SlideShare une entreprise Scribd logo
1  sur  20
APPLYING WEB MINING
APPLICATION FOR USER
BEHAVIOR UNDERSTANDING

Dr. Zakaria Suliman Zubi
Associate Professor
Computer Science Department
Faculty Of Science
Sirte University, Libya
LOGO
LOGO

Contents
LOGO

Abstract

Web usage mining (WUM) focuses on the discovering of potential knowledge from
browsing patterns of the users. Which leads us to find the correlation between pages in the
analysis stage.
The primary data source used in web usage mining is the server log-files (web-logs).
 Browsing web pages by the user leaves a lot of information in the log-file. Analyzing logfiles information drives us to understand the behavior of the user.
Web log is an essential part for the web mining to extract usage patterns and study the
visiting characteristics of user.
Our paper focus on the use of web mining techniques to classify web pages type according
to user visits.
 This classification helps us to understand the user behavior.
We also uses some classification and association rule techniques for discovering the
potential knowledge from the browsing patterns.
LOGO

Contents
LOGO

INTRODUCTION

The Internet offers a huge, widely global information center for
News, advertising, consume information, financial management,
education, government, and e-commerce .
The aim of using web mining techniques for understanding user
behavior is to profile user characteristics.
Web mining can be organized into three main categories: web
content mining, web structure mining, and web usage mining.
LOGO

INTRODUCTION
Cont..
Web Mining

Web Structure Mining

Web Content Mining

Web Usage Mining

1-Web content mining analyzes web content such as text,
multimedia data, and structured data (within web pages or linked
across web pages).
2 -Web structure mining is the process of using graph and
network mining theory and methods to analyze the nodes and
connection structures on the Web.
3- Web Usage Mining is a special type of web mining tool, which
can discover the knowledge in the hidden browsing patterns and
analyses the visiting characteristics of the users.
LOGO

INTRODUCTION Cont..
The Primary Data of Web Usage Mining
1-Web server logs .
2-Data about visitors of the sites.
3-Registration forms.

Fig 2:portion of a typical server log
A standard log-file had the following format
remotehost; logname; username; date; request; status; bytes[ where:
remotehost: is the remote hostname or its IP address;
logname:is the remote log name of the user;
username: is the username with which the user has authenticated himself,
date: is the date and time of the request,
request: is the exact request line as it came from the client,
status: is the HTTP status code returned to the client, and
bytes: is the content-length of the document transferred.
LOGO

Contents
LOGO

THE PHASES OF WEB USAGE MINING

Web usage mining is a complete process that
includes various stages of data mining cycle, including
Data Preprocessing, Pattern Discovery & Pattern
Analysis.
 Initially, at the data preprocessing stage web log is
preprocessed to clean, integrate and transform into a
common log.
In the pattern discovery: Data mining techniques
are applied to discover the interesting characteristics
in the hidden patterns.
Pattern Analysis is the final stage of web usage
mining which can validate interested patterns from the
output of pattern discovery that can be used to predict
user behavior.
LOGO THE PHASES OF WEB USAGE MINING
Data Preprocessing Process
Data Cleaning:
The log-file is first examined to remove
irrelevant entries such as those that represent
multimedia data and scripts or uninteresting
entries such as those that belongs to
top/bottom frames.
Pageview Identification:
Identification of
page views is heavily
dependent on the intra-page structure of the
site, as well as on the page contents and the
underlying site do-main knowledge. each
pageview can be viewed as a collection of
Web objects or resources representing a
specific “user event,”.

Data
Cleaning

Pageview
Identification

User
Identification

Session
Identification
LOGO THE PHASES OF WEB USAGE MINING
Data Preprocessing Process
User Identification:
Since several users may share a single
machine name, certain heuristics are
used to identify users . We use the
phrase user activity record to refer to the
sequence of logged activities belonging
to the same user.
Session Identification:
 Aims to split the page access of each
user into separated sessions. It defines
the number of times the user has
accessed a web page and time out
defines a time limit for the access of
particular web page for more than 30
minutes if more the session will be
divided in more than one session.

