Behavioral Pattern Mining for User Identity and Access Control A Cluster based Ensemble Model
-
https://doi.org/10.14419/ijet.v7i3.24.22789 -
Web usage mining, complex user behavior pattern mining, preprocessing, web log files, fuzzy k means clustering, objective function, Logit Boost Clustering, frequent behavioral patterns of web users. -
Abstract
Web usage mining extracts user's behavior patterns from the internet. Behavior of web users services are monitored and controlled to authenticate the user identity and access. Several data mining techniques are presented to analyze the web user behavioral patterns. But complex activity pattern discovery is not performed to maintain the decision making. To improve the complex user behavior pattern mining, Ensemble of Fuzzy K-Means with Logit Boost Clustering (EFK-LBC) technique is developed. EFK-LBC technique extracts the web user behavioral patterns from web logs. First, preprocessing is exploited to clean the unwanted data and select consistent web patterns from the original web log files. Next, fuzzy k means clustering technique is employed as a base learner to group the frequent web user behavioral patterns based on the objective function. To improve clustering performance, Logit Boost clustering technique is designed to make strong cluster by combining the several base learners. Experimental evaluation of proposed EFK-LBC technique and existing methods are carried out with the web server log files. The results reported that the proposed EFK-LBC technique obtains high clustering accuracy of user identity with minimum time and space complexity. Based on the observations, EFK-LBC technique is more efficient than the existing methods.
Â
Â
 -
References
[1] Sergio Hernández , Pedro Ãlvarez , Javier Fabra ,JoaquÃn Ezpeleta, “Analysis of Users’ Behavior in Structured e-Commerce Websitesâ€, IEEE Access, Volume 5, 2017, Pages 11941 - 11958
[2] Tania Cerquitelli, Antonio Servetti, Enrico Masala, “Discovering users with similar internet access performance through cluster analysisâ€, Expert Systems With Applications, Elsevier, Volume 64, 2016, Pages 536–548
[3] Xiaokang Zhou, Jian Chen, Bo Wu, and Qun Jin, “Discovery of Action Patterns and User Correlations in Task-Oriented Processes for Goal-Driven Learning Recommendationâ€, IEEE Transactions on Learning Technologies, Volume 7, Issue 3, 2014, Pages 231-245
[4] Zakaria Suliman Zubi , Mussab Saleh El Raiani, “Using Web Logs Dataset via Web Mining for User Behavior Understandingâ€, International Journal Of Computers and Communications, Volume 8, 2014, Pages 103- 111
[5] Pinar Senkul and Suleyman Salin, “Improving pattern quality in web usage mining by using semantic informationâ€, Knowledge and Information Systems, Springer, Volume 30, Issue 3, 2012, Pages 527–541
[6] G. Poornalatha, S. Raghavendra Prakash,†Web sessions clustering using hybrid sequence alignment measure (HSAM)â€, Social Network Analysis and Mining, Springer, Volume 3, 2013, Pages 257–268
[7] Rahul Mishra, Abha choubey, “Comparative Analysis of Apriori Algorithm and Frequent Pattern Algorithm for Frequent Pattern Mining in Web Log Dataâ€, International Journal of Computer Science and Information Technologies, Volume 3, Issue 4, 2012, Pages 4662 – 4665
[8] Meera Narvekar and , Shaikh Sakina Banu, “Predicting User’s Web Navigation Behavior Using Hybrid Approachâ€, Procedia Computer Science, Elsevier, Volume 45 , 2015 , Pages 3 – 12
[9] Yinghui (Catherine)Yang, “Web user behavioral profiling for user identificationâ€, Decision Support Systems, Volume 49, Issue 3, June 2010, Pages 261-271
[10] Abdelghani Guerbas, Omar Addam, Omar Zaarour, Mohamad Nagi, Ahmad Elhajj, Mick Ridley, Reda Alhajj, “Effective web log mining and online navigational pattern predictionâ€, Knowledge-Based Systems, Elsevier, Volume 49, 2013, Pages 50–62
[11] Mamoun A. Awad and Issa Khalil, “Prediction of User's Web-Browsing Behavior: Application of Markov Modelâ€, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), Volume 42, Issue 4, 2012, Pages 1131 – 1142
[12] G. Shivaprasad, N. V. Subba Reddy, U. Dinesh Acharya and Prakash K. Aithal, “Neuro-Fuzzy Based Hybrid Model for Web Usage Miningâ€, Procedia Computer Science, Volume 54, 2015, Pages s 327 – 334
[13] Pierpaolo D’Urso and, RiccardoMassari, “Fuzzy clustering of human activity patternsâ€, Fuzzy Sets and Systems, Elsevier, Volume 215, 2013, Pages 29–54
[14] Tawfiq A. Al-asadi and Ahmed J. Obaid, “Discovering similar user navigation behavior in Web log dataâ€, International Journal of Applied Engineering Research, Volume 11, Issue 16, 2016, Pages 8797-8805
[15] Amit Dipchandji Kasliwal and Girish S. Katkar, “Web Usage mining for Predicting User Access Behaviourâ€, International Journal of Computer Science and Information Technologies, Volume 6 , Issue 1, 2015, Pages 201-204
[16] Guosheng Kang , Jianxun Liu, Mingdong Tang , Buqing Cao , Yu Xu, “An Effective Web Service Ranking Method via Exploring User Behaviorâ€, IEEE Transactions on Network and Service Management , Volume 12, Issue 4, , 2015 , Pages 554 - 564
[17] Marios Belk, Efi Papatheocharous, Panagiotis Germanakos, George Samaras,†Modeling users on the World Wide Web based on cognitive factors, navigation behavior and clustering techniquesâ€, The Journal of Systems and Software, Elsevier, Apr 2013
[18] Vedpriya Dongre, and Jagdish Raikwal, “An Improved User Browsing Behavior Prediction Using Web Log Analysisâ€, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 4 Issue 5, May 2015, Pages 1838- 1842
[19] Xiuming Yu,Meijing Li, Taewook Kim, Seon-phil Jeong and Keun Ho Ryu, “An Application of Improved Gap-BIDE Algorithm for Discovering Access Patternsâ€, Hindawi Publishing Corporation, Applied Computational Intelligence and Soft Computing, Volume 2012, May 2012, Pages 1-7
[20] Meijing Li, Xiuming Yu, Keun Ho Ryu, “MapReduce-based web mining for prediction of web-user navigationâ€, Journal of Information Science, Volume 40, Issue 5, Pages 557-567, 2014
-
Downloads
-
How to Cite
R, G., & Kumar R, G. (2018). Behavioral Pattern Mining for User Identity and Access Control A Cluster based Ensemble Model. International Journal of Engineering & Technology, 7(3.24), 438-444. https://doi.org/10.14419/ijet.v7i3.24.22789Received date: 2018-12-02
Accepted date: 2018-12-02