Pre-Processing: Procedure on Web Log File for Web Usage Mining

Size: px
Start display at page:

Download "Pre-Processing: Procedure on Web Log File for Web Usage Mining"

Transcription

1 Pre-Processing: Procedure on Web Log File for Web Usage Mining Shaily Langhnoja 1, Mehul Barot 2, Darshak Mehta 3 1 Student M.E.(C.E.), L.D.R.P. ITR, Gandhinagar, India 2 Asst.Professor, C.E. Dept., L.D.R.P. ITR, Gandhinagar, India 3 Lecturer, Government Polytechnic, Gandhinagar, India Abstract These days World Wide Web becomes very popular and interactive for transferring of Information. Web usage mining is the area of data mining which deals with the discovery and analysis of usage patterns from Web data, specifically web logs, in order to improve web based applications. Web usage mining consists of three phases, preprocessing, pattern discovery, and pattern analysis. After the completion of these three phases the user can find the required usage patterns and use these information for the specific needs. The web access log file is saved to keep a record of every request made by the users. However, the data stored in the log files does not specify accurate details of the users accesses to the Web site. So, preprocessing of the Web log data is first and important phase before web log file can be applied for pattern analysis & pattern discovery. The preprocessed Web Log file can then be suitable for the discovery and analysis of useful information referred to as Web mining. This paper gives detailed description of how pre-processing is done on web log file and after that it is sent to next stages of web usage mining. Keywords Web Mining, Web Usage Mining, Web Log file, Data cleansing, Preprocessing I. INTRODUCTION With the continued growth and proliferation of e- commerce, Web services, and Web-based information systems, the volumes of clickstream and user data collected by Web-based organizations in their daily operations has reached astronomical proportions. Analyzing such data can help these organizations determine the life-time value of clients, design cross-marketing strategies across products and services, evaluate the effectiveness of pro-motional campaigns, optimize the functionality of Web-based applications, provide more personalized content to visitors, and find the most effective logical structure for their Web space. This type of analysis involves the automatic discovery of meaningful patterns and relationships from a large collection of primarily semi-structured data, often stored in Web and applications server access logs, as well as in related operational data sources. Web usage mining refers to the automatic discovery and analysis of patterns in clickstream and associated data collected or generated as a result of user interactions with Web resources on one or more Web sites. The goal is to capture, model, and analyze the behavioral patterns and profiles of users interacting with a Web site. The discovered patterns are usually represented as collections of pages, objects, or re-sources that are frequently accessed by groups of users with common needs or interests. Following the standard data mining process the overall Web usage mining process can be divided into three inter-dependent stages: data collection and pre-processing, pattern discovery, and pattern analysis. This paper provides description about what is Web Log File, where it is located, different formats of it & preprocessing on it. Pre-processing of web log file includes data cleansing, user identification & session identification. II. WEBLOG FILE Web log files are files that contain information about website visitor activity. Log files are created by web servers automatically. Each time a visitor requests any file (page, image, etc.) from the site information on his request is appended to a current log file. Most log files have text format and each log entry (hit) is saved as a line of text. Log file range 1KB to 100MB. A. Location of weblog file: Web log file is located in three different location. Web server logs: Web log files provide most accurate and complete usage of data to web server. The log file do not record cached pages visited. Data of log files are sensitive, personal information so web server keeps them closed. Web proxy server: Web proxy server takes HTTP request from user, gives them to web server, then result passed to web server and return to user. Client send request to web server via proxy server. 419

