the application of web usage mining in e-commerce security

نویسندگان

prof. dr. m. e. mohammadpourzarandi central branch of azad university, tehran, iran

r. tamimi north tehran branch of azad university, iran

چکیده

nowadays, world wide web has become a popular medium to search information, business, trading and so on. various organizations and companies are also employing the web in order to introduce their products or services around the world. therefore e-commerce or electronic commerce is formed. e-commerce is any type of business or commercial transaction that involves the transfer of information across the internet. in this situation a huge amount of information is generated and stored in the web services. this information overhead leads to difficulty in finding relevant and useful knowledge, therefore web mining is used as a tool to discover and extract the knowledge from the web. beside, the security issues are the most precious problems in every electronic commercial process. this massive increase in the uptake of ecommerce has led to a new generation of associated security threats. in this paper we use web mining techniques for security purposes, in detecting, preventing and predicting cyber attacks on virtual space.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application of Web usage mining and product taxonomy to collaborative recommendations in e-commerce

The rapid growth of e-commerce has caused product overload where customers on the Web are no longer able to effectively choose the products they are exposed to. To overcome the product overload of online shoppers, a variety of recommendation methods have been developed. Collaborative filtering (CF) is the most successful recommendation method, but its widespread use has exposed some well-known ...

متن کامل

Web Security for E-Commerce

This tutorial presents an overview of the major categories of Web site attacks, their effects, and possible countermeasures. The focus is the Web security necessary for a reasonable guarantee of secure e-commerce. The tutorial is intended for those who have little or no knowledge of Web security and its importance to e-commerce. It provides a basic understanding of the issues, the techniques, a...

متن کامل

Application of Data Mining in e-Commerce

The web in recent years has been a big trend, which helped make it a source of information and essential in the various fields of research, in particular, the commercial area that represents the e-commerce (electronic commerce). However, the competition in the e-commerce sites is very tight. This has pushed companies to conserve and retain customers rather than seeking to expand its market shar...

متن کامل

Web Mining Techniques in E-Commerce Applications

Today web is the best medium of communication in modern business. Many companies are redefining their business strategies to improve the business output. Business over internet provides the opportunity to customers and partners where their products and specific business can be found. Nowadays online business breaks the barrier of time and space as compared to the physical office. Big companies ...

متن کامل

Web usage mining to improve the design of an e-commerce website: OrOliveSur.com

Web usage mining is the process of extracting useful information from users history databases associated to an e-commerce website. The extraction is usually performed by data mining techniques applied on server log data or data obtained from specific tools such as Google Analytics. This paper presents the methodology used in an e-commerce website of extra virgin olive oil sale called www.OrOliv...

متن کامل

DSP application in e-commerce security

This is a case study on using DSP board to construct an encryption/decryption module embedded in a E-Commerce web server. The idea of using DSP is to push beyond the key length limits of encryption/decryption algorithms and computational power in software environment while avoiding the heavy investment in dedicated hardware encryptor/encryptor. The low cost, high computational power, high flexi...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
international journal of information science and management

جلد ۲۰۱۳، شماره ۰۴، صفحات ۱۷-۲۳

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023