SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Presented By: Somnath Mazumdar
              somnath.mazumdar@ucdconnect.ie
https://www.csi.ucd.ie/users/somnath-mazumdar
z Introduction
z Pros & Cons of Methods
z AWStats
z Google Analytics
z AWStats Vs Google Analytics
z Packet Sniffing
z Approach
z Conclusion
                                 1
z  Weblogs: Activity/transaction information of web
    servers
z  Earlier weblogs are used to count the visitors.
z  Web Analysis: off-site and on-site.
z  On site information retrieval: 1. Page Tag
                     2. Historical Web data Analysis.
z  Usages : 1.Performance
               2.Security
               3.Prediction (Regression/CART)
               4.Reporting&Profiling:    4.1. Web statistics
                                         4.2. Business
Analytics(K-means, MC)
                                                           2
z  Pros:    1. Accuracy: End user data.
             2. Speed of Data Reporting
             3. Data Collection Flexibility
             4. No need of own web server

z  Cons:   1. User or Firewalls can restrict tag L
            2. Tag each page L
            3. cannot report on non-pages hit
            4. Unable to track bandwidth, server
response time or completed downloads.


                                                       3
z  Pros:
       1. Non-invasive data collection
       2. Can track bandwidth and completed downloads
       3. Helps to optimize for search engine
       4. Securely capture http user names
       5. Can track “spiders” or robots.




                                                        4
6. Exact content delivery information
            7. Website content time-to-serve time
            8. Missing or broken pages information

z  Cons:   1. Proxy/caching inaccuracies
            2. No event (javascript, flash or AJAX )
tracking
             3. Log management :Log generation, Log
storage, and log file transfer.



                                                       5
z  Goal: System based or Product based
z  Cost: Freeware or Commercial
z  Storage: Log Storage (3rd party)
z  Report/Tips: Generate report static or real time with
  tips..
      AWStats is a powerful log analyzer creates
advanced web, ftp, mail and streaming server statistics
reports.
      Google Analytics provides in depth product
marketing information and tips (Google Adwords/
AdSense).

                                                          6
z  Freeware
z  Graphically presented reports
z  Customizable reports
z  Reports based on users, OS, browser, location, data
    transfer, bookmark, total visits and so on.
z  Standard and custom log format supported
z  Works from CLI as well as a CGI (Flexibility)
z  Written in Perl
z  Many desired features..
z  But Less visualized/interactive (GA)


                                                          7
z  Issues: 1. DNS look up & Full Year View (time)
            2. Database Format Using "xml" format 3 times
            larger than default.
            3. Feature exclude records from SPAM
        referrer (5 times slower).
            4. To differentiate URLs of dynamic pages
(memory).
            5. Accuracy hampers speed: Keywords ( 1%),
Search Engines (9%) Worms Detection(15%), OS(2%).
            6. Each Extra section reduces AWStats
speed by 8%.
             Wrong setup may eat all memory.

                                                      8
z  Session "unknown"
z  AWStats counts everything as pages
z  Reports cannot be generate based on current/custom
    date
z  Reports cannot be generate based on custom date
    range and on weekly basis.
z  On few Intel Pentium4 / Xeon4 based host systems,
    log file time can not be computed correctly L .




                                                         9
10
z  “Google Analytics shows you how people found your
    site, how they explored it, and how you can enhance
    their visitor experience.”—Google
z  Free
z  Help visitors by providing better keyword search
z  Provide information related to website design.
z  Tagging :Automatic for content management system
    or blogging platform but manual for customize
    website.
z  Confidentiality : Third party data processing.



                                                          11
12
Name                  AWStats            Google Analytics
Based on logs            Yes             Site Search data
Page Tagging              No                    Yes
Hits count        Count everything as     IP address and
                         page                 cookies
Confidentiality      Not an issue       Issue (if not owner)
Meant for           website traffic     Website traffic and
                       analysis.            marketing
                                          effectiveness.
Market Share             NA              Around 49.95% of
                                        top 1,000,000 hosts



                                                            13
z  Power of analysis is limited by the information in logs.
z  Extensive logging that consumes resources.
             ….more we measure, less accurate we
understand …..
             Awstats, Webalizer and Google Analytics
are always different due to different techniques.