Sample of user and sessions identification
LOGO THE PHASES OF WEB USAGE MINING
Pattern Discovery Process:
Discovering user access pattern from the user access log files is the main
purpose of using web usage mining .

Association Rule Mining:
Association rule mining discovery and statistical correlation analysis can
find groups of web pages types that are commonly accessed together
(Association rule mining can be used to discover correlation between pages
types found in a web log) this technique is applied to user and session
identification consisting of item where every item represents a page type ,we
will also use Apriori algorithm to find the correlation between pages based on
the confidence and support vectors.
What are the set of pages type frequently accessed together by the web users.
e.g
(Sport, News, Social)
What the page type will be fetched next.
e.g
Entertainment
LOGO THE PHASES OF WEB USAGE MINING
Classification
Classification techniques play an important role in Web analytics
applications for modeling the users according to various predefined
metrics.
In the Web domain, we are interested in developing a profile of users
belonging to a particular class or category . This requires extraction and
selection of features that best describe the properties of a given class or
category.
We will focus also on k-nearest neighbor (K-NN) which was
considered as a predictive technique for classification models. Whereas;
 k represents a number of similar cases or the number of items in the
group.
LOGO THE PHASES OF WEB USAGE MINING
Pattern Analysis Process:
In this stage of process the discovered patterns will further
processed ,filtered ,possibly resulting in aggregate user models
that can be used as a visualizations tools ,the next figure
summarizes the whole process:
LOGO

Contents
RESULTS OF USING ASSOCIATION RULES
LOGO

Log-file in a flat file format.

Import log-file database to our implemented
application.
RESULTS OF USING ASSOCIATION RULES
LOGO

Extract the transactional database of
web sever log for every user where
every transaction represents a session.

Find the association rules of user
behavior after applying the Aprori
algorithm to the transactional database of
the user.
LOGO

Contents
LOGO

CONCLUSION

 We used web data that contained all the information about the user. When
the user leaves accessing the web pages. This data is called web logs or (serverlogs)
A statistical methods such as classification, association rule mining discovery
and statistical correlation analysis which can find groups of web pages types
that are commonly accessed together are applied as well.
Classification is used to map the data item into one of several predefined
classes. The class will belongs into one category such as sport or politics or
education or..etc. We also uses the k-nearest neighbor (K-NN) algorithm as a
common classification method to select the best class.
Association rule mining was used to discover correlation between sites types
found in a web log.
The implemented application program was designed in C# programming
language.
Any Questions????

LOGO

Contenu connexe

Tendances

Machine Learning and Real-World Applications
Machine Learning and Real-World ApplicationsMachine Learning and Real-World Applications
Machine Learning and Real-World ApplicationsMachinePulse
 
Deep Learning With Python Tutorial | Edureka
Deep Learning With Python Tutorial | EdurekaDeep Learning With Python Tutorial | Edureka
Deep Learning With Python Tutorial | EdurekaEdureka!
 
07 Machine Learning - Expectation Maximization
07 Machine Learning - Expectation Maximization07 Machine Learning - Expectation Maximization
07 Machine Learning - Expectation MaximizationAndres Mendez-Vazquez
 
Association Rule Mining in Data Mining
Association Rule Mining in Data Mining Association Rule Mining in Data Mining
Association Rule Mining in Data Mining Ayesha Ali
 
Detection of heart diseases by data mining
Detection of heart diseases by data miningDetection of heart diseases by data mining
Detection of heart diseases by data miningAbheepsa Pattnaik
 
Machine learning Lecture 2
Machine learning Lecture 2Machine learning Lecture 2
Machine learning Lecture 2Srinivasan R
 
Association rule mining
Association rule miningAssociation rule mining
Association rule miningAcad
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionvineeta vineeta
 