2 The two disadvantages are: Proxy-server construction is a difficult task. Advanced network programming, such as TCP/IP, is required for this construction. The request interception is limited. Client browser: Log file can reside in client s browser window itself. HTTP cookies used for client browser. These HTTP cookies are pieces of information generated by a web server and stored in user s computer, ready for future access. B. Type of web log file: There are four types of server logs. Access log file: Data of all incoming request and information about client of server. Access log records all requests that are processed by server. Error log file: list of internal error. Whenever an error is occurred, the page is being requested by client to web server the entry is made in error log.access and error logs are mostly used, but agent and referrer log may or may not enable at server. Agent log file: Information about user s browser, browser version. Referrer log file: This file provides information about link and redirects visitor to site. C. Web log file format: Web log file is a simple plain text file which record information about each user. Display of log files data in three different format W3C Extended log file format NCSA common log file format IIS log file format NCSA and IIS log file format the data logged for each request is fixed.w3c format allows user to choose properties, user want to log for each request. 1. W3C Extended log file format W3C log format is default log file format on IIS server. Field are separated by space, time is recorded as GMT (Greenwich Mean Time). It can be customized that is administrators can add or remove fields depending on what information want to record. In W3C format of year is YYYY-MM-DD. Omitting unwanted attributes field when log file size is limited[w3c]. Figure below shows that #software - version of IIS that is running #version - the log file format #Date- recording date and time of first log entry. #fields: date time c-ip cs-username s-ip cs-method cs-uristem cs-uri-query sc-status sc-bytes cs-bytes time-taken csversion cs(user-agent) cs(cookie) cs(referrer) #Software: Microsoft Internet Information Services 7.5 #Version: 1.0 #Date: :25:10 #Fields: :48: GET/global/images/navlineboards.gif HTTP/1.0 Mozilla/4.0+(compatible;+MSIE+4.01;+Windows+95) USERID=CustomerA;+IMPID= Fig.1. Example of W3C log file format 2. NCSA common log file format The NCSA Common log file format is a fixed ASCII text-based format, so you cannot customize it. The NCSA Common log file format is available for Web sites and for SMTP and NNTP services, but it is not available for FTP sites. Because HTTP.sys handles the NCSA Common log file format, this format records HTTP.sys kernel-mode cache hits.the NCSA Common log file format records the following data: Remote host address Remote log name (This value is always a hyphen.) User name Date, time, and Greenwich mean time (GMT) offset Request and protocol version Service status code (A value of 200 indicates that the Bytes sent leon [01/Jul/2002:12:11: ] "GET /index.html HTTP/1.1" IIS log file format Fig.2 Example of NCSA log file format The IIS log file format is a fixed ASCII text-based format, so you cannot customize it. Because HTTP.sys handles the IIS log file format, this format records HTTP.sys kernel-mode cache hits. The IIS log file format records the following data: Client IP address User name Date Time Service and instance Server name Server IP address Time taken 420

3 Client bytes sent Server bytes sent Service status code (A value of 200 indicates that the Windows status code (A value of 0 indicates that the Request type Target of operation , anonymous, 03/20/01, 23:58:11, MSFTPSVC, SALES1, , 60, 275, 0, 0, 0, PASS, /Intro.htm Fig.3 Example of IIS log file format III. PHASE 1: PREPROCESSING There are several pre-processing tasks to be done before data mining algorithms can be performed on the web server logs. These include data cleansing, user identification, session identification. Fig.4 Data Pre-Processing Steps in Web Usage Mining A. Data Cleansing The purpose of data cleaning is to remove irrelevant items stored in the log files that may not be useful for analysis purposes. When a user accesses a HTML document, the embedded images, if any, are also automatically downloaded and stored in the server log. For example, log entries with file name suffixes such as gif, jpeg, GIF, JPEG, jpg and JPG can be removed. Since the main objective of data preprocessing is to obtain only the usage data, file requests that the user did not explicitly request can be eliminated. This can be done by checking the suffix of the URL name. In addition to this, erroneous files can be removed by checking the status of the request (such as status code 404). Data cleaning also involves the removal of references resulting from spider navigations which can be done by maintaining a list of spiders or through heuristic identification of spiders and Web robots. The cleaned log represents the user s accesses to the Web site. 421 Algorithm for Data Cleansing Following is the algorithm used for cleansing web log file for retrieving useful information and eliminating unnecessary data to carry out work related to this paper. The algorithm for Data cleansing step in Web usage mining process of pre-processing stage used in this paper. Here input is raw web log file which is processed and finally output generated is processed web log file and its data is inserted into table of database. Input: raw web log file. Output: processed web log file. 1. for each lines in web log file do 2. if length of line is more then one character then #Avoid Blank Lines 3. if line does not start with # then #Avoid Comments 4. if link name contains domain name then #Consider Application specific links only 5. if page extension is aspx or html then #Eliminate non-page links like images, pdfs insert query for adding log data in database B. User & Session Identification To identify each user and session uniquely we can take measures like IP address, operating system, browser, time out period, etc. Once above step of data cleansing is performed, all useful data records are available with us in database and irrelevant entries are considered to be removed. So, now we can start up the remaining process with database rows itself. Algorithm for User & Sesion Identification The algorithm for the user and session identification can be depicted as below: Input: processed weblog file Output: identification of user & session. 1. for each record in dataset do 2. if currentip is not in ListOfIP then add currentip in ListOfIP 3. else if currentos is not in ListOfOS then add currentos in ListOfOS 4. else if currentbrowser is not in ListOfBrowser then add currentbrowser in ListOfBrowser

