0% found this document useful (0 votes)
63 views12 pages

Web Traffic Analyzer

The document discusses the importance of web traffic analysis for monitoring website visitors and optimizing advertisements, highlighting the benefits of using Live-eTutor for online tutoring. It outlines existing and proposed systems for traffic analysis, emphasizing the need for location diversity in low-latency anonymity networks to defend against traffic analysis. Additionally, it details various modules for analyzing web traffic, including log analysis, content management, and the analysis of exported web flow statistics.

Uploaded by

vinoth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views12 pages

Web Traffic Analyzer

The document discusses the importance of web traffic analysis for monitoring website visitors and optimizing advertisements, highlighting the benefits of using Live-eTutor for online tutoring. It outlines existing and proposed systems for traffic analysis, emphasizing the need for location diversity in low-latency anonymity networks to defend against traffic analysis. Additionally, it details various modules for analyzing web traffic, including log analysis, content management, and the analysis of exported web flow statistics.

Uploaded by

vinoth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

INTRODUCTION

It can be used to monitor website traffic. Used to find out how many people are visiting a
website. It also can help the time, type of visitors- new or return.
A web traffic analyzer is a necessity as company websites are gaining popularity. It also
optimizes web pages. It is used to find out the kind of advertisements that are converting and
those that are not. It can help one budget, invest on advertisements that are converting.
Live-eTutor is an online tutoring program ran by qualified live tutor’s online perfect for your
children to enhance their education online. Online tutoring is an easy way to teach kids and to let
them have fun while learning. Live-eTutor has advanced online tutoring techniques using an
advanaced online classroom to tutor children online. By using an online tutoring white board,
both kids and tutors can write down their thoughts and communicate effectively over the
internet. Your child's most valuable tool is his/her education and online tutoring is a great tool
enhancer. By using Live-eTutor's online tutoring services you can create a fun online tutoring
environment for your child. No more driving to a tutor or waiting for your tutor to come to you;
by using online tutoring, you simply get online and tutors are waiting and ready to help you.
Live-eTutor's certified online tutors help kids with their homework, studying, research and other
aspects of; learning, schooling and education. Live-eTutor also has special live tutors online that
work with learning impaired and learning disabled children. Use Live-eTutor for online
homework help, online studying help or to help tutor your kids with online quizzes, exams and
educational preparation.
OBJECTIVE

Automation domain auction s can help reduce implementation time and risk with the use
of standardized, bidding for buyers and sellers.

These techniques generally fall into the following categories: data modification
techniques, cryptographic methods statistical techniques for disclosure and inference control,
query auditing methods, randomization and perturbation-based techniques. This edited volume
also contains surveys by distinguished researchers in the privacy field. Each survey includes the
key research content as well as future research directions of a particular topic in privacy.

We propose a new solution by integrating the advantages of both these techniques with
the view of minimizing information loss and privacy loss. By making use of cryptographic
techniques to store sensitive data and providing access to the stored data based on an individual’s
role, we ensure that the data is safe from privacy breaches.

Existing System:

Much of the work in network traffic analysis so far has focussed on studying traffic on a single
link in isolation.A wide range of important problems faced by network researchers today require
modeling and analysis of traffic on all links simultaneously. Existing low-latency anonymity net-
works are vulnerable to traffic analysis, so location diversity of nodes is essential to defend
against attacks.

Disadvantage:

 Previous work has shown that simply ensuring geographical diversity of nodes does not

resist, and in some cases exacerbates, the risk of traffic analysis by ISPs.

 Only the Miner and the participants get the mining results while the Calculator performs

only auxiliary computations, without knowing their meaning.


Proposed system
To validate to what extent this was true, we developed traffic analysis techniques which work on

the sampled data which is being collected in practice by Internet exchanges. Using a Bayesian

approach, we obtained the best possible inference, which means that we can not only attack vul-

nerable systems, but also declare others as safe under our threat model. Our probability formula

is difficult to obtain by trial-and-error, and – as we show – can give orders of magnitude

better results than simple intuitive schemes.

Advantage:

 low-latency anonymity networks are vulnerable to traffic analysis, so location diversity of


nodes is essential to defend against attacks.

 Ensuring high autonomous-system (AS) diversity can resist this weakness.

MODULE

1) Latest search hits


In the ‘Latest search terms’ user area the latest search engine hits are displayed in real-
time, along with landing page and search engine information. Be careful, as you can get
addicted to checking this section. Includes ranking information!

2) Log Analysis
Web log analysis software (also called a web log analyzer) is a simple kind of
Web analytics software that parses a log file from a web server, and based on the values
contained in the log file, derives indicators about who, when, and how a web server is visited.
Usually reports are generated from the log files immediately, but the log files can
alternatively be parsed to a database and reports generated on demand.
Log Analysis
 Number of visits and number of unique visitors
 Visits duration and last visits
 Authenticated users, and last authenticated visits
 Days of week and rush hours
 Domains/countries of host's visitors
 Hosts list
 Number total pageviews
 Most viewed, entry and exit pages

3)Traffic analysis:

There are a number of tools that can be used for traffic analysis. They are divided into those that

require specialised hardware and those that are based on software solutions that are not depen -

dent on the hardware. We would also like to measure the effectiveness of our attack against real

systems, using an empirically determined prior distribution on durations and rates, for both the

analysis (numerical integration required) and the evaluation.

4) Content management
This is the process of classifying the content of a Web site in semantic categories in
order to make information retrieval and presentation easier for the users. Content
management is very important for Web sites whose content is increasing on a daily basis,
such as news sites or portals.
5)Analysis of Exported Web Flow Statistics

Collected Web Flow statistics are exported to a server running an application tasked with pro-

cessing the data in accordance with a set criteria. The results of the analysis are usually presented

in the form of charts and tables. The charts and results thus obtained provide an easy insight into

existing problems. The analysis of the WebFlow statistics provides possibilities for the automatic

detection of problems and attacks on the network.

The results of this analysis provide us with the following information:

 information on the total amount of traffic between individual subnets (bytes, packets, connections);

 information on the total amount of local traffic (protocols, servers and hosts);

 information about external access to our network (protocol, service, host);

 the detection of traffic blocked by an access list;

 the detection of traffic rejected due to black hole routing;

Architecture Diagram
Use Case

Class diagram:
Activity Diagram
Awesom bar
Latest Search Hits

Tags
Traffic

Sequence Diagram
COLLABRATION DIAGRAM

You might also like