What is Machine Learning | Introduction to Machine Learning | Machine Learnin...
What is Machine Learning | Introduction to Machine Learning | Machine Learnin...What is Machine Learning | Introduction to Machine Learning | Machine Learnin...
What is Machine Learning | Introduction to Machine Learning | Machine Learnin...Simplilearn
 
lazy learners and other classication methods
lazy learners and other classication methodslazy learners and other classication methods
lazy learners and other classication methodsrajshreemuthiah
 
Machine Learning Tutorial Part - 1 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 1 | Machine Learning Tutorial For Beginners ...Machine Learning Tutorial Part - 1 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 1 | Machine Learning Tutorial For Beginners ...Simplilearn
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networksantoniomorancardenas
 
Perceptron (neural network)
Perceptron (neural network)Perceptron (neural network)
Perceptron (neural network)EdutechLearners
 
Classification Based Machine Learning Algorithms
Classification Based Machine Learning AlgorithmsClassification Based Machine Learning Algorithms
Classification Based Machine Learning AlgorithmsMd. Main Uddin Rony
 
Data preprocessing using Machine Learning
Data  preprocessing using Machine Learning Data  preprocessing using Machine Learning
Data preprocessing using Machine Learning Gopal Sakarkar
 

Tendances (20)

Machine Learning and Real-World Applications
Machine Learning and Real-World ApplicationsMachine Learning and Real-World Applications
Machine Learning and Real-World Applications
 
Deep Learning With Python Tutorial | Edureka
Deep Learning With Python Tutorial | EdurekaDeep Learning With Python Tutorial | Edureka
Deep Learning With Python Tutorial | Edureka
 
07 Machine Learning - Expectation Maximization
07 Machine Learning - Expectation Maximization07 Machine Learning - Expectation Maximization
07 Machine Learning - Expectation Maximization
 
Association Rule Mining in Data Mining
Association Rule Mining in Data Mining Association Rule Mining in Data Mining
Association Rule Mining in Data Mining
 
Naive bayes
Naive bayesNaive bayes
Naive bayes
 
Bayes Belief Networks
Bayes Belief NetworksBayes Belief Networks
Bayes Belief Networks
 
Detection of heart diseases by data mining
Detection of heart diseases by data miningDetection of heart diseases by data mining
Detection of heart diseases by data mining
 
House price prediction
House price predictionHouse price prediction
House price prediction
 
Machine learning Lecture 2
Machine learning Lecture 2Machine learning Lecture 2
Machine learning Lecture 2
 
Association rule mining
Association rule miningAssociation rule mining
Association rule mining
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
What is Machine Learning | Introduction to Machine Learning | Machine Learnin...
What is Machine Learning | Introduction to Machine Learning | Machine Learnin...What is Machine Learning | Introduction to Machine Learning | Machine Learnin...
What is Machine Learning | Introduction to Machine Learning | Machine Learnin...
 
lazy learners and other classication methods
lazy learners and other classication methodslazy learners and other classication methods
lazy learners and other classication methods
 
Machine Learning Tutorial Part - 1 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 1 | Machine Learning Tutorial For Beginners ...Machine Learning Tutorial Part - 1 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 1 | Machine Learning Tutorial For Beginners ...
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
Perceptron (neural network)
Perceptron (neural network)Perceptron (neural network)
Perceptron (neural network)
 
Classification Based Machine Learning Algorithms
Classification Based Machine Learning AlgorithmsClassification Based Machine Learning Algorithms
Classification Based Machine Learning Algorithms
 
CatBoost intro
CatBoost   introCatBoost   intro
CatBoost intro
 
Data preprocessing using Machine Learning
Data  preprocessing using Machine Learning Data  preprocessing using Machine Learning
Data preprocessing using Machine Learning
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 

En vedette

Advance Clustering Technique Based on Markov Chain for Predicting Next User M...
Advance Clustering Technique Based on Markov Chain for Predicting Next User M...Advance Clustering Technique Based on Markov Chain for Predicting Next User M...
Advance Clustering Technique Based on Markov Chain for Predicting Next User M...idescitation
 