4 5. else if current record timestamp is more than 1800 seconds #30minutes * 60 seconds 6. else mark current record with existing sessionid and userid end if end of loop The above algorithm when used, marks each record in database with respective user and session identified groups which later can be used for further proceedings of web usage mining process. The resulted group of records can be inserted into database and later results of which can be very helpful like total number of users, total number sessions, difference between total number of records before preprocessing and post-preprocessing, etc. IV. EXPERIMENTAL RESULTS We have conducted several experiments on log files collected from Government Polytechnic, Gandhinagar website. During Data cleansing step all irrelevant entries are removed. Sample raw web log file is as below: #Software: Microsoft Internet Information Services 7.5 #Version: 1.0 #Date: :36:21 #Fields: date time s-sitename s-computername s-ip cs-method cs-uristem cs-uri-query s-port cs-username c-ip cs-version cs(user-agent) cs(cookie) cs(referer) cs-host sc-status sc-substatus sc-win32-status sc-bytes cs-bytes time-taken :36:21 W3SVC1 DARSHAK GET / HTTP/1.1 Mozilla/5.0+(Windows+NT+6.1)+AppleWebKit/ (KHTML, +like+gecko)+chrome/ safari/ :36:21 W3SVC1 DARSHAK GET /itinfo/images/login.jpg HTTP/1.1Mozilla/5.0+(Windows+NT+6.1)+AppleWeb Kit/ (KHTML,+like+Gecko)+Chrome/ Safari/ Fig.5. Sample Web Log File Select web log file for cleansing operation as shown below: Fig.6. Data Cleansing Process Thus after completion of Data Cleansing Web Server Log file is cleaned and is prepared for data to be loaded into relational database. Here data is loaded & stored in MS SQL Server Fig.7. Processed Web Log File Here, since a Government Polytechnic, Gandhinagar site is mostly accessed by students in the computer laboratories without passing through proxy server - we simply use the machines IP addresses to identify unique users. After performing Pre-Processing step result get is shown in table1. 422

5 Total No. of Users TABLE 1 RESULTS AFTER PRE-PROCESSING Total No. of Sessions Rows in Web Log File Total Rows after pre-processing V. CONCLUSION Web usage mining is indeed one of the emerging area of research and important sub-domain of data mining and its techniques. In order to take full advantage of web usage mining and its all techniques, it is important to carry out preprocessing stage efficiently and effectively. This paper tries to deliver areas of preprocessing including data cleansing, session identification, user identification, etc. Once preprocessing stage is well-performed, we can apply data mining techniques like clustering, association, classification etc for applications of web usage mining such as business intelligence, e-commerce, e-learning, personalization, etc. REFERENCES [1] Theint Theint Aye Web Log Cleaning for Mining Of Web Usage Patterns. IEEE. [2] K.R. Suneetha and Dr. R. Krihnamoorthi Identifying User Behavior by Analyzing Web Server Access Log File. IJCSNS. [3] R.Cooley, Bamshad Mobasherand Jaideep Srivastava, "DataPreparation for Mining World Wide Web Browsing Patterns." Knowledge and Information Systems,1(1),1999,5-32 R.Kosala and H. Blockeel, "Web Mining Research : A Survey." ACM SIGKDD Explorations, 2000, [4] R.Cooley, B. Mobasher and J. Srivatsava, "Web mining: Information and pattern discovery on the World Wide Web." 9th IEEE Inernational Conference on Tools with Artificial Intelligence. CA, 1997,

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests

More information

Microsoft Internet Information Services (IIS)

Microsoft Internet Information Services (IIS) McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Microsoft Internet Information Services (IIS) September 30, 2014 Microsoft IIS Page 1 of 11 Important Note: The information

More information

Survey on web log data in teams of Web Usage Mining

Survey on web log data in teams of Web Usage Mining Survey on web log data in teams of Web Usage Mining *Mrudang D. Pandya, **Prof. Kiran R Amin *(U.V.PATEL COLLAGE OF ENGINEERING,GANPAT UNIVERSITY, Ganpat Vidyanagar,Mehsana-Gozaria HighwayMehsana - 384012,

