International Journal of Computer Applications
World Wide Web is widely accessed by people for accessing services, social networking and so on. All these activities of users are traced in different types of log files. Hence, log files prove to be extremely useful in understanding user behavior, improving server performance, improving cache replacement policy, intrusion detection, etc. In this paper, the authors focus on the intrusion detection application of log files. By analyzing drawbacks and advantages of existing intrusion detection techniques, the paper proposes an intrusion detection system that attempts to minimize drawbacks of existing intrusion detection techniques, viz.