Knowledge discoverylaurahollink
Knowledge discoverylaurahollinkKnowledge discoverylaurahollink
Knowledge discoverylaurahollinkSSSW
 
Dotnet titles 2016 17
Dotnet titles 2016 17Dotnet titles 2016 17
Dotnet titles 2016 17praba123456
 
Spontaneous Combustion
Spontaneous CombustionSpontaneous Combustion
Spontaneous CombustionRon Thaman
 
Computer Applications in Mining Engineering, AKS University
Computer Applications in Mining Engineering, AKS UniversityComputer Applications in Mining Engineering, AKS University
Computer Applications in Mining Engineering, AKS UniversityProf-GoldSmith Briz
 
03 Haarla ZRI Metal-Mining General Overview (PC) Sept 12_16
03 Haarla ZRI Metal-Mining General Overview (PC) Sept 12_1603 Haarla ZRI Metal-Mining General Overview (PC) Sept 12_16
03 Haarla ZRI Metal-Mining General Overview (PC) Sept 12_16Scott Jobin-Bevans
 
Enviromental conservasion
Enviromental conservasionEnviromental conservasion
Enviromental conservasionvaishali_bansal
 
magmatic deposits - economic geology
magmatic deposits - economic geologymagmatic deposits - economic geology
magmatic deposits - economic geologyMonikonkona Boruah
 
Knowledge discovery thru data mining
Knowledge discovery thru data miningKnowledge discovery thru data mining
Knowledge discovery thru data miningDevakumar Jain
 
Economic geology - Magmatic ore deposits_1
Economic geology - Magmatic ore deposits_1Economic geology - Magmatic ore deposits_1
Economic geology - Magmatic ore deposits_1AbdelMonem Soltan
 
Web Mining Presentation Final
Web Mining Presentation FinalWeb Mining Presentation Final
Web Mining Presentation FinalEr. Jagrat Gupta
 
NATURAL VENTILATION LITERATURE AND CASE STUDY IN INDIA (DISSERTATION OF THESI...
NATURAL VENTILATION LITERATURE AND CASE STUDY IN INDIA (DISSERTATION OF THESI...NATURAL VENTILATION LITERATURE AND CASE STUDY IN INDIA (DISSERTATION OF THESI...
NATURAL VENTILATION LITERATURE AND CASE STUDY IN INDIA (DISSERTATION OF THESI...KIRAN DAS VAISHNAV
 

En vedette (20)

Advance Clustering Technique Based on Markov Chain for Predicting Next User M...
Advance Clustering Technique Based on Markov Chain for Predicting Next User M...Advance Clustering Technique Based on Markov Chain for Predicting Next User M...
Advance Clustering Technique Based on Markov Chain for Predicting Next User M...
 
Knowledge discoverylaurahollink
Knowledge discoverylaurahollinkKnowledge discoverylaurahollink
Knowledge discoverylaurahollink
 
Dotnet titles 2016 17
Dotnet titles 2016 17Dotnet titles 2016 17
Dotnet titles 2016 17
 
Webmining ppt
Webmining pptWebmining ppt
Webmining ppt
 
5463 26 web mining
5463 26 web mining5463 26 web mining
5463 26 web mining
 
Spontaneous Combustion
Spontaneous CombustionSpontaneous Combustion
Spontaneous Combustion
 
Computer Applications in Mining Engineering, AKS University
Computer Applications in Mining Engineering, AKS UniversityComputer Applications in Mining Engineering, AKS University
Computer Applications in Mining Engineering, AKS University
 
03 Haarla ZRI Metal-Mining General Overview (PC) Sept 12_16
03 Haarla ZRI Metal-Mining General Overview (PC) Sept 12_1603 Haarla ZRI Metal-Mining General Overview (PC) Sept 12_16
03 Haarla ZRI Metal-Mining General Overview (PC) Sept 12_16
 
