期刊文献+

Web日志挖掘中数据预处理方法研究 被引量:3

Research of Data Preprocessing Method for Web Log Mining
下载PDF
导出
摘要 数据预处理在Web日志挖掘过程中起着至关重要的作用,直接影响日志挖掘的质量和结果。分析了数据预处理的主要过程,并用站点首页结合动态时间阈值的方法对会话识别进行了改进。实验结果表明,改进后的会话识别方法能更有效地识别出用户的真实会话。 Data preprocessing plays a vital role in Web log mining process, it directly affects the quality and results of Web log mining. Main process of data preprocessing is analyzed, and the method of session identification through to use Website home page with dynamic time threshold is improved. The experimental results show that the method can identify more user real session.
出处 《科学技术与工程》 北大核心 2012年第8期1928-1930,1935,共4页 Science Technology and Engineering
关键词 数据预处理 会话识别 WEB日志挖掘 data preprocessing session identification Web log mining
  • 相关文献

参考文献7

二级参考文献44

共引文献49

同被引文献33

  • 1周娜,廖文和,杨浩,赵家伟.基于分类和关联规则的个性化产品推荐系统[J].高技术通讯,2004,14(11):51-55. 被引量:7
  • 2HanJiawei,MichelineKambe.数据挖掘概念与技术[M].北京:机械工业出版社,2012:13.
  • 3Shu Wenhui, Daniel T T H. A novel intrusion detection system model for securing Web-based database systems [ C ]//Proc of 25th annual international computer software and applications conference. [s. 1. ] :IEEE,2001:249-254.
  • 4Kirchner M. A framework for detecting anomalies in HTrP traffic using instance-based learning and k-nearest neighbor classification[ C ]//Proc of 2nd international workshop on se- cufity and 8. networks. Karlstad: IEEE, 2010 : 1 -.
  • 5Lee I,Jeong S,Yeo S,et al. A novel method for SQL injection attack detection based on removing SQL query attribute values [ J ]. Mathematical and Computer Modelling, 2012,55 ( 1 ) : 58 -68.
  • 6Das D, Sharma U, Bhattacharyya D K. A Web intrusion detec- tion mechanism based on feature based data clustering [ C ]/! Proc of IEEE international advance computing conference. [ s. 1. ] :IEEE,2009:l124-1129.
  • 7Zhan J, Oommen B J, Crisostomo J. Anomaly detection in dy- namic systems using weak estimators [ J ]. ACM Transactions on Intemet Technology ,2011,11 ( 1 ) : 16-33.
  • 8Spiliopoulou M, Mobasher B, Berendt B, et al. A framework for the evaluation of session reconstruction heuristics in Web-us- age analysis [ J ]. INFORMS Journal on Computing, 2003,15 (2) :171-172.
  • 9Stevanovic D, Vlajic N, An A. Detection of malicious and non- malicious Website visitors using unsupervised neural network learning[ J]. Applied Soft Computing,2013,13 ( 1 ) :698-708.
  • 10Agrawal R,Srikant R.Fast algorithms for mining association rules in large databases. Research Report RJ 9839 . 1994

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部