Cyber Profiling Using Log Analysis And K-Means Clustering
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 7
Abstract
The Activities of Internet users are increasing from year to year and has had an impact on the behavior of the users themselves. Assessment of user behavior is often only based on interaction across the Internet without knowing any others activities. The log activity can be used as another way to study the behavior of the user. The Log Internet activity is one of the types of big data so that the use of data mining with K-Means technique can be used as a solution for the analysis of user behavior. This study has been carried out the process of clustering using K-Means algorithm is divided into three clusters, namely high, medium, and low. The results of the higher education institution show that each of these clusters produces websites that are frequented by the sequence: website search engine, social media, news, and information. This study also showed that the cyber profiling had been done strongly influenced by environmental factors and daily activities.
Authors and Affiliations
Muhammad Zulfadhilah, Yudi Prayudi, Imam Riadi
Toward Accurate Feature Selection Based on BSS-GRF
in recent years, Feature extraction in e-mail classification plays an important role. Many Feature extraction algorithms need more effort in term of accuracy. In order to improve the classifier accuracy and for faster cl...
Towards A Broader Adoption of Agile Software Development Methods
Traditionally, software design and development has been following the engineering approach as exemplified by the waterfall model, where specifications have to be fully detailed and agreed upon prior to starting the softw...
Probabilistic Distributed Algorithm for Uniform Election in Triangular Grid Graphs
Probabilistic algorithms are designed to handle problems that do not admit deterministic effective solutions. In the case of the election problem, many algorithms are available and applicable under appropriate assumption...
Healthcare Management using ICT and IoT based 5G
In healthcare management, all patients need to be looked after properly with the latest technology. Although treatment facilities of healthcare management are available wirelessly, many treatments are still pending and d...
Framework for Assessing Privacy of Internet Applications
This paper presents a new framework for assessing and documenting the privacy risks associated with developing and managing internet applications. The Framework for Assessing Privacy of Internet Applications (FAPIA) prov...