Stability
StabilityStability
Stability
 
acid mine drainage
 acid mine drainage acid mine drainage
acid mine drainage
 
Enviromental conservasion
Enviromental conservasionEnviromental conservasion
Enviromental conservasion
 
magmatic deposits - economic geology
magmatic deposits - economic geologymagmatic deposits - economic geology
magmatic deposits - economic geology
 
Mine hazards(2162294)
Mine hazards(2162294)Mine hazards(2162294)
Mine hazards(2162294)
 
Knowledge discovery thru data mining
Knowledge discovery thru data miningKnowledge discovery thru data mining
Knowledge discovery thru data mining
 
Economic geology - Magmatic ore deposits_1
Economic geology - Magmatic ore deposits_1Economic geology - Magmatic ore deposits_1
Economic geology - Magmatic ore deposits_1
 
Web Usage Pattern
Web Usage PatternWeb Usage Pattern
Web Usage Pattern
 
Sublevel stoping..Underground mining methods
Sublevel stoping..Underground mining methodsSublevel stoping..Underground mining methods
Sublevel stoping..Underground mining methods
 
Web Mining Presentation Final
Web Mining Presentation FinalWeb Mining Presentation Final
Web Mining Presentation Final
 
Mining methods
Mining methodsMining methods
Mining methods
 
NATURAL VENTILATION LITERATURE AND CASE STUDY IN INDIA (DISSERTATION OF THESI...
NATURAL VENTILATION LITERATURE AND CASE STUDY IN INDIA (DISSERTATION OF THESI...NATURAL VENTILATION LITERATURE AND CASE STUDY IN INDIA (DISSERTATION OF THESI...
NATURAL VENTILATION LITERATURE AND CASE STUDY IN INDIA (DISSERTATION OF THESI...
 

Similaire à Applying web mining application for user behavior understanding

applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...Zakaria Zubi
 
Web Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningWeb Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningIOSR Journals
 
COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUES
COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUESCOMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUES
COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUESIJDKP
 
Identifying the Number of Visitors to improve Website Usability from Educatio...
Identifying the Number of Visitors to improve Website Usability from Educatio...Identifying the Number of Visitors to improve Website Usability from Educatio...
Identifying the Number of Visitors to improve Website Usability from Educatio...Editor IJCATR
 
Automatic recommendation for online users using web usage mining
Automatic recommendation for online users using web usage miningAutomatic recommendation for online users using web usage mining
Automatic recommendation for online users using web usage miningIJMIT JOURNAL
 
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining IJMIT JOURNAL
 
Implementation of Intelligent Web Server Monitoring
Implementation of Intelligent Web Server MonitoringImplementation of Intelligent Web Server Monitoring
Implementation of Intelligent Web Server Monitoringiosrjce
 
a novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioa novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioINFOGAIN PUBLICATION
 
Logminingsurvey
LogminingsurveyLogminingsurvey
Logminingsurveydrewz lin
 
A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining Editor IJMTER
 
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...IOSR Journals
 
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningA Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningIJMER
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine LearningIRJET Journal
 
Web personalization using clustering of web usage data
Web personalization using clustering of web usage dataWeb personalization using clustering of web usage data
Web personalization using clustering of web usage dataijfcstjournal
 
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...ijdkp
 
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET Journal
 
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...IJSRD
 

Similaire à Applying web mining application for user behavior understanding (20)

applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
 
Web Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningWeb Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage mining
 
COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUES
COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUESCOMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUES
COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUES
 
Identifying the Number of Visitors to improve Website Usability from Educatio...
Identifying the Number of Visitors to improve Website Usability from Educatio...Identifying the Number of Visitors to improve Website Usability from Educatio...
Identifying the Number of Visitors to improve Website Usability from Educatio...
 
