A Survey of Methods and Algorithms for mining of Web Access Logs

The use of the Internet as a channel for communication and commerce makes available massive access logs. The large amount of data in these logs provides significant opportunity to apply empirical methods of analysis to understand the needs of the visitors to a web site and to optimize the site and the recommendations it makes to the individual visitors. There are a number of choices that need to be made in the pre-processing of access logs (required because of proxy level and client level caching as well as other factors) as well as the representation of data and the empirical model used for mining. This manuscript reviews some of the popular methods of pre-processing, data representation and methods and algorithms for subsequent mining.

By: Ravi Kothari, Parul Mittal

Published in: RI03007 in 2003

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

RI03007.pdf

Questions about this service can be mailed to reports@us.ibm.com .