Blog
About

105
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Applying Packets Meta data for Web Usage Mining

      , ,

      Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009) (ISIICT)

      Innovation and Information and Communication Technology (ISIICT 2009)

      15 - 17 December 2009

      Data mining, Web usage, Sensitive data mining, Meta data, and Internet packet

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          With data mining the techniques of the search engines and visitor tracking called web mining. The important task for web mining is web usage mining, which mines Web log records to discover user access patterns of Web pages. Analyzing and exploring regularities in Web log records identify potential customers for electronic commerce, enhance the quality and delivery of Internet information services to the end user, and improve Web server system performance. This research introduces a new approach for Mining Web Usage which aims to improve the mining results. For web usage mining we aim to mine the proposed added metadata of the packets in addition to the values of the header’s fields of the packets which are used in web usage. This is done by adding metadata as a new factor in web logging process. These data about data (metadata) will be added as a new attributes in web databases. Even so that will increase the number of attributes; we will treat this problem by using a suitable method for finding frequent itemsets with limited time.

          Related collections

          Most cited references 1

          • Record: found
          • Abstract: not found
          • Article: not found

          Applying Data Mining Techniques in Intrusion Detection System on Web and Analysis of Web Usage

            Bookmark

            Author and article information

            Contributors
            Conference
            December 2009
            December 2009
            : 28-34
            Affiliations
            Amman Arab University for Graduate Studies, Zip Code:

            11953, P.O.B. 2234, Amman, Jordan, 2009.
            Delmon, Bahrain, 2009
            University of technology, Iraq, 2009
            Article
            10.14236/ewic/ISIICT2009.3
            © Alaa H. AL-Hamami et al. Published by BCS Learning and Development Ltd. Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009), Philadelphia University, Amman, Jordan

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009)
            ISIICT
            3
            Philadelphia University, Amman, Jordan
            15 - 17 December 2009
            Electronic Workshops in Computing (eWiC)
            Innovation and Information and Communication Technology (ISIICT 2009)
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Comments

            Comment on this article