Automatic recommendation for online users using web usage mining
Automatic recommendation for online users using web usage miningAutomatic recommendation for online users using web usage mining
Automatic recommendation for online users using web usage mining
 
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining
 
Pxc3893553
Pxc3893553Pxc3893553
Pxc3893553
 
Implementation of Intelligent Web Server Monitoring
Implementation of Intelligent Web Server MonitoringImplementation of Intelligent Web Server Monitoring
Implementation of Intelligent Web Server Monitoring
 
C017231726
C017231726C017231726
C017231726
 
a novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioa novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studio
 
Logminingsurvey
LogminingsurveyLogminingsurvey
Logminingsurvey
 
A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining
 
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
 
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningA Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine Learning
 
Web personalization using clustering of web usage data
Web personalization using clustering of web usage dataWeb personalization using clustering of web usage data
Web personalization using clustering of web usage data
 
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
 
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage Mining
 
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
 

Plus de Zakaria Zubi

Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Zakaria Zubi
 
Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Zakaria Zubi
 
I- Extended Databases
I- Extended DatabasesI- Extended Databases
I- Extended DatabasesZakaria Zubi
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternZakaria Zubi
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...Zakaria Zubi
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification Zakaria Zubi
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesZakaria Zubi
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposesZakaria Zubi
 

Plus de Zakaria Zubi (13)

Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)
 
Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases
 
I- Extended Databases
I- Extended DatabasesI- Extended Databases
I- Extended Databases
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Ismail&&ziko 2003
Ismail&&ziko 2003Ismail&&ziko 2003
Ismail&&ziko 2003
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification
 
Edi text
Edi textEdi text
Edi text
 
Model
ModelModel
Model
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital images
 
Deep Web mining
Deep Web miningDeep Web mining
Deep Web mining
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposes
 

Dernier

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Dernier (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Applying web mining application for user behavior understanding

