<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2306-2495</journal-id>
<journal-title><![CDATA[Serie Científica de la Universidad de las Ciencias Informáticas]]></journal-title>
<abbrev-journal-title><![CDATA[Serie Científica]]></abbrev-journal-title>
<issn>2306-2495</issn>
<publisher>
<publisher-name><![CDATA[Universidad de las Ciencias Informáticas]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2306-24952025000100068</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Análisis de ficheros de registros de accesos de servidores web Nginx y Apache]]></article-title>
<article-title xml:lang="en"><![CDATA[Analysis of files of access logs from Nginx and Apache web servers]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[González Robinson]]></surname>
<given-names><![CDATA[Dariel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Echavarria Castillo]]></surname>
<given-names><![CDATA[Yohandra]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Haro Pérez]]></surname>
<given-names><![CDATA[Madelín]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Peña Casanova]]></surname>
<given-names><![CDATA[Mónica]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de las Ciencias Informáticas  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2025</year>
</pub-date>
<volume>18</volume>
<numero>1</numero>
<fpage>68</fpage>
<lpage>80</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2306-24952025000100068&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S2306-24952025000100068&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S2306-24952025000100068&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN Este artículo se centra en el análisis de registros de acceso para obtener información valiosa sobre el tráfico de un sitio web, el comportamiento del usuario y posibles problemas de seguridad. Se desarrolló un script para limpiar y analizar los datos generados por sistemas web que utilizan Nginx o Apache. El script, escrito en Bash, permite la limpieza, análisis y visualización de trazas, identificando eventos significativos. El script puede analizar los registros de acceso de ambos servidores web, así como de otras tecnologías web que utilicen el mismo formato estándar para el almacenamiento de las trazas. Para la experimentación se utilizó el script sobre un conjunto de trazas generados por el sistema de gestión XABAL EXCRIBA. Los resultados obtenidos a partir del análisis de las trazas determinan que el sitio web EXCRIBA se utiliza principalmente para la consulta de información debido a la gran cantidad de peticiones GET. Además, los resultados muestran que el servicio es confiable y eficiente en la entrega de contenido o servicios debido a la cantidad de respuestas con código exitoso. Sin embargo, la presencia de redirecciones y errores sugiere que hay áreas de mejora en la optimización de rutas o enlaces y en la forma en que las solicitudes son manejadas por el servidor.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT This article focuses on analyzing access logs to obtain valuable information about a website's traffic, user behavior, and potential security issues. A script was developed to clean and analyze data generated by web systems using Nginx or Apache. The script, written in Bash, allows cleaning, analysis and visualization of traces, identifying significant events. The script can analyze access logs from both web servers, as well as other web technologies that use the same standard format for storing traces. For the experimentation, the script was used on a set of traces generated by the XABAL EXCRIBA management system. The results obtained from the analysis of the traces determine that the EXCRIBA website is mainly used for information consultation due to the large number of GET requests. Furthermore, the results show that the service is reliable and efficient in delivering content or services due to the number of responses with successful code. However, the presence of redirects and errors suggests that there are areas for improvement in route or link optimization and in the way requests are handled by the server.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[análisis de datos]]></kwd>
<kwd lng="es"><![CDATA[análisis de trazas]]></kwd>
<kwd lng="es"><![CDATA[script]]></kwd>
<kwd lng="es"><![CDATA[bash]]></kwd>
<kwd lng="es"><![CDATA[Nginx]]></kwd>
<kwd lng="es"><![CDATA[Apache]]></kwd>
<kwd lng="en"><![CDATA[analysis of data]]></kwd>
<kwd lng="en"><![CDATA[trace analysis]]></kwd>
<kwd lng="en"><![CDATA[script]]></kwd>
<kwd lng="en"><![CDATA[bash]]></kwd>
<kwd lng="en"><![CDATA[Nginx]]></kwd>
<kwd lng="en"><![CDATA[Apache]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amiri]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Heidari]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Navimipour]]></surname>
<given-names><![CDATA[N. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Unal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mousavi]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adventures in data analysis: A systematic review of Deep Learning techniques for pattern recognition in cyber-physical-social systems]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2024</year>
<volume>83</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>22909-73</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ghiasi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dehghani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Niknam]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Kavousi-Fard]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Siano]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Alhelou]]></surname>
<given-names><![CDATA[H. H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-attack detection and cyber-security enhancement in smart DC-microgrid based on blockchain technology and Hilbert Huang transform]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2021</year>
<volume>9</volume>
<page-range>29429-40</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lyu]]></surname>
<given-names><![CDATA[M. R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on automated log analysis for reliability engineering]]></article-title>
<source><![CDATA[ACM computing surveys (CSUR)]]></source>
<year>2021</year>
<volume>54</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1-37</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kantardzic]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Data mining: concepts, models, methods, and algorithms]]></source>
<year>2011</year>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Landauer]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Skopik]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Wurzenberger]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rauber]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[System log clustering approaches for cyber security applications: A survey]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2020</year>
<volume>92</volume>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Le]]></surname>
<given-names><![CDATA[V.-H.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[Log-based anomaly detection without log parsing]]></source>
<year>2021</year>
<conf-name><![CDATA[ 36thIEEE/ACM International Conference on Automated Software Engineering (ASE)]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lyu]]></surname>
<given-names><![CDATA[M. R]]></given-names>
</name>
</person-group>
<source><![CDATA[Loghub: A large collection of system log datasets for ai-driven log analytics]]></source>
<year>2023</year>
<conf-name><![CDATA[ 34thInternational Symposium on Software Reliability Engineering (ISSRE)]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