      Use AWStats as well as Google Analytics to
              have better prediction



                                                           14
15
z  Packet sniffer can capture and decode data streams
      passing over a digital network.
z    Non-intrusive technology : no log, no page tag.
z    Deploy sniffer into local network of servers to be tracked.
z    Completely transparent for tracked website(s)
z    Supports multiple servers without effecting server
      response time.




                      Block Diagram of Packet Sniffing
                                                               16
z  Packet sniffer can capture and decode data streams
      passing over a digital network.
z    Non-intrusive technology : no log, no page tag.
z    Deploy sniffer into local network of servers to be tracked.
z    Completely transparent for tracked website(s)
z    Supports multiple servers without effecting server
      response time.




                      Block Diagram of Packet Sniffing
                                                               17
z  Client communication disconnects information
z  Server-side timing information
z  Website content delivery information
z  Full spectrum of hits including non-pages
z  Copes with proxy or browser caching
z  Robots and automated agents data available
z  Website content time-to-serve time




                                                   18
19

Contenu connexe

Similaire à Weblog analsys

Predictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-timePredictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-timeAerospike, Inc.
 
Instrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with EnvoyInstrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with EnvoyDaniel Hochman
 
Log aggregation and analysis
Log aggregation and analysisLog aggregation and analysis
Log aggregation and analysisDhaval Mehta
 
A University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google AnalyticsA University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google AnalyticsChris Traganos
 
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...Guglielmo Iozzia
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochureRajDodiya4
 
Big data at scrapinghub
Big data at scrapinghubBig data at scrapinghub
Big data at scrapinghubDana Brophy
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudVelocidex Enterprises
 
Using Elasticsearch for Analytics
Using Elasticsearch for AnalyticsUsing Elasticsearch for Analytics
Using Elasticsearch for AnalyticsVaidik Kapoor
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012F _
 
Node.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleNode.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleDmytro Semenov
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecuritiesamiable_indian
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Abhishek Kumar
 
Automation + dev ops summit hail hydrate! from stream to lake
Automation + dev ops summit   hail hydrate! from stream to lakeAutomation + dev ops summit   hail hydrate! from stream to lake
Automation + dev ops summit hail hydrate! from stream to lakeTimothy Spann
 
Cloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and FastCloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and FastDatabricks
 

Similaire à Weblog analsys (20)

Predictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-timePredictable Big Data Performance in Real-time
Predictable Big Data Performance in Real-time
 
Instrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with EnvoyInstrumenting and Scaling Databases with Envoy
Instrumenting and Scaling Databases with Envoy
 
Log aggregation and analysis
Log aggregation and analysisLog aggregation and analysis
Log aggregation and analysis
 
What is web scraping?
What is web scraping?What is web scraping?
What is web scraping?
 
A University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google AnalyticsA University Web Team's Approach to Google Analytics
A University Web Team's Approach to Google Analytics
 
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
 
Big data at scrapinghub
Big data at scrapinghubBig data at scrapinghub
Big data at scrapinghub
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
 
Web Performance Optimization
Web Performance OptimizationWeb Performance Optimization
Web Performance Optimization
 
Using Elasticsearch for Analytics
Using Elasticsearch for AnalyticsUsing Elasticsearch for Analytics
Using Elasticsearch for Analytics
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012
 
Log Files
Log FilesLog Files
Log Files
 
Node.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleNode.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scale
 
Vue d'ensemble Dremio
Vue d'ensemble DremioVue d'ensemble Dremio
Vue d'ensemble Dremio
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
 
Serverless_with_MongoDB
Serverless_with_MongoDBServerless_with_MongoDB
Serverless_with_MongoDB
 
Automation + dev ops summit hail hydrate! from stream to lake
Automation + dev ops summit   hail hydrate! from stream to lakeAutomation + dev ops summit   hail hydrate! from stream to lake
Automation + dev ops summit hail hydrate! from stream to lake
 
Cloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and FastCloud Experience: Data-driven Applications Made Simple and Fast
Cloud Experience: Data-driven Applications Made Simple and Fast
 

