Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Application of Data Mining on Web Usage Data for Security: WebSecuDMiner

Version 1 : Received: 2 September 2019 / Approved: 4 September 2019 / Online: 4 September 2019 (03:48:58 CEST)

How to cite: Khan, M.Z.A.; Park, J. Application of Data Mining on Web Usage Data for Security: WebSecuDMiner. Preprints 2019, 2019090040. https://doi.org/10.20944/preprints201909.0040.v1 Khan, M.Z.A.; Park, J. Application of Data Mining on Web Usage Data for Security: WebSecuDMiner. Preprints 2019, 2019090040. https://doi.org/10.20944/preprints201909.0040.v1

Abstract

The purpose of this paper is to develop WebSecuDMiner algorithm to discover unusual web access patterns based on analysing the potential rules hidden in web server log and user navigation history. Design/methodology/approach: WebSecuDMiner uses equivalence class transformation (ECLAT) algorithm to extract user access patterns from the web log data, which will be used to identify the user access behaviours pattern and detect unusual one. Data extracted from the web serve log and user browsing behaviour is exploited to retrieve the web access pattern that is produced by the same user. Findings: WebSecuDMiner is used to detect whether any unauthorized access have been posed and take appropriate decisions regarding the review of the original rights of suspicious user. Research limitations/implications: The present work uses the database which is extracted from web serve log file and user browsing behaviour. Although the page is viewed by the user, the visit is not recorded in the server log file, since it can be access from the browser's cache.

Keywords

data mining; security; association rule; ECLAT

Subject

Business, Economics and Management, Business and Management

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.