documentation.

Downloads

Published

2024-07-22

Issue

Section

Articles

How to Cite

Zhou, Guangqun, Xiangbi Gong, and Dongming Zhong. 2024. “Tracking and Analyzing Web Penetration Attacks through Splunk-Driven Log Analysis”. International Core Journal of Engineering 10 (8): 1-9. https://doi.org/10.6919/ICJE.202408_10(8).0001.