More information

PREPROCESSING OF WEB LOGS

PREPROCESSING OF WEB LOGS PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data

More information

Automatic Recommendation for Online Users Using Web Usage Mining

Automatic Recommendation for Online Users Using Web Usage Mining Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2

More information

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Jaswinder Kaur #1, Dr. Kanwal Garg #2 #1 Ph.D. Scholar, Department of Computer Science & Applications Kurukshetra University,

More information

Research on Application of Web Log Analysis Method in Agriculture Website Improvement

Research on Application of Web Log Analysis Method in Agriculture Website Improvement Research on Application of Web Log Analysis Method in Agriculture Website Improvement Jian Wang 1 ( 1 Agricultural information institute of CAAS, Beijing 100081, China) wangjian@caas.net.cn Abstract :

More information

Web Usage mining framework for Data Cleaning and IP address Identification

Web Usage mining framework for Data Cleaning and IP address Identification Web Usage mining framework for Data Cleaning and IP address Identification Priyanka Verma The IIS University, Jaipur Dr. Nishtha Kesswani Central University of Rajasthan, Bandra Sindri, Kishangarh Abstract

More information

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com

More information

The web server administrator needs to set certain properties to insure that logging is activated.

The web server administrator needs to set certain properties to insure that logging is activated. Access Logs As before, we are going to use the Microsoft Virtual Labs for this exercise. Go to http://technet.microsoft.com/en-us/bb467605.aspx, then under Server Technologies click on Internet Information

More information

Advanced Preprocessing using Distinct User Identification in web log usage data

Advanced Preprocessing using Distinct User Identification in web log usage data Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of

More information

A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data

A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data R. Lokeshkumar 1, R. Sindhuja 2, Dr. P. Sengottuvelan 3 1 Assistant Professor - (Sr.G), 2 PG Scholar, 3Associate

More information

An Approach to Convert Unprocessed Weblogs to Database Table

An Approach to Convert Unprocessed Weblogs to Database Table An Approach to Convert Unprocessed Weblogs to Database Table Kiruthika M, Dipa Dixit, Pranay Suresh, Rishi M Department of Computer Engineering, Fr. CRIT, Vashi, Navi Mumbai Abstract With the explosive

More information

Research and Development of Data Preprocessing in Web Usage Mining

Research and Development of Data Preprocessing in Web Usage Mining Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the

More information

An Effective Analysis of Weblog Files to improve Website Performance

An Effective Analysis of Weblog Files to improve Website Performance An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL

More information

AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING

AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 princemary26@gmail.com E. Baburaj Department of omputer Science & Engineering, Sun Engineering

More information

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI

More information

Web Server Logs Preprocessing for Web Intrusion Detection

Web Server Logs Preprocessing for Web Intrusion Detection Web Server Logs Preprocessing for Web Intrusion Detection Shaimaa Ezzat Salama Faculty of Computers and Information, Helwan University, Egypt E-mail: chaimaa_salama@yahoo.com Mohamed I. Marie Faculty of

More information

AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING

AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING N. M. Abo El-Yazeed Demonstrator at High Institute for Management and Computer, Port Said University, Egypt no3man_mohamed@himc.psu.edu.eg

More information

www.apacheviewer.com Apache Logs Viewer Manual

www.apacheviewer.com Apache Logs Viewer Manual Apache Logs Viewer Manual Table of Contents 1. Introduction... 3 2. Installation... 3 3. Using Apache Logs Viewer... 4 3.1 Log Files... 4 3.1.1 Open Access Log File... 5 3.1.2 Open Remote Access Log File

More information

CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS

CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS 3.1 Introduction In this thesis work, a model is developed in a structured way to mine the frequent patterns in e-commerce domain. Designing and implementing

More information

An Overview of Preprocessing on Web Log Data for Web Usage Analysis

An Overview of Preprocessing on Web Log Data for Web Usage Analysis International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-4, March 2013 An Overview of Preprocessing on Web Log Data for Web Usage Analysis Naga

More information

Web Log Mining: A Study of User Sessions

Web Log Mining: A Study of User Sessions UNIVERSITY OF PADUA Department of Information Engineering PersDL 2007 10th DELOS Thematic Workshop on Personalized Access, Profile Management, and Context Awareness in Digital Libraries Corfu, Greece,

More information

An Enhanced Framework For Performing Pre- Processing On Web Server Logs

An Enhanced Framework For Performing Pre- Processing On Web Server Logs An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and

