Cyber Profiling Using Log Analysis And K-Means Clustering

Abstract

The Activities of Internet users are increasing from year to year and has had an impact on the behavior of the users themselves. Assessment of user behavior is often only based on interaction across the Internet without knowing any others activities. The log activity can be used as another way to study the behavior of the user. The Log Internet activity is one of the types of big data so that the use of data mining with K-Means technique can be used as a solution for the analysis of user behavior. This study has been carried out the process of clustering using K-Means algorithm is divided into three clusters, namely high, medium, and low. The results of the higher education institution show that each of these clusters produces websites that are frequented by the sequence: website search engine, social media, news, and information. This study also showed that the cyber profiling had been done strongly influenced by environmental factors and daily activities.

Authors and Affiliations

Muhammad Zulfadhilah, Yudi Prayudi, Imam Riadi

Keywords

Related Articles

Current Trends and Research Challenges in Spectrum-Sensing for Cognitive Radios

The ever increasing demand of wireless communication systems has led to search of suitable spectrum bands for transmission of data. The research in the past has revealed that radio spectrum is under-utilized in most of t...

Method for Estimation of Aerosol Parameters Based on Ground Based Atmospheric Polarization Irradiance Measurements

Method for aerosol refractive index estimation with ground based polarization measurement data is proposed. The proposed method uses a dependency of refractive index on p and s polarized down welling solar diffuse irradi...

Resource Utilization in Cloud Computing as an Optimization Problem

In this paper, an algorithm for resource utilization problem in cloud computing based on greedy method is presented. A privately-owned cloud that provides services to a huge number of users is assumed. For a given resour...

Role of Security in Social Networking

In this paper, the concept of security and privacy in social media, or social networking will be discussed. First, a brief history and the concept of social networking will be introduced. Many of the security risks assoc...

 Post-Editing Error Correction Algorithm For Speech Recognition using Bing Spelling Suggestion

 ASR short for Automatic Speech Recognition is the process of converting a spoken speech into text that can be manipulated by a computer. Although ASR has several applications, it is still erroneous and imprecise es...

Download PDF file
  • EP ID EP128509
  • DOI 10.14569/IJACSA.2016.070759
  • Views 96
  • Downloads 0

How To Cite

Muhammad Zulfadhilah, Yudi Prayudi, Imam Riadi (2016). Cyber Profiling Using Log Analysis And K-Means Clustering. International Journal of Advanced Computer Science & Applications, 7(7), 430-435. https://www.europub.co.uk/articles/-A-128509