Web Log Analysis and Security Assessment Method Based on Data Mining.

Comput Intell Neurosci

Department of Information Technology, Anhui Vocational College of City Management, Hefei 230011, China.

Published: September 2022

Web content mining describes the classification, clustering, and attribute analysis of a large number of text documents and multimedia files on the web. Special tasks include retrieval of data from the Internet search engine tool W; structured processing and analysis of web data. Today's blog analysis has security concerns. We do experiments to investigate its safety. Through experiments, we draw the following conclusions: (1) Web log extraction can use efficient data mining algorithms to systematically extract logs from web servers, then determine the main access types or interests of users, and then to a certain extent, based on the discovered user patterns, analyze the user's access settings and behavior. (2) No matter in the test set or the mixed test set, the curve value of deep mining is very stable, the curve value has been kept at 0.95, and the curve value of fuzzy statistics method and quantitative statistics method is stable within the interval of 0.90-095. The results also show that the data mining method has the highest identification accuracy and the best security performance. (3) Web usage analysis requires data abstraction for pattern discovery. This data abstraction can be achieved through data preprocessing, which introduces different formats of web server log files and how web server log data is preprocessed for web usage analysis. One of the most critical parts of the web mining field is web log mining. Web log mining can use powerful data mining algorithms to systematically mine the logs in the web server and then learn the user's access or preferred interests and then conduct a certain degree of user preferences and behavior patterns according to the discovered user patterns. Based on the above analysis, the current web log analysis is faced with security problems. We conduct experiments to study to verify the security performance of web logs and draw conclusions through experiments.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9436526PMC
http://dx.doi.org/10.1155/2022/8485014DOI Listing

Publication Analysis

Top Keywords

web log
20
web
16
data mining
16
web server
12
data
10
mining
9
analysis
8
log analysis
8
analysis security
8
mining web
8

Similar Publications

Background: This study aimed to construct, evaluate, and validate nomograms for breast cancer-specific survival (BCSS) and overall survival (OS) prediction in patients with HER2- overexpressing (HER2+) metastatic breast cancer (MBC).

Methods: The Surveillance, Epidemiology, and End Results (SEER) database was used to select female patients diagnosed with HER2 + MBC between 2010 and 2015. These patients were distributed into training and validation groups (7:3 ratio).

View Article and Find Full Text PDF

Transcriptomic data integration and analysis revealing potential mechanisms of doxorubicin resistance in chondrosarcoma cells.

Biochem Pharmacol

December 2024

Department of Medical Laboratory Science and Biotechnology, Asia University, Taichung 41354, Taiwan; Graduate Institute of Biomedical Science, China Medical University, Taichung 40402, Taiwan; Department of Pharmacology, School of Medicine, China Medical University, Taichung 40402, Taiwan; Chinese Medicine Research Center, China Medical University, Taichung 40402, Taiwan; Department of Medical Research, China Medical University Hsinchu Hospital, Hsinchu 30205, Taiwan. Electronic address:

Chondrosarcoma is a type of bone cancer that originates from cartilage cells. In clinical practice, surgical resection is the primary treatment for chondrosarcoma, but chemotherapy becomes essential for patients with metastasis or tumors in surgically inaccessible sites. However, drug resistance often leads to treatment failure.

View Article and Find Full Text PDF

Background And Aims: Sub-Saharan Africa drives global HIV-related mortality, and patients continuously present with advanced HIV disease (AHD) at diagnosis. We describe prevalence, predictors, and treatment outcomes in HIV clients with AHD.

Methods: We systematically reviewed PUBMED, SCOPUS, Web of Science, JSTOR, and CINAHL for relevant studies conducted in Sub-Saharan Africa from 2010 to 2022.

View Article and Find Full Text PDF

Statement Of The Problem: Antimicrobial photodynamic therapy (aPDT) is a protocol proposed for reduction of bacterial load in deep dentin caries in primary and permanent dentitions. However, considering the difference in the morphology of dentinal tubules in primary and permanent teeth, the effect of this treatment may be different on the two dentition types.

Purpose: This systematic review and meta-analysis aimed to assess the effect of type of dentition as a determinant of microbial load reduction by aPDT in deep dentin caries.

View Article and Find Full Text PDF

Development of a web-based tool to assess daily rating of perceived exertion in agility dogs.

Front Vet Sci

December 2024

Department of Surgical and Radiological Sciences, School of Veterinary Medicine, University of California, Davis, Davis, CA, United States.

Objective: To develop a web-based tool for daily use by agility handlers to log rating of perceived exertion (RPE) for dogs as an aid in quantifying daily exercise and training load and to improve training and conditioning strategies.

Procedures: Focus group meetings with small groups of handlers were conducted via internet-based video conferencing using a semi-structured interview format. Meeting notes were coded for reflexive thematic analysis.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!