More information

Analysis of Server Log by Web Usage Mining for Website Improvement

Analysis of Server Log by Web Usage Mining for Website Improvement IJCSI International Journal of Computer Science Issues, Vol., Issue 4, 8, July 2010 1 Analysis of Server Log by Web Usage Mining for Website Improvement Navin Kumar Tyagi 1, A. K. Solanki 2 and Manoj Wadhwa

More information

Data Preprocessing and Easy Access Retrieval of Data through Data Ware House

Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Suneetha K.R, Dr. R. Krishnamoorthi Abstract-The World Wide Web (WWW) provides a simple yet effective media for users to search,

More information

Preprocessing Web Logs for Web Intrusion Detection

Preprocessing Web Logs for Web Intrusion Detection Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer

More information

A Survey on Different Phases of Web Usage Mining for Anomaly User Behavior Investigation

A Survey on Different Phases of Web Usage Mining for Anomaly User Behavior Investigation A Survey on Different Phases of Web Usage Mining for Anomaly User Behavior Investigation Amit Pratap Singh 1, Dr. R. C. Jain 2 1 Research Scholar, Samrat Ashok Technical Institute, Visdisha, M.P., Barkatullah

More information

Big Data Preprocessing Mechanism for Analytics of Mobile Web Log

Big Data Preprocessing Mechanism for Analytics of Mobile Web Log Int. J. Advance Soft Compu. Appl, Vol. 6, No. 1, March 2014 ISSN 2074-8523; Copyright SCRG Publication, 2014 Big Data Preprocessing Mechanism for Analytics of Mobile Web Log You Joung Ham, Hyung-Woo Lee

More information

Identifying User Behavior by Analyzing Web Server Access Log File

Identifying User Behavior by Analyzing Web Server Access Log File IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 327 Identifying User Behavior by Analyzing Web Server Access Log File K. R. Suneetha, Dr. R. Krishnamoorthi,

More information

Installing AWStats on IIS 6.0 (Including IIS 5.1) - Revision 3.0

Installing AWStats on IIS 6.0 (Including IIS 5.1) - Revision 3.0 AWStats is such a great statistical tracking program to use, but there seems to be a lack of easy-tofollow documentation available for installing AWStats on IIS. This document covers the basic setup process

More information

CHAPTER-7 EXPERIMENTS AND TEST RESULTS FOR PROPOSED PREDICTION MODEL

CHAPTER-7 EXPERIMENTS AND TEST RESULTS FOR PROPOSED PREDICTION MODEL CHAPTER-7 EXPERIMENTS AND TEST RESULTS FOR PROPOSED PREDICTION MODEL 7.1 Preprocessing Experiments and Results 7.2 Sessionization Experiments and Results 7.3 Pattern Discovery Experiments and Results 7.4

More information

Comparison table for an idea on features and differences between most famous statistics tools (AWStats, Analog, Webalizer,...).

Comparison table for an idea on features and differences between most famous statistics tools (AWStats, Analog, Webalizer,...). What is AWStats AWStats is a free powerful and featureful tool that generates advanced web, streaming, ftp or mail server statistics, graphically. This log analyzer works as a CGI or from command line

More information

Web Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website

Web Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website Web Log Analysis for Identifying the Number of and their Behavior to Enhance the Accessibility and Usability of Website Navjot Kaur Assistant Professor Department of CSE Punjabi University Patiala Himanshu

More information

Arti Tyagi Sunita Choudhary

Arti Tyagi Sunita Choudhary Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining

More information

ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING

ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING L.K. Joshila Grace 1, V.Maheswari 2, Dhinaharan Nagamalai 3, 1 Research Scholar, Department of Computer Science and Engineering joshilagracejebin@gmail.com

More information

Data Pre-processing on Web Server Logs for Generalized Association Rules Mining Algorithm

Data Pre-processing on Web Server Logs for Generalized Association Rules Mining Algorithm Data Pre-processing on Web Server Logs for Generalized Association Rules Mining Algorithm Mohd Helmy Abd Wahab, Mohd Norzali Haji Mohd, Hafizul Fahri Hanafi, Mohamad Farhan Mohamad Mohsin Abstract Web

More information

How To Mine A Web Site For Data Mining

How To Mine A Web Site For Data Mining Data Preparation for Mining World Wide Web Browsing Patterns Robert Cooley, Bamshad Mobasher, and Jaideep Srivastava Department of Computer Science and Engineering University of Minnesota 4-192 EECS Bldg.,