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Weblog analsys

  • 1. Presented By: Somnath Mazumdar somnath.mazumdar@ucdconnect.ie https://www.csi.ucd.ie/users/somnath-mazumdar
  • 2. z Introduction z Pros & Cons of Methods z AWStats z Google Analytics z AWStats Vs Google Analytics z Packet Sniffing z Approach z Conclusion 1
  • 3. z  Weblogs: Activity/transaction information of web servers z  Earlier weblogs are used to count the visitors. z  Web Analysis: off-site and on-site. z  On site information retrieval: 1. Page Tag 2. Historical Web data Analysis. z  Usages : 1.Performance 2.Security 3.Prediction (Regression/CART) 4.Reporting&Profiling: 4.1. Web statistics 4.2. Business Analytics(K-means, MC) 2
  • 4. z  Pros: 1. Accuracy: End user data. 2. Speed of Data Reporting 3. Data Collection Flexibility 4. No need of own web server z  Cons: 1. User or Firewalls can restrict tag L 2. Tag each page L 3. cannot report on non-pages hit 4. Unable to track bandwidth, server response time or completed downloads. 3
  • 5. z  Pros: 1. Non-invasive data collection 2. Can track bandwidth and completed downloads 3. Helps to optimize for search engine 4. Securely capture http user names 5. Can track “spiders” or robots. 4
  • 6. 6. Exact content delivery information 7. Website content time-to-serve time 8. Missing or broken pages information z  Cons: 1. Proxy/caching inaccuracies 2. No event (javascript, flash or AJAX ) tracking 3. Log management :Log generation, Log storage, and log file transfer. 5
  • 7. z  Goal: System based or Product based z  Cost: Freeware or Commercial z  Storage: Log Storage (3rd party) z  Report/Tips: Generate report static or real time with tips.. AWStats is a powerful log analyzer creates advanced web, ftp, mail and streaming server statistics reports. Google Analytics provides in depth product marketing information and tips (Google Adwords/ AdSense). 6
  • 8. z  Freeware z  Graphically presented reports z  Customizable reports z  Reports based on users, OS, browser, location, data transfer, bookmark, total visits and so on. z  Standard and custom log format supported z  Works from CLI as well as a CGI (Flexibility) z  Written in Perl z  Many desired features.. z  But Less visualized/interactive (GA) 7
  • 9. z  Issues: 1. DNS look up & Full Year View (time) 2. Database Format Using "xml" format 3 times larger than default. 3. Feature exclude records from SPAM referrer (5 times slower). 4. To differentiate URLs of dynamic pages (memory). 5. Accuracy hampers speed: Keywords ( 1%), Search Engines (9%) Worms Detection(15%), OS(2%). 6. Each Extra section reduces AWStats speed by 8%. Wrong setup may eat all memory. 8
  • 10. z  Session "unknown" z  AWStats counts everything as pages z  Reports cannot be generate based on current/custom date z  Reports cannot be generate based on custom date range and on weekly basis. z  On few Intel Pentium4 / Xeon4 based host systems, log file time can not be computed correctly L . 9
  • 11. 10
  • 12. z  “Google Analytics shows you how people found your site, how they explored it, and how you can enhance their visitor experience.”—Google z  Free z  Help visitors by providing better keyword search z  Provide information related to website design. z  Tagging :Automatic for content management system or blogging platform but manual for customize website. z  Confidentiality : Third party data processing. 11
  • 13. 12
  • 14. Name AWStats Google Analytics Based on logs Yes Site Search data Page Tagging No Yes Hits count Count everything as IP address and page cookies Confidentiality Not an issue Issue (if not owner) Meant for website traffic Website traffic and analysis. marketing effectiveness. Market Share NA Around 49.95% of top 1,000,000 hosts 13
  • 15. z  Power of analysis is limited by the information in logs. z  Extensive logging that consumes resources. ….more we measure, less accurate we understand ….. Awstats, Webalizer and Google Analytics are always different due to different techniques. Use AWStats as well as Google Analytics to have better prediction 14
  • 16. 15
  • 17. z  Packet sniffer can capture and decode data streams passing over a digital network. z  Non-intrusive technology : no log, no page tag. z  Deploy sniffer into local network of servers to be tracked. z  Completely transparent for tracked website(s) z  Supports multiple servers without effecting server response time. Block Diagram of Packet Sniffing 16
  • 18. z  Packet sniffer can capture and decode data streams passing over a digital network. z  Non-intrusive technology : no log, no page tag. z  Deploy sniffer into local network of servers to be tracked. z  Completely transparent for tracked website(s) z  Supports multiple servers without effecting server response time. Block Diagram of Packet Sniffing 17
  • 19. z  Client communication disconnects information z  Server-side timing information z  Website content delivery information z  Full spectrum of hits including non-pages z  Copes with proxy or browser caching z  Robots and automated agents data available z  Website content time-to-serve time 18
  • 20. 19