scholarly journals Back-Office Web Traffic on The Internet

Author(s):  
Enric Pujol ◽  
Philipp Richter ◽  
Balakrishnan Chandrasekaran ◽  
Georgios Smaragdakis ◽  
Anja Feldmann ◽  
...  
Keyword(s):  
Author(s):  
Federico Montesino Pouzols ◽  
Angel Barriga Barros ◽  
Diego R. Lopez ◽  
Santiago Sánchez-Solano

The Internet and, more specifically, Web-based applications now provide the first-ever global, easy-to-use, ubiquitous and economical communications channel. Most companies have already automated their operations to some extent, which enhances their ability to interact with other companies electronically. With the advent of Web services, the interaction between companies becomes easier and more transparent (Khalaf, Curbera, Nagy, Tai, Mukhi, & Duftler, 2005). Web-based technologies are extensively employed and support core components of virtual and networked organizations. Many of them, including for instance Web-based communities, heavily rely on Web traffic. Additionally, Web technologies play a central role in the technologies for supporting industrial virtual enterprises (VE) being developed by the National Industrial Information Infrastructure Protocols Consortium (NIIIP). Thus, modelling and analysis techniques for Web traffic become important tools for performance analysis of virtual organizations (Malhotra, 2000; Foster, Kesselman, & Tuecke, 2001). This article overviews current models of Web traffic as well as performance analysis of Web-based systems.


2012 ◽  
Vol 2 (3) ◽  
pp. 70-82 ◽  
Author(s):  
Neha Jain ◽  
Vandana Ahuja ◽  
Y. Medury

The internet plays two important roles in marketing-influencing consumer behavior and harnessing consumer intelligence. While its vital for organizations to evaluate consumer intentions and provide consumers the necessary information they are looking for, equally important is the need for collecting consumer data by studying the consumer behavioral patterns on the internet and subsequently nurturing long term relationships with consumers. This study aims at identifying the dimensions of website attributes that represent intentions of consumers for visiting product and brand websites and examines the relationship between various website attributes, with respect to the function performed by the attribute. The methods on how the results were obtained and used will be explored further in this article. This research will be further used for analyzing website attributes with respect to Web Traffic, Website Reputation, Alexa Reach & Readability.


2020 ◽  
Vol 2 (1-4) ◽  
pp. 17-28
Author(s):  
Adeyemi R. Ikuesan ◽  
Mazleena Salleh ◽  
Hein S. Venter ◽  
Shukor Abd Razak ◽  
Steven M. Furnell

AbstractThe prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, to layers such as layer 5 of the OSI model stack. This coupled with the integration-diversity of other layers and application layer protocols has made identification of user-initiated HTTP web traffic complex, thus increasing user anonymity on the Internet. This study reveals that, with the current complex nature of Internet and HTTP traffic, browser complexity, dynamic web programming structure, the surge in network delay, and unstable user behavior in network interaction, user-initiated requests can be accurately determined. The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. The result demonstrates that user-initiated HTTP requests can be reliably identified with a recall rate at 0.94 and F-measure at 0.969. Additionally, this study extends the paradigm of user identification based on the intrinsic characteristics of users, exhibited in network traffic. The application of these research findings finds relevance in user identification for insider investigation, e-commerce, and e-learning system as well as in network planning and management. Further, the findings from the study are relevant in web usage mining, where user-initiated action comprises the fundamental unit of measurement.


2003 ◽  
Vol 26 (8) ◽  
pp. 785-803 ◽  
Author(s):  
D.P. Heyman ◽  
T.V. Lakshman ◽  
Arnold L. Neidhardt
Keyword(s):  

2019 ◽  
Author(s):  
◽  
Gokhale Craig

This research was supported financially by the BankSeta, the Council on Scientific and Industrial Research and the National Research Foundation with the aim to log The Onion Router (TOR) traffic usage in South Africa. The recent public disclosure of mass surveillance of electronic communications, involving senior government authorities, has drawn the public attention to issues regarding Internet security privacy. For almost a decade, there has been several research efforts towards designing and deploying open source, trustworthy and reliable electronic systems that ensure anonymity and privacy of users. These systems operate by concealing the true network identity of the communicating parties against eavesdropping adversaries of which TOR is an example of such a system. Clients that use the TOR network construct circuits (paths) which are utilised to route multiple network streams. A circuit is considered secure if there is one non-malicious router in the circuit. Such systems have served as anti-censorship and anti-surveillance tools. The implementation of TOR allows an individual to access the Dark Web, an area of the Internet that is said to be of a much larger magnitude than the Surface Web. The Dark Web which has earned a reputation as a sort of immense black market, associated with terrorist groups, child pornography, human trafficking, sale of drugs, conspiracies and hacking research, has received significant national and international press coverage. However, to date little or no research has been conducted on the illicit usage of the Dark Web and no research has been conducted in the use or misuse of the Dark Web in South Africa. There has not been any study which characterises the usage of a real deployed anonymity service. Observations obtained are presented by participating in the TOR network and the primary goal of this study is to elicit Dark Web traffic by South Africans. Past researchers undertook Dark Web crawling focusing only on specific web content such as explicitly focusing on child exploitation and terrorist activity. The experiment design of this study further builds on experiments conducted in previous studies. The deanonymisation methodology utilised in this study will allow for the detection of exit routing traffic and the logging of all Dark Web traffics areas omitted from the previous studies. This study does not confine the declassification of onion addresses to specific content types and aims to log all exit routing traffics, undertake a comprehensive declassification of websites visited by clients and obtain the Internet Protocol Addresses (IP) of these clients. The analysis of the sample results reveals that in the South African context, Dark Web traffic is mainly directed to social media websites. There are however causes for concerns as there are illicit activities occurring that include the sale of drugs, visiting of child pornographic websites, and the sale of weapons. Finally, the study presents evidence that exit routing traffic by the TOR node is limited to a large number of different countries some of which have serious Internet censorship laws.


2002 ◽  
pp. 234-248
Author(s):  
Antonis Danalis ◽  
Evangelos Markatos

World Wide Web traffic increases at exponential rates saturating network links and web servers. By replicating popular web pages in strategic places on the Internet, web caching reduces core network traffic, reduces web server load, and improves the end-users’ perceived quality of service. In this paper we survey the area of web caching. We identify major research challenges and their solutions, as well as several commercial products that are being widely used.


Subject Control of the internet in Russia. Significance Aware of the opportunities the internet offers political activists as well as criminals and terrorists, the Russian government is developing technologies and regulations to monitor and control the web. Intrusive measures introduced this year give security agencies access to personal information and web traffic within the country. As a warning to foreign service providers, the social media platform LinkedIn has been subject to a blocking order since November 17. Impacts Foreign companies operating in Russia will be pressured or persuaded to comply with restrictive regulations. Where compliance lays users open to scrutiny, it will entail reputational costs for foreign firms. Security agencies will acquire greater powers and technical ability to monitor and intercept internet traffic.


1997 ◽  
Vol 25 (1) ◽  
pp. 24-38 ◽  
Author(s):  
D. P. Heyman ◽  
T. V. Lakshman ◽  
Arnold L. Neidhardt
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document