Access Patterns in Web Log Data: A Review

نویسندگان

  • Mohammed Hamed Ahmed
  • Ajith Abraham
چکیده

The traffic on World Wide Web is increasing rapidly and huge amount of information is generated due to users interactions with web sites. To utilize this information, identifying usage pattern of users is very important. Web Usage Mining is the application of data mining techniques to discover the useful, hidden information about the users and interesting patterns from data extracted from Web Log files. It supports to know frequently accessed pages, predict user navigation, improve web site structure etc. In order to apply Web Usage Mining, various steps are performed. This paper discusses the process of Web Usage Mining consisting steps: Data Collection, Pre-processing, Pattern Discovery and Pattern Analysis. It has also presented several approaches such as statistical analysis; clustering, association rules and sequential pattern are being used to discover patterns in web usage mining. The pattern analysis phase means applying data mining techniques such as SQL and OLAP on the pattern discovery data to filter insignificant information to obtain the valuable information.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

تشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی

Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...

متن کامل

Mining On-line Newspaper Web Access Logs

With the explosive growth of data available on the Internet, discovery and analysis of useful information from web log data becomes a practical necessity. However, analysis of large web log files is a complex task not fully addressed by existing web access analyzers. Using commercial software, we applied data mining technology to analyze access log records collected on a web newspaper. We have ...

متن کامل

An Efficient System Based On Closed Sequential Patterns for Web Recommendations

Sequential pattern mining, since its introduction has received considerable attention among the researchers with broad applications. The sequential pattern algorithms generally face problems when mining long sequential patterns or while using very low support threshold. One possible solution of such problems is by mining the closed sequential patterns, which is a condensed representation of seq...

متن کامل

Cluster Diagnostics and Verification Tool for Effective and Scalable Web Log Analysis

The aim of this paper is to analyze web transaction log data that reveal user behavior in the internet world. To achieve this, clustering tool is used for performing two phases. First, an information gathering is done on web transaction data. Second, an analysis is done on web access log files to analyze the user transaction behavior and user’s log-in approach. In this paper, the cluster diagno...

متن کامل

A Neoteric Web Recommender System based on Approach of Mining Frequent Sequential Pattern from Customized Web Log Preprocessing

A real world challenging task of the web master of an organization is to match the needs of user and keep their attention in their web site. So, only option is to capture the intuition of the user and provide them with the recommendation list. Web usage mining is a kind of data mining method that provide intelligent personalized online services such as web recommendations, it is usually necessa...

متن کامل

Web Usage Mining Using Support Vector Machine

The web contains rich and dynamic collections of hyperlink information, web page access, and usage information providing rich sources for data mining. From this, we need a system to recommend a visitor good information. This recommendation system can be constructed by web usage mining process. The web usage mining mines web log records to discover user access patterns of web pages. Also it is t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014