Investigating Internet user Behaviour on Proxy Server Log File Using Web Usage Mining

Authors

  • N. Satheesh Kumar
  • Hymavathi Sabbani

Keywords:

Proxy server, web mining, investigation process, internet user, Apriori algorithm, web server,

Abstract

Nowadays, each and all activities have been becoming unimaginable to do without internet. When a web user requests a specific page, an entry is made in a special file known as the server log file. Some organizations use a proxy server for caching services and administrative control. In order to provide the client computer with oblique network services, a proxy server sits in between the client internet and the client's computer. Since proxy server is in between client and web server, every request from clients will pass through the proxy server to corresponding web server. Analysing proxy log file has numerous advantages for access behaviour investigation process. The study's main goal is to investigate internet users' access behaviour by analysing proxy log files. Keeping this in mind, the study was carried out by adhering to the three steps of the online usage mining procedure, including data preparation, pattern finding, and pattern analysis. In pattern discovery phase, data mining methods such as association rule mining and statistical analysis have been used with the intention of discovering patterns. The WEKA data mining tool's Apriori algorithm was employed for association rule mining. The study tried to investigate users’ access behaviour based on two time situations such as class time and exam time. By considering this two time situations, the study answered the research questions. This study will be an input for creating a platform that changes the university internet usage trend in the way to be essential for effective teaching-learning process. In addition, the study will show how analysing web usage mining on proxy server access log data is essential and motivate other researchers.

References

Kumar and P. Bhargavik (2013), “Analysis of Web Server Log by Web Usage Mining for Extracting Users Patterns,” International Journal of Computer Science Engineering and Information Technology Research, Vol. III, No. 2, https://www.researchgate.net

Chapter 10. Mining Object, Spatial, Multimedia, Text, and Web Data [Online]. Available from https://booksite.elsevier.com/9780123814791/chapters_from_the_second_edition/chapter_10.pdf

Jiawei Han, Macheline Kamber, Jian Pei. DATA MINING: CONCEPTS AND TECHNIQUES 3RD EDITION [Online]. Available from https://toaz.info/doc-view

Kartik B et al. (2010). “Internet Activity Analysis through Proxy Log.”, https://www.researchgate.net.

B.Shiferaw (2016) “Web usage mining on Proxy Servers to investigate the general access pattern of internet users: The case study of Adama Science and Technology University, Unpublished” MSc. Thesis Submitted to Adama Science and Technology University

MitaliSrivastava and et al. (2014). “Preprocessing Techniques in Web Usage Mining: A Survey”, International Journal of Computer Applications, Volume 97–No.18, https://research.ijcaonline.org

Monika Dhandi and Rajesh Kumar Chakrawarti (2016), “A Comprehensive Study of Web Usage Mining.”, 2016 Symposium on Colossal Data Analysis and Networking, ieee.xplore.ieee.org.

Nisha Yadav (2014). “Web usage mining: A Research Area in Web Mining.”, International Journal for Scientific Research & Development, Vol. 2, Issue 02, www.ijsrd.com

Deepa and P. Raajan (2015). “An Efficient Preprocessing Methodology of Log File for Web Usage Mining.”, International Journal of Computer Applications, National Conference on Research Issues in Image Analysis and Mining Intelligence, https://research.ijcaonline.org

J. SoonuAravindan and Dr. K. Vivekanandan (2017). “An Overview of Pre-processing Techniques in Web usage Mining.”, International Journal of Computer Trends and Technology, Volume 48 Number 1, https://www.researchgate.net.

Published

11/14/2022

How to Cite

Kumar, N. S. ., & Sabbani, H. . (2022). Investigating Internet user Behaviour on Proxy Server Log File Using Web Usage Mining. JOURNAL OF WEB ENGINEERING &Amp; TECHNOLOGY, 9(2), 32–45. Retrieved from https://stmcomputers.stmjournals.com/index.php/JoWET/article/view/364