Abstract:In order to have a clear vision of usage of electronic periodical databases, a statistics & analysis system based on firewall logs is proposed. Useful field information is identified and extracted from firewall logs and stored in relational database for future analysis and research. In case of China Pharmaceutical University Library, tests are carried out on some databases of Chinese and Foreign electronic periodicals. The results show that the methods based on extraction of firewall logs can be very effective on access statistics of target databases, and it is very helpful for policy makers to have a general idea of ordered databases'usage from macro perspective.
王孝亮, 王威. 通过防火墙日志挖掘构建电子期刊数据库统计分析系统[J]. 现代图书情报技术, 2013, 29(7/8): 122-126.
Wang Xiaoliang, Wang Wei. Constructing Statistical Analysis System of Electronic Periodical Databases Based on the Firewall Log Mining. New Technology of Library and Information Service, 2013, 29(7/8): 122-126.
[1] 王子柱.基于高校图书馆电子数据库利用研究[J]. 情报科学,2009,27(6):905-908. (Wang Zizhu. Electronic Database Use Research Based on University Library[J].Information Science,2009,27(6):905-908.)[2] 魏静,王勇,李素美. 高校图书馆电子资源利用现状分析与建设——以中国矿业大学为例[J]. 农业图书情报学刊,2009,21(11):20-22.(Wei Jing, Wang Yong, Li Sumei. Analysis of the Current Situation of Electronic Resources Utilization of University Libraries——Take CUMT as an Example[J].Journal of Library and Information Sciences in Agriculture, 2009,21(11):20-22.)[3] Atakan C, Atilgan D, Bayram , et al. An Evaluation of the Second Survey on Electronic Databases Usage at Ankara University Digital Library[J]. The Electronic Library,2008,26(2):249-259.[4] 谢宝义,朱玉兰,唐淑娟. 高校图书馆外文文摘型数据库利用分析及评价——以EI Compendex Web为例[J]. 图书馆,2010(4):59-60,84.(Xie Baoyi,Zhu Yulan,Tang Shujuan. Analysis and Evaluation on the Usage of Academic Library Foreign Abstract Databases——The Case of the EI Compendex Web Database[J].Library, 2010(4):59-60,84.)[5] 刘佳音,邓同庆. 高校图书馆数据库利用率统计与绩效的研究[J]. 图书馆杂志,2012,31(3):46-51,39.(Liu Jiayin,Deng Tongqing. Empirical Research on the Usage Statistics and Performance of Databases in University Libraries[J].Library Journal,2012,31(3):46-51,39.)[6] 任立肖. 基于Web日志的三大类型图书馆用户信息行为比较研究[J]. 图书情报知识,2006(6):28-32. (Ren Lixiao. The Comparative Study on User's Information Behavior of Three Kinds of Libraries Based on Web Log[J].Document,Information & Knowledge,2006(6):28-32.)[7] 李承,王伟钊,程立,等.基于防火墙日志的网络安全审计系统研究与实现[J]. 计算机工程,2002,28(6):17-19.(Li Cheng,Wang Weizhao,Cheng Li,et al.Study and Implementation of Network Security Audit System Based on Firewall Log[J].Computer Engineering,2002,28(6):17-19.)[8] 何仲昆.防火墙日志分析系统的研究与实现[D].杭州:浙江大学,2006.(He Zhongkun. Research and Implementation of Firewall Log Analysis System[D].Hangzhou: Zhejiang University,2006.)[9] Scbwartz R L,Pboenix T,d Foy B. Perl语言入门[M].盛春,蒋永清,王晖,译.第5版.南京:东南大学出版社,2009:14.(Scbwartz R L,Pboenix T,d Foy B. Learning Perl[M]. Translated by Sheng Chun,Jiang Yongqing,Wang Hui. The 5th Edition. Nanjing:Southeast University Press,2009:14.)[10] 中国教育和科研计算机网.IP Blocks Inside China[R/OL].[2013-04-27].https://www.nic.edu.cn/RS/ipstat/internalip/. (China Education and Research Network. IP Blocks Inside China[R/OL].[2013-04-27].https://www.nic.edu.cn/RS/ipstat/internalip/.)