Application of Web Usage Mining on Proxy Server Access Log File to Investigate Internet Users' Access Behaviors in ASTU

Loading...
Thumbnail Image

Journal Title

Journal ISSN

Volume Title

Publisher

ASTU

Abstract

Nowadays Each and every activities have been becoming unimaginable to do without internet. When an internet user request a particular page on web, an entry is logged into a special file called server log file. Some organization use a proxy server for caching services and administrative control. Proxy server is a server that sits between client computer and internet, and provide indirect network services to client. Since proxy server is in between client and web server, every request from clients will pass through the proxy server to corresponding web server. Analyzing proxy log file has numerous advantages for access behavior investigation process. The main objective of the study is investigating internet users’ access behavior by analyzing proxy log file of ASTU Proxy Server. By keeping this in mind, the study was done by following the three web usage mining process phases such as data preprocessing, pattern discovery, and pattern analysis. In Pattern discovery phase, data mining methods such as association rule mining and statistical analysis has been used with the intension of discovering patterns. Apriori algorithm of WEKA data mining tool has been used for association rule mining. The study tried to investigate users’ access behavior based on two time situations such as class time and exam time. By considering this two time situations, the study answered the research questions. This study will be an input for creating a platform that changes the university internet usage trend in the way to be essential for effective teaching–learning process. In addition, the study will show how analyzing web usage mining on proxy server access log data is essential and motivate other researchers.

Description

Keywords

Citation

Collections

Endorsement

Review

Supplemented By

Referenced By