Tracking and Analyzing Web Penetration Attacks through Splunk-Driven Log Analysis
DOI:
https://doi.org/10.6919/ICJE.202408_10(8).0001Keywords:
Web Penetration; Log Analysis; Splunk; Cyber Attacks; Tracking and Tracing.Abstract
With the popularity of Web applications, Web penetration attacks have become one of the most common types of cyber attacks. This study proposes a method for tracking and analyzing Web penetration attacks based on Splunk log analysis, aiming to identify and track potential network attack behaviors through in-depth analysis of network logs. First, we collected network log data from various sources and used Splunk as the main tool for data preprocessing and analysis. By deeply mining the log data, we were able to identify abnormal patterns and potential attack signs.
Downloads
References
Mo Huaihai, Li Xiaodong. Web Penetration Testing Information Collection. Technical Research. World of Communications, 2019, 26(03): 33-34.
Zhang Bingshuai. In-Depth Analysis of Web Security. Beijing: Electronic Industry Press, 2015: 106-128.
Shi Liuyang, Fang Yong. Research on Webshell Detection Scheme Based on Web Logs. Information Security Research, 2015, (1): 66-73.
Mo Huaihai, Li Xiaodong. Research on Web Penetration Testing Information Collection Technology. World of Communications, 2019, 26(03): 33-34.
Wu Hanqing. White Hat Talks Web Security (Second Edition). Electronic Industry Press, August 2023.
Splunk Official Documentation: https://docs.splunk.com/Documentation.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.