More information

Data Pre-processing on Web Server Logs for Generalized Association Rules Mining Algorithm

Data Pre-processing on Web Server Logs for Generalized Association Rules Mining Algorithm Data Pre-processing on Web Server Logs for Generalized Association Rules Mining Algorithm Mohd Helmy Abd Wahab, Mohd Norzali Haji Mohd, Hafizul Fahri Hanafi, Mohamad Farhan Mohamad Mohsin Abstract Web

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Web Log Based Analysis of User s Browsing Behavior

Web Log Based Analysis of User s Browsing Behavior Web Log Based Analysis of User s Browsing Behavior Ashwini Ladekar 1, Dhanashree Raikar 2,Pooja Pawar 3 B.E Student, Department of Computer, JSPM s BSIOTR, Wagholi,Pune, India 1 B.E Student, Department

More information

Using the Microsoft IIS SMTP Service for LISTSERV Deliveries

Using the Microsoft IIS SMTP Service for LISTSERV Deliveries Whitepaper Using the Microsoft IIS SMTP Service for LISTSERV Deliveries May 10, 2011 Copyright 2010 L-Soft international, Inc. Information in this document is subject to change without notice. Companies,

More information

Performance Indicators For Web Sites

Performance Indicators For Web Sites Performance Indicators For Web Sites Brian Kelly UKOLN University of Bath Bath, BA2 7AY Email: B.Kelly@ukoln.ac.uk URL: http://www.ukoln.ac.uk/ Aims of of Talk: To To explain why why we we need performance

More information

Web Usage Mining: Identification of Trends Followed by the user through Neural Network

Web Usage Mining: Identification of Trends Followed by the user through Neural Network International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web

More information

How To Analyze Web Server Log Files, Log Files And Log Files Of A Website With A Web Mining Tool

How To Analyze Web Server Log Files, Log Files And Log Files Of A Website With A Web Mining Tool International Journal of Advanced Computer and Mathematical Sciences ISSN 2230-9624. Vol 4, Issue 1, 2013, pp1-8 http://bipublication.com ANALYSIS OF WEB SERVER LOG FILES TO INCREASE THE EFFECTIVENESS

More information

Periodic Web Personalization for Meta Search Engine

Periodic Web Personalization for Meta Search Engine ISSN : 0976-8491(Online) ISSN : 2229-4333(Print) Abstract In this paper we propose a unique approach to integrate Meta search engine to build web personalization. Our approach makes the web personalization

More information

LogLogic Blue Coat ProxySG Log Configuration Guide

LogLogic Blue Coat ProxySG Log Configuration Guide LogLogic Blue Coat ProxySG Log Configuration Guide Document Release: September 2011 Part Number: LL600012-00ELS100001 This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic

More information

Web Usage Mining: A Survey on Pattern Extraction from Web Logs

Web Usage Mining: A Survey on Pattern Extraction from Web Logs Web Usage Mining: A Survey on Pattern Extraction from Web Logs 1 S. K. Pani,, 2 L. Panigrahy, 2 V.H.Sankar, 3 Bikram Keshari Ratha, 2 A.K.Mandal, 2 S.K.Padhi 1 P.G. Department Of Computer Science, RCMA;

More information

A Survey on Web Mining From Web Server Log

A Survey on Web Mining From Web Server Log A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering

More information

Logs. Log File Management APPENDIX

Logs. Log File Management APPENDIX APPENDIX A This appendix describes the logs generated by the application appliance servers and other related topics. Log File Management, page A-1 FgnStatLog, page A-2 Error_log, page A-7 Access_log, page

More information

Chapter VIII A Review of Methodologies for Analyzing Websites

Chapter VIII A Review of Methodologies for Analyzing Websites 141 Chapter VIII A Review of Methodologies for Analyzing Websites Danielle Booth Pennsylvania State University, USA Bernard J. Jansen Pennsylvania State University, USA Abstract This chapter is an overview

More information

Chapter 12: Web Usage Mining

Chapter 12: Web Usage Mining Chapter 12: Web Usage Mining By Bamshad Mobasher With the continued growth and proliferation of e-commerce, Web services, and Web-based information systems, the volumes of clickstream and user data collected

More information

Implementation of a New Approach to Mine Web Log Data Using Mater Web Log Analyzer

Implementation of a New Approach to Mine Web Log Data Using Mater Web Log Analyzer Implementation of a New Approach to Mine Web Log Data Using Mater Web Log Analyzer Mahadev Yadav 1, Prof. Arvind Upadhyay 2 1,2 Computer Science and Engineering, IES IPS Academy, Indore India Abstract

More information

Copyright 2006-2011 Winfrasoft Corporation. All rights reserved.

