Skip to main content

Classification Technique for Improving User Access on Web Log Data

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 243))

Abstract

In the present era, Internet is playing a significant role in our everyday life; therefore, it is very thorny to survive without it. Web log file that keeps track of the users’ access on net, if mined, can provide us precious information about the surfers. Similarly, the rapid growth of data mining applications has shown the necessity for machine learning algorithms to be applied to large-scale data. In this paper, we are using the naïve Bayesian (NB) classification technique using Weka for identifying the frequent access pattern. The main objective of this paper is to categorize browsing behavior of the user based on their position. This paper performs experiment and classifies the user access behavior from the large databases, which could result in increasing the efficiency and effectiveness of the system by reducing the browsing time of the user or results in fast retrieval of information from the system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Agrawal, R., Mehta, M.: SPRINT: a scalable parallel classifier for data mining. The International Conference on Very Large Database, pp. 544–555. Bombay, India (1996)

    Google Scholar 

  2. Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Academic press (2001)

    Google Scholar 

  3. Nasa, C., Suman, S.: Evaluation of different classification techniques for web data. Int. J. Comput. Appl. (0975–8887) 52(9) (2012)

    Google Scholar 

  4. Cooley, R., Mobasher, B., Srivastava, J.: Data preparation for mining World Wide Web browsing patterns. J. Knowl. Inf. Syst. 1(1), 5–32 (1999)

    Article  Google Scholar 

  5. Cunha, C.R., Jaccoud, C.F.B.: . Determining WWW user’s next access and its application to pre-fetching. In: The second IEEE Symposium on Computers and Communications, Alexandria, Egypt (1997)

    Google Scholar 

  6. Iyengar, A., MacNair, E., Nguyen, T.: An analysis of Web server performance. In: The IEEE Global Telecommunications Conference, vol. 3, Phoenix, AZ, pp. 1943–1947 (1997)

    Google Scholar 

  7. Bonchi, F., Giannotti, F., Gozzi, C., Manco, G., Nanni, M., Pedreschi, D.: Web log data warehousing and mining for intelligent web caching. Data Knowl. Eng. 39(2), 165–189 (2001)

    Article  Google Scholar 

  8. Chen, Z., Shen, H.: A study of a new method of browsing path data mining. In: The sixth International Conference of Information Management Research and Practice. TsingHua University, HsingChu (2000)

    Google Scholar 

  9. Chen, M.S., Park, J.S., Yu, P.S.: Efficient data mining for path traversal patterns. IEEE Trans. Knowl. Data Eng. 10(2), 209–221 (1998)

    Article  Google Scholar 

  10. Zhang, D., Dong, Y.: A novel Web usage mining approach for search engines. Comput. Netw. 39(3), 303–310 (2002)

    Article  Google Scholar 

  11. Perkowitz, M., Etzioni, O.: Towards adaptive Web sites: conceptual framework and case study. Artif. Intell. 118(1–2), 245–275 (2000)

    Article  Google Scholar 

  12. Catledge, L.D., Pitkow, J.E.: Characterizing browsing strategies in the World Wide Web. Comput. Netw. ISDN Syst. 27(6), 1065–1073 (1995)

    Article  Google Scholar 

  13. Mark Hall: The WEKA Data Mining Software: An Update, SIGKDD Explorations, vol. 11(1) (2009)

    Google Scholar 

  14. Pani, S.K., Panigrahy, L.: Web usage mining: a survey on pattern extraction from web logs. Int. J. Instrum. Control Autom. (IJICA) 1(1) (2011)

    Google Scholar 

  15. Santra1, A.K., Jayasudha, S.: Classification of web log data to identify interested users using Naïve Bayesian classification. Int. J. Comput. Sci. Issues (IJCSI) 9(1), 2 (2012)

    Google Scholar 

  16. Patil, A.S., Pawar, B.V.: Automated classification of web sites using Naive Bayesian algorithm. In: Proceedings of International Multi-Conference of Engineers and Computer Scientists, vol. 1 (2012)

    Google Scholar 

  17. Zhang, H.: The optimality of Naive Bayes. FLAIRS 2004 Conference. Available online: PDF (http://www.cs.unb.ca/profs/hzhang/publications/FLAIRS04ZhangH.pdf)

  18. Caruana, R., Niculescu-Mizil, A.: An empirical comparison of supervised learning algorithms. In: Proceedings of the 23rd International Conference on Machine Learning (2006). Available online PDF (http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.122.5901&rep=rep1&type=pdf)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bina Kotiyal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Kotiyal, B., Kumar, A., Pant, B., Goudar, R.H. (2014). Classification Technique for Improving User Access on Web Log Data. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_111

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1665-0_111

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1664-3

  • Online ISBN: 978-81-322-1665-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics