Cargando…

Web Log Analysis and Security Assessment Method Based on Data Mining

Web content mining describes the classification, clustering, and attribute analysis of a large number of text documents and multimedia files on the web. Special tasks include retrieval of data from the Internet search engine tool W; structured processing and analysis of web data. Today's blog a...

Descripción completa

Detalles Bibliográficos
Autores principales: Jin, Jingquan, Lin, Xin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9436526/
https://www.ncbi.nlm.nih.gov/pubmed/36059393
http://dx.doi.org/10.1155/2022/8485014
_version_ 1784781384975384576
author Jin, Jingquan
Lin, Xin
author_facet Jin, Jingquan
Lin, Xin
author_sort Jin, Jingquan
collection PubMed
description Web content mining describes the classification, clustering, and attribute analysis of a large number of text documents and multimedia files on the web. Special tasks include retrieval of data from the Internet search engine tool W; structured processing and analysis of web data. Today's blog analysis has security concerns. We do experiments to investigate its safety. Through experiments, we draw the following conclusions: (1) Web log extraction can use efficient data mining algorithms to systematically extract logs from web servers, then determine the main access types or interests of users, and then to a certain extent, based on the discovered user patterns, analyze the user's access settings and behavior. (2) No matter in the test set or the mixed test set, the curve value of deep mining is very stable, the curve value has been kept at 0.95, and the curve value of fuzzy statistics method and quantitative statistics method is stable within the interval of 0.90–095. The results also show that the data mining method has the highest identification accuracy and the best security performance. (3) Web usage analysis requires data abstraction for pattern discovery. This data abstraction can be achieved through data preprocessing, which introduces different formats of web server log files and how web server log data is preprocessed for web usage analysis. One of the most critical parts of the web mining field is web log mining. Web log mining can use powerful data mining algorithms to systematically mine the logs in the web server and then learn the user's access or preferred interests and then conduct a certain degree of user preferences and behavior patterns according to the discovered user patterns. Based on the above analysis, the current web log analysis is faced with security problems. We conduct experiments to study to verify the security performance of web logs and draw conclusions through experiments.
format Online
Article
Text
id pubmed-9436526
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-94365262022-09-02 Web Log Analysis and Security Assessment Method Based on Data Mining Jin, Jingquan Lin, Xin Comput Intell Neurosci Research Article Web content mining describes the classification, clustering, and attribute analysis of a large number of text documents and multimedia files on the web. Special tasks include retrieval of data from the Internet search engine tool W; structured processing and analysis of web data. Today's blog analysis has security concerns. We do experiments to investigate its safety. Through experiments, we draw the following conclusions: (1) Web log extraction can use efficient data mining algorithms to systematically extract logs from web servers, then determine the main access types or interests of users, and then to a certain extent, based on the discovered user patterns, analyze the user's access settings and behavior. (2) No matter in the test set or the mixed test set, the curve value of deep mining is very stable, the curve value has been kept at 0.95, and the curve value of fuzzy statistics method and quantitative statistics method is stable within the interval of 0.90–095. The results also show that the data mining method has the highest identification accuracy and the best security performance. (3) Web usage analysis requires data abstraction for pattern discovery. This data abstraction can be achieved through data preprocessing, which introduces different formats of web server log files and how web server log data is preprocessed for web usage analysis. One of the most critical parts of the web mining field is web log mining. Web log mining can use powerful data mining algorithms to systematically mine the logs in the web server and then learn the user's access or preferred interests and then conduct a certain degree of user preferences and behavior patterns according to the discovered user patterns. Based on the above analysis, the current web log analysis is faced with security problems. We conduct experiments to study to verify the security performance of web logs and draw conclusions through experiments. Hindawi 2022-08-25 /pmc/articles/PMC9436526/ /pubmed/36059393 http://dx.doi.org/10.1155/2022/8485014 Text en Copyright © 2022 Jingquan Jin and Xin Lin. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Jin, Jingquan
Lin, Xin
Web Log Analysis and Security Assessment Method Based on Data Mining
title Web Log Analysis and Security Assessment Method Based on Data Mining
title_full Web Log Analysis and Security Assessment Method Based on Data Mining
title_fullStr Web Log Analysis and Security Assessment Method Based on Data Mining
title_full_unstemmed Web Log Analysis and Security Assessment Method Based on Data Mining
title_short Web Log Analysis and Security Assessment Method Based on Data Mining
title_sort web log analysis and security assessment method based on data mining
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9436526/
https://www.ncbi.nlm.nih.gov/pubmed/36059393
http://dx.doi.org/10.1155/2022/8485014
work_keys_str_mv AT jinjingquan webloganalysisandsecurityassessmentmethodbasedondatamining
AT linxin webloganalysisandsecurityassessmentmethodbasedondatamining