Cyber Profiling Using Log Analysis And K-Means Clustering

Abstract

The Activities of Internet users are increasing from year to year and has had an impact on the behavior of the users themselves. Assessment of user behavior is often only based on interaction across the Internet without knowing any others activities. The log activity can be used as another way to study the behavior of the user. The Log Internet activity is one of the types of big data so that the use of data mining with K-Means technique can be used as a solution for the analysis of user behavior. This study has been carried out the process of clustering using K-Means algorithm is divided into three clusters, namely high, medium, and low. The results of the higher education institution show that each of these clusters produces websites that are frequented by the sequence: website search engine, social media, news, and information. This study also showed that the cyber profiling had been done strongly influenced by environmental factors and daily activities.

Authors and Affiliations

Muhammad Zulfadhilah, Yudi Prayudi, Imam Riadi

Keywords

Related Articles

A Genetic Algorithm for Optimizing TCM Encoder

This article describes a genetic algorithm for the optimization of the Trellis Coded Modulation (TCM) schemes with a view to achieve a higher performance in the multipath fading channel. The use of genetic algorithms is...

An Incremental Technique of Improving Translation

Statistical machine translation (SMT) refers to using probabilistic methods of learning translation process primarily from the parallel text. In SMT, the linguistic information such as morphology and syntax can be added...

Energy Efficient Routing Protocol for Maximizing the Lifetime in Wsns Using Ant Colony Algorithm and Artificial Immune System

Energy limitations have become fundamental challenge for designing wireless sensor networks. Network lifetime represent the most important and interested metric. Several attempts have been made for efficient utilization...

Clustering Analysis of Wireless Sensor Network Based on Network Coding with Low-Density Parity Check

The number of nodes in wireless sensor networks (WSNs) is one of the fundamental parameters when it comes to developing an algorithm based on Network Coding (NC) with LDPC (Low Density Parity Check) code because it direc...

Communication and Computation Aware Task Scheduling Framework Toward Exascale Computing

The race for Exascale Computing has naturally led computer architecture to transit from the multicore era and into the heterogeneous era. Exascale Computing within the heterogenous environment necessarily use the best-fi...

Download PDF file
  • EP ID EP128510
  • DOI 10.14569/IJACSA.2016.070759
  • Views 103
  • Downloads 0

How To Cite

Muhammad Zulfadhilah, Yudi Prayudi, Imam Riadi (2016). Cyber Profiling Using Log Analysis And K-Means Clustering. International Journal of Advanced Computer Science & Applications, 7(7), 430-435. https://europub.co.uk/articles/-A-128510