Copyright 2006-2011 Winfrasoft Corporation. All rights reserved. Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For logging support to Microsoft Internet Information Server 6.0 & 7.0 Published: January 2013 Applies to: Winfrasoft

More information

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR

More information

PoSHServer Documentation AUTHOR: YUSUF OZTURK (MVP) http://www.poshserver.net

PoSHServer Documentation AUTHOR: YUSUF OZTURK (MVP) http://www.poshserver.net 2013 PoSHServer Documentation AUTHOR: YUSUF OZTURK (MVP) http://www.poshserver.net Contents Introduction... 2 Installation... 2 How to start PoSHServer?... 5 How to run PoSHServer jobs with different user

More information

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector for Blue Coat Proxy Quick Reference The software described in this book is furnished under a license agreement

More information

Generalization of Web Log Datas Using WUM Technique

Generalization of Web Log Datas Using WUM Technique Generalization of Web Log Datas Using WUM Technique 1 M. SARAVANAN, 2 B. VALARAMATHI, 1 Final Year M. E. Student, 2 Professor & Head Department of Computer Science and Engineering SKP Engineering College,

More information

Web Miner: A Tool for Discovery of Usage Patterns From Web Data

Web Miner: A Tool for Discovery of Usage Patterns From Web Data Web Miner: A Tool for Discovery of Usage Patterns From Web Data Roop Ranjan Student, Department of Computer Science (FMIT), Jamia Hamdard, Hamdard Nagar, New Delhi, 110062, India roop.ranjan@gmail.com

More information

Guide to Analyzing Feedback from Web Trends

Guide to Analyzing Feedback from Web Trends Guide to Analyzing Feedback from Web Trends Where to find the figures to include in the report How many times was the site visited? (General Statistics) What dates and times had peak amounts of traffic?

More information

WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS

WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation biswajit.biswal@oracle.com ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development

More information

Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm

Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 5 (March 2013) PP: 16-21 Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm

More information

ANALYSIS OF WEB SERVER LOG BY WEB USAGE MINING FOR EXTRACTING USERS PATTERNS

ANALYSIS OF WEB SERVER LOG BY WEB USAGE MINING FOR EXTRACTING USERS PATTERNS International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN 2249-6831 Vol. 3, Issue 2, Jun 2013, 123-136 TJPRC Pvt. Ltd. ANALYSIS OF WEB SERVER LOG BY WEB

More information

Effective User Navigation in Dynamic Website

Effective User Navigation in Dynamic Website Effective User Navigation in Dynamic Website Ms.S.Nithya Assistant Professor, Department of Information Technology Christ College of Engineering and Technology Puducherry, India Ms.K.Durga,Ms.A.Preeti,Ms.V.Saranya

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

ABSTRACT The World MINING 1.2.1 1.2.2. R. Vasudevan. Trichy. Page 9. usage mining. basic. processing. Web usage mining. Web. useful information

ABSTRACT The World MINING 1.2.1 1.2.2. R. Vasudevan. Trichy. Page 9. usage mining. basic. processing. Web usage mining. Web. useful information SSRG International Journal of Electronics and Communication Engineering (SSRG IJECE) volume 1 Issue 1 Feb Neural Networks and Web Mining R. Vasudevan Dept of ECE, M. A.M Engineering College Trichy. ABSTRACT

More information

Identifying System Errors through Web Server Log Files in Web Log Mining

Identifying System Errors through Web Server Log Files in Web Log Mining Identifying System Errors through Web Server Log Files in Web Log Mining 1 Arjun Ram Meghwal, 2 Dr. Arvind K Sharma 1 Ph.D CSE Scholar, Career Point University, Kota, Rajasthan, India 2 Research Supervisor,

More information

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet

More information

Abstract. 2.1 Web log file data

Abstract. 2.1 Web log file data Use Of Web Log File For Web Usage Mining Savita Devidas Patil Assistant Professor Department of Computer Engineering SSVPS s B.S.Deore College of Engineering Dhule, INDIA Abstract Many web page designers

More information

V.Chitraa Lecturer CMS College of Science and Commerce Coimbatore, Tamilnadu, India vchit2003@yahoo.co.in

V.Chitraa Lecturer CMS College of Science and Commerce Coimbatore, Tamilnadu, India vchit2003@yahoo.co.in (IJCSIS) International Journal of Computer Science and Information Security, A Survey on Preprocessing Methods for Web Usage Data V.Chitraa Lecturer CMS College of Science and Commerce Coimbatore, Tamilnadu,

More information

ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING

ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING International Journal of Science, Environment and Technology, Vol. 2, No 5, 2013, 1008 1016 ISSN 2278-3687 (O) ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING 1 V. Jayakumar and 2 Dr.