  • 1. APPLYING WEB MINING APPLICATION FOR USER BEHAVIOR UNDERSTANDING Dr. Zakaria Suliman Zubi Associate Professor Computer Science Department Faculty Of Science Sirte University, Libya LOGO
  • 3. LOGO Abstract Web usage mining (WUM) focuses on the discovering of potential knowledge from browsing patterns of the users. Which leads us to find the correlation between pages in the analysis stage. The primary data source used in web usage mining is the server log-files (web-logs).  Browsing web pages by the user leaves a lot of information in the log-file. Analyzing logfiles information drives us to understand the behavior of the user. Web log is an essential part for the web mining to extract usage patterns and study the visiting characteristics of user. Our paper focus on the use of web mining techniques to classify web pages type according to user visits.  This classification helps us to understand the user behavior. We also uses some classification and association rule techniques for discovering the potential knowledge from the browsing patterns.
  • 5. LOGO INTRODUCTION The Internet offers a huge, widely global information center for News, advertising, consume information, financial management, education, government, and e-commerce . The aim of using web mining techniques for understanding user behavior is to profile user characteristics. Web mining can be organized into three main categories: web content mining, web structure mining, and web usage mining.
  • 6. LOGO INTRODUCTION Cont.. Web Mining Web Structure Mining Web Content Mining Web Usage Mining 1-Web content mining analyzes web content such as text, multimedia data, and structured data (within web pages or linked across web pages). 2 -Web structure mining is the process of using graph and network mining theory and methods to analyze the nodes and connection structures on the Web. 3- Web Usage Mining is a special type of web mining tool, which can discover the knowledge in the hidden browsing patterns and analyses the visiting characteristics of the users.
  • 7. LOGO INTRODUCTION Cont.. The Primary Data of Web Usage Mining 1-Web server logs . 2-Data about visitors of the sites. 3-Registration forms. Fig 2:portion of a typical server log A standard log-file had the following format remotehost; logname; username; date; request; status; bytes[ where: remotehost: is the remote hostname or its IP address; logname:is the remote log name of the user; username: is the username with which the user has authenticated himself, date: is the date and time of the request, request: is the exact request line as it came from the client, status: is the HTTP status code returned to the client, and bytes: is the content-length of the document transferred.
  • 9. LOGO THE PHASES OF WEB USAGE MINING Web usage mining is a complete process that includes various stages of data mining cycle, including Data Preprocessing, Pattern Discovery & Pattern Analysis.  Initially, at the data preprocessing stage web log is preprocessed to clean, integrate and transform into a common log. In the pattern discovery: Data mining techniques are applied to discover the interesting characteristics in the hidden patterns. Pattern Analysis is the final stage of web usage mining which can validate interested patterns from the output of pattern discovery that can be used to predict user behavior.
  • 10. LOGO THE PHASES OF WEB USAGE MINING Data Preprocessing Process Data Cleaning: The log-file is first examined to remove irrelevant entries such as those that represent multimedia data and scripts or uninteresting entries such as those that belongs to top/bottom frames. Pageview Identification: Identification of page views is heavily dependent on the intra-page structure of the site, as well as on the page contents and the underlying site do-main knowledge. each pageview can be viewed as a collection of Web objects or resources representing a specific “user event,”. Data Cleaning Pageview Identification User Identification Session Identification
  • 11. LOGO THE PHASES OF WEB USAGE MINING Data Preprocessing Process User Identification: Since several users may share a single machine name, certain heuristics are used to identify users . We use the phrase user activity record to refer to the sequence of logged activities belonging to the same user. Session Identification:  Aims to split the page access of each user into separated sessions. It defines the number of times the user has accessed a web page and time out defines a time limit for the access of particular web page for more than 30 minutes if more the session will be divided in more than one session. Sample of user and sessions identification
  • 12. LOGO THE PHASES OF WEB USAGE MINING Pattern Discovery Process: Discovering user access pattern from the user access log files is the main purpose of using web usage mining . Association Rule Mining: Association rule mining discovery and statistical correlation analysis can find groups of web pages types that are commonly accessed together (Association rule mining can be used to discover correlation between pages types found in a web log) this technique is applied to user and session identification consisting of item where every item represents a page type ,we will also use Apriori algorithm to find the correlation between pages based on the confidence and support vectors. What are the set of pages type frequently accessed together by the web users. e.g (Sport, News, Social) What the page type will be fetched next. e.g Entertainment
  • 13. LOGO THE PHASES OF WEB USAGE MINING Classification Classification techniques play an important role in Web analytics applications for modeling the users according to various predefined metrics. In the Web domain, we are interested in developing a profile of users belonging to a particular class or category . This requires extraction and selection of features that best describe the properties of a given class or category. We will focus also on k-nearest neighbor (K-NN) which was considered as a predictive technique for classification models. Whereas;  k represents a number of similar cases or the number of items in the group.
  • 14. LOGO THE PHASES OF WEB USAGE MINING Pattern Analysis Process: In this stage of process the discovered patterns will further processed ,filtered ,possibly resulting in aggregate user models that can be used as a visualizations tools ,the next figure summarizes the whole process:
  • 16. RESULTS OF USING ASSOCIATION RULES LOGO Log-file in a flat file format. Import log-file database to our implemented application.
  • 17. RESULTS OF USING ASSOCIATION RULES LOGO Extract the transactional database of web sever log for every user where every transaction represents a session. Find the association rules of user behavior after applying the Aprori algorithm to the transactional database of the user.
  • 19. LOGO CONCLUSION  We used web data that contained all the information about the user. When the user leaves accessing the web pages. This data is called web logs or (serverlogs) A statistical methods such as classification, association rule mining discovery and statistical correlation analysis which can find groups of web pages types that are commonly accessed together are applied as well. Classification is used to map the data item into one of several predefined classes. The class will belongs into one category such as sport or politics or education or..etc. We also uses the k-nearest neighbor (K-NN) algorithm as a common classification method to select the best class. Association rule mining was used to discover correlation between sites types found in a web log. The implemented application program was designed in C# programming language.