Loading

Performance of Web Traffic Activities using Web Mining and Machine Learning Techniques
Abha Narwal1, R. K. Chauhan2

1Abha Narwal*, Research Scholar, Department of Computer Science and Application, Kurukshetra University, India.
2R. K. Chauhan, Professor, Department of Computer Science and Application, Kurukshetra University, India.
Manuscript received on February 10, 2020. | Revised Manuscript received on February 27, 2020. | Manuscript published on March 10, 2020. | PP: 2337-2341 | Volume-9 Issue-5, March 2020. | Retrieval Number: E2591039520/2020©BEIESP | DOI: 10.35940/ijitee.E2591.039520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In recent days Web mining gathers all tools, approaches, and algorithms that had to retrieve information and knowledge through data-based data. The portion of this methodology is aimed at analyzing users ‘ behaviors, to continue improving the framework and content of websites visited consistently. A relevant question then arises: how much more the attempt to enhance the services provided via a website breaches the privacy of visitors? The use of important retrieval resources including web mining can threaten the privacy of users. This paper would concentrate on developing approaches to speed up the weblog mining process and also to show data visualization as a consequence of the log mining process and evaluate algorithms for data mining. The right metrics to equate algorithms will be used for the analysis of the classification methods, accuracy RMSE and MAE. The fundamental goal of the case study is to evaluate the usefulness of the expert-driven system and data-driven method for the classification of authenticated network traffic, in particular, SSH traffic from traffic log files. 
Keywords: Web Usage Mining, J48 Algorithm, SSH, Weblog, Classification
Scope of the Article: Network Traffic Characterization and Measurements