scholarly journals An Application of Improved Gap-BIDE Algorithm for Discovering Access Patterns

2012 ◽  
Vol 2012 ◽  
pp. 1-7 ◽  
Author(s):  
Xiuming Yu ◽  
Meijing Li ◽  
Taewook Kim ◽  
Seon-phil Jeong ◽  
Keun Ho Ryu

Discovering access patterns from web log data is a typical sequential pattern mining application, and a lot of access pattern mining algorithms have been proposed. In this paper, we propose an improved approach of Gap-BIDE algorithm to extract user access patterns from web log data. Compared with the previous Gap-BIDE algorithm, a process of getting a large event set is proposed in the provided algorithm; the proposed approach can find out the frequent events by discarding the infrequent events which do not occur continuously in an accessing time before generating candidate patterns. In the experiment, we compare the previous access pattern mining algorithm with the proposed one, which shows that our approach is very efficient in discovering access patterns in large database.


Author(s):  
Muhammad Zia Aftab Khan ◽  
Jihyun Park

The purpose of this paper is to develop WebSecuDMiner algorithm to discover unusual web access patterns based on analysing the potential rules hidden in web server log and user navigation history. Design/methodology/approach: WebSecuDMiner uses equivalence class transformation (ECLAT) algorithm to extract user access patterns from the web log data, which will be used to identify the user access behaviours pattern and detect unusual one. Data extracted from the web serve log and user browsing behaviour is exploited to retrieve the web access pattern that is produced by the same user. Findings: WebSecuDMiner is used to detect whether any unauthorized access have been posed and take appropriate decisions regarding the review of the original rights of suspicious user. Research limitations/implications: The present work uses the database which is extracted from web serve log file and user browsing behaviour. Although the page is viewed by the user, the visit is not recorded in the server log file, since it can be access from the browser's cache.





2015 ◽  
Vol 11 (3) ◽  
pp. 519-546 ◽  
Author(s):  
Zahid A. Ansari ◽  
Syed Abdul Sattar ◽  
A. Vinaya Babu


Author(s):  
Xiuming Yu ◽  
Meijing Li ◽  
Dong Gyu Lee ◽  
Kwang Deuk Kim ◽  
Keun Ho Ryu


Sensors ◽  
2018 ◽  
Vol 19 (1) ◽  
pp. 29 ◽  
Author(s):  
Xin Lyu ◽  
Hongxu Ma

Wireless sensor networks (WSNs) are an important type of network for sensing the environment and collecting information. It can be deployed in almost every type of environment in the real world, providing a reliable and low-cost solution for management. Huge amounts of data are produced from WSNs all the time, and it is significant to process and analyze data effectively to support intelligent decision and management. However, the new characteristics of sensor data, such as rapid growth and frequent updates, bring new challenges to the mining algorithms, especially given the time constraints for intelligent decision-making. In this work, an efficient incremental mining algorithm for discovering sequential pattern (novel incremental algorithm, NIA) is proposed, in order to enhance the efficiency of the whole mining process. First, a reasoned proof is given to demonstrate how to update the frequent sequences incrementally, and the mining space is greatly narrowed based on the proof. Second, an improvement is made on PrefixSpan, which is a classic sequential pattern mining algorithm with a high-complexity recursive process. The improved algorithm, named PrefixSpan+, utilizes a mapping structure to extend the prefixes to sequential patterns, making the mining step more efficient. Third, a fast support number-counting algorithm is presented to choose frequent sequences from the potential frequent sequences. A reticular tree is constructed to store all the potential frequent sequences according to subordinate relations between them, and then the support degree can be efficiently calculated without scanning the original database repeatedly. NIA is compared with various kinds of mining algorithms via intensive experiments on the real monitoring datasets, benchmarking datasets and synthetic datasets from aspects including time cost, sensitivity of factors, and space cost. The results show that NIA performs better than the existed methods.



2015 ◽  
Vol 10 (10) ◽  
pp. 1228-1234
Author(s):  
Zhengyu Zhu ◽  
Meiyu Zheng ◽  
Yihan Wu


2015 ◽  
Vol 10 (10) ◽  
pp. 1228-1234
Author(s):  
Zhengyu Zhu ◽  
Meiyu Zheng ◽  
Yihan Wu


Sign in / Sign up

Export Citation Format

Share Document