Modeling the relationships between the users DB and the web-log file of a large virtual community

2003 ◽  
Vol 36 (16) ◽  
pp. 211-216
Author(s):  
Sergio M. Savaresi ◽  
Simone Garatti ◽  
Sergio Bittanti
Keyword(s):  
Web Log ◽  
Log File ◽  
Author(s):  
Muhammad Zia Aftab Khan ◽  
Jihyun Park

The purpose of this paper is to develop WebSecuDMiner algorithm to discover unusual web access patterns based on analysing the potential rules hidden in web server log and user navigation history. Design/methodology/approach: WebSecuDMiner uses equivalence class transformation (ECLAT) algorithm to extract user access patterns from the web log data, which will be used to identify the user access behaviours pattern and detect unusual one. Data extracted from the web serve log and user browsing behaviour is exploited to retrieve the web access pattern that is produced by the same user. Findings: WebSecuDMiner is used to detect whether any unauthorized access have been posed and take appropriate decisions regarding the review of the original rights of suspicious user. Research limitations/implications: The present work uses the database which is extracted from web serve log file and user browsing behaviour. Although the page is viewed by the user, the visit is not recorded in the server log file, since it can be access from the browser's cache.


Author(s):  
Amina Kemmar ◽  
Yahia Lebbah ◽  
Samir Loudni

Mining web access patterns consists in extracting knowledge from server log files. This problem is represented as a sequential pattern mining problem (SPM) which allows to extract patterns which are sequences of accesses that occur frequently in the web log file. There are in the literature many efficient algorithms to solve SMP (e.g., GSP, SPADE, PrefixSpan, WAP-tree, LAPIN, PLWAP). Despite the effectiveness of these methods, they do not allow to express and to handle new constraints defined on patterns, new implementations are required. Recently, many approaches based on constraint programming (CP) was proposed to solve SPM in a declarative and generic way. Since no CP-based approach was applied for mining web access patterns, the authors introduce in this paper an efficient CP-based approach for solving the web log mining problem. They bring back the problem of web log mining to SPM within a CP environment which enables to handle various constraints. Experimental results on non-trivial web log mining problems show the effectiveness of the authors' CP-based mining approach.


2020 ◽  
Vol 9 (1) ◽  
pp. 1045-1050

Nowadays, WWW has grown into significant and vast data storage. Every one of clients' exercises will be put away in log record. The log file shows the eagerness on the website. With an abundant use of web, the log file size is developing hurriedly. Web mining is a utilization of information digging innovations for immense information storehouses. It is the procedure of uncover data from web information. Before applying web mining procedures, the information in the web log must be pre-processed, consolidated and changed. It is essential for the web excavators to use smart apparatuses so as to discover, concentrate, channel and assess the ideal data. The information preprocessing stage is the most significant stage during the time spent web mining and is basic and complex in fruitful extraction of helpful information. The web logs are circulated in nature also they are non-versatile and unfeasible. Subsequently we require a broad learning calculation so as to get the ideal data.


Author(s):  
Tasawar Hussain ◽  
Sohail Asghar

The web based applications are maturing and gaining the confidence of their users gradually, however, www still lacks the mechanism to stop the hackers. The implementing the adhesive security measures such as intrusion deduction systems and firewalls, are no more useful breaker for online frauds. The Web Backtracking Technique (WBT) is proposed for fraud detection in online financial applications by applying the hierarchical sessionization technique on the web log file. The web log Hierarchical Sessionization enhances the focused groups of users from web log and paves the path for in-depth visualization for knowledge discovery. User clicks are compared with user profiles for change in previous user click records. Those transactions which do not conform to business rules are stopped from business activities. The WBT analyzes suspicious behavior and will produce reports for security and risk mitigation purposes Furthermore, suspicious transactions are mined for the up-gradation of business rules from hierarchical sessionization. The proposed WBT is validated against the university web log data.


Author(s):  
Tasawar Hussain ◽  
Sohail Asghar

The web based applications are maturing and gaining the confidence of their users gradually, however, www still lacks the mechanism to stop the hackers. The implementing the adhesive security measures such as intrusion deduction systems and firewalls, are no more useful breaker for online frauds. The Web Backtracking Technique (WBT) is proposed for fraud detection in online financial applications by applying the hierarchical sessionization technique on the web log file. The web log Hierarchical Sessionization enhances the focused groups of users from web log and paves the path for in-depth visualization for knowledge discovery. User clicks are compared with user profiles for change in previous user click records. Those transactions which do not conform to business rules are stopped from business activities. The WBT analyzes suspicious behavior and will produce reports for security and risk mitigation purposes Furthermore, suspicious transactions are mined for the up-gradation of business rules from hierarchical sessionization. The proposed WBT is validated against the university web log data.


2020 ◽  
Vol 9 (4) ◽  
pp. 486-494
Author(s):  
Galuh Nurvinda Kurniawati ◽  
Rukun Santoso ◽  
Sugito Sugito

The comprehension of web visitors patterns are needed to develop website in an optimal fashion. The visitor pattern contained in the web log file of Diponegoro University’s website is clustered by Modified Gustafson-Kessel method. In general, this method produces two until six clusters. Two kinds of results are outlined in this paper. The first is the result contains two clusters, and the second is containing three clusters. In the first result, the visitors are divided into information seekers of student capacity and Engineering Faculty. In the second result, the visitors are divided into information seekers of Medicine Faculty, student admission and Engineering Faculty.  


2012 ◽  
Vol 3 (2) ◽  
pp. 298-300 ◽  
Author(s):  
Soniya P. Chaudhari ◽  
Prof. Hitesh Gupta ◽  
S. J. Patil

In this paper we review various research of journal paper as Web Searching efficiency improvement. Some important method based on sequential pattern Mining. Some are based on supervised learning or unsupervised learning. And also used for other method such as Fuzzy logic and neural network


2012 ◽  
Vol 241-244 ◽  
pp. 2779-2782
Author(s):  
Heng Yao Tang ◽  
Xiao Yan Zhan

On the problems existing in the realization of current accessibility website, we design a web designing architecture, using the web log mining technique to extract user interests and access priority sequence and adopting the dynamic web page information to fill the web page commonly used structure, realize the intelligent , personalized accessibility.


Sign in / Sign up

Export Citation Format

Share Document