期刊文献+

基于相邻请求的动态时间阈值会话识别算法

Session identification algorithm based on dynamic time threshold of adjacent requests
下载PDF
导出
摘要 在大数据平台的异常检测分析中,为提高会话序列建模的效率,提出一种基于相邻请求的动态调整时间间隔阈值的会话识别算法——DAITS算法。首先同时结合站点页面因子和用户访问页面时间的平均因子;然后在两者间加入合适的权重因子对时间阈值进行动态调整;最后根据判断是否超过该时间阈值来划分会话。实验结果表明,DAITS算法比传统使用固定阈值的方法在会话识别的精确率和查全率上提高了14.8%和13.2%,比动态调整阈值的方法在精确率和查全率上提高了6.2%和3.2%。 Focusing on the issue of improving the efficiency of session sequence modeling in the anomaly detection analysis of big data platform, a session identification algorithm based on Dynamic Adjustive Interval Time threShold of adjacent requests (DAITS) was proposed. Firstly, the factor of website pages and the average factor of users access time to the page were combined. Then, the appropriate weighting factor was used to dynamically adjust the time threshold. Finally, the session was divided according to whether the time threshold was exceeded. The experimental results show that compared with the traditional methods of using fixed thresholds, the precision of session identification was increased by 14.8% and the recall was increased by 13. 2%; compared with the existing methods with dynamic adjustive thresholds, the precision of session identification was increased by 6.2% and the recall was increased bv 3.2%.
作者 曾令 肖如良
出处 《计算机应用》 CSCD 北大核心 2017年第11期3335-3338,共4页 journal of Computer Applications
基金 福建省科技计划重大项目(2016H6007) 福州市市校合作项目(2016-G-40)~~
关键词 异常检测 会话识别 会话序列 相邻请求 动态时间阈值 anomaly detection session identification session sequence adjacent request dynamic time threshold
  • 相关文献

参考文献3

二级参考文献19

  • 1Fu Yongjian, Sandhu K, Shih M A. Generalization-based Approach to Clustering of Web Usage Session[C]//Proc. of 1999 KDD Workshop Web Mining. [S. l.]: Springer-Verlag, 2000.
  • 2Cooley R, Mobasher B, Srivastava J. Data Preparation for Mining World Wide Web Browsing Patterns[J]. Knowledge and Information System, 1999, 1(1): 32-40.
  • 3Spiliopoulou M, Mobasher B, Berendt B, et al. Framework for the Evaluation of Session Reconstruction Heuristics in Web Usage Analysis[J]. Informs Journal of Computing, 2003, 15(2): 171-179.
  • 4Chen M S. Park J S. Yu P S. Data Mining for Path Traversal Patterns in a Web Environment[C]//Proc. of the 16th international Conf. on Distributed Computing System. [S. l.]: IEEE CS Press, 1996: 385-392.
  • 5Mikroyannidis A,Theodoulidis B.A theoretical framework and an implementation architecture for self adaptive web sites[C]. Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence.Beijing:IEEE Press,2004.
  • 6Facca F M,Lanzi P L.Mining interesting knowledge from weblogs: a survey[J].Data and Knowledge Engineering,2005,53(3): 225-241.
  • 7Catledge L, Pitkow J.Characterizing browsing strategies in the world wide web [J]. Computer Networks and ISDN Systems, 1995,27(6):1065-1073.
  • 8Spiliopoulou M, Mobasher B,Berendt B,et al.A framework for the evaluation of session reconstruction heuristics in web usage analysis [J]. Informs Journal of Computing, 2003,15 (2): 171-179.
  • 9熊忠阳,周亚峰.Web访问挖掘的预处理技术的研究[J].计算机技术与发展,2007,17(8):11-14. 被引量:19
  • 10Yang Qiang, Zhang Haining, Li Tianyi. Mining Web logs for prediction models in WWW caching and prefecting[C]//The Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining KDD'01. San Francisco: ACM SIGKDD, 2001.

共引文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部