More information

WEB LOG PREPROCESSING BASED ON PARTIAL ANCESTRAL GRAPH TECHNIQUE FOR SESSION CONSTRUCTION

WEB LOG PREPROCESSING BASED ON PARTIAL ANCESTRAL GRAPH TECHNIQUE FOR SESSION CONSTRUCTION WEB LOG PREPROCESSING BASED ON PARTIAL ANCESTRAL GRAPH TECHNIQUE FOR SESSION CONSTRUCTION S.Chitra 1, Dr.B.Kalpana 2 1 Assistant Professor, Postgraduate and Research Department of Computer Science, Government

More information

User Behavior Analysis from Web Log using Log Analyzer Tool

User Behavior Analysis from Web Log using Log Analyzer Tool User Behavior Analysis from Web Log using Log Analyzer Tool A.Brijesh Bakariya, B.Ghanshyam Singh Thakur Department of Computer Application, Maulana Azad National Institute of Technology, Bhopal, India

More information

Improving Privacy in Web Mining by eliminating Noisy data & Sessionization

Improving Privacy in Web Mining by eliminating Noisy data & Sessionization Improving Privacy in Web Mining by eliminating Noisy data & Sessionization Rekha Garhwal Computer Science Department Om Institute of Technology & Management, Hisar, Haryana, India Abstract: data mining

More information

A Study of Web Log Analysis Using Clustering Techniques

A Study of Web Log Analysis Using Clustering Techniques A Study of Web Log Analysis Using Clustering Techniques Hemanshu Rana 1, Mayank Patel 2 Assistant Professor, Dept of CSE, M.G Institute of Technical Education, Gujarat India 1 Assistant Professor, Dept

More information

A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors

A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors S. Bhuvaneswari P.G Student, Department of CSE, A.V.C College of Engineering, Mayiladuthurai, TN, India. bhuvanacse8@gmail.com

More information

Configuring Web services

Configuring Web services Configuring Web services (Week 13, Tuesday 11/14/2006) Abdou Illia, Fall 2006 1 Learning Objectives Install Internet Information Services programs Configure FTP sites Configure Web sites 70-216:8 @0-13:16/28:39

More information

E-CRM and Web Mining. Objectives, Application Fields and Process of Web Usage Mining for Online Customer Relationship Management.

E-CRM and Web Mining. Objectives, Application Fields and Process of Web Usage Mining for Online Customer Relationship Management. University of Fribourg, Switzerland Department of Computer Science Information Systems Research Group Seminar Online CRM, 2005 Prof. Dr. Andreas Meier E-CRM and Web Mining. Objectives, Application Fields

More information

ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING

ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING ISTANBUL UNIVERSITY JOURNAL OF ELECTRICAL & ELECTRONICS ENGINEERING YEAR VOLUME NUMBER : 2007 : 7 : 2 (379-386) ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING

More information

Analysis of Requirement & Performance Factors of Business Intelligence Through Web Mining

Analysis of Requirement & Performance Factors of Business Intelligence Through Web Mining Analysis of Requirement & Performance Factors of Business Intelligence Through Web Mining Abstract: The world wide web is a popular and interactive medium to distribute information in the era. The web

More information

Pg. 1/20 OVERVIEW... 2 Auto Report Requirements... 4 General SMTP Email Requirements... 4 STMP Service Requirements... 4 TROUBLESHOOTING: SMTP

Pg. 1/20 OVERVIEW... 2 Auto Report Requirements... 4 General SMTP Email Requirements... 4 STMP Service Requirements... 4 TROUBLESHOOTING: SMTP Pg. 1/20 OVERVIEW... 2 Auto Report Requirements... 4 General SMTP Email Requirements... 4 STMP Service Requirements... 4 TROUBLESHOOTING: SMTP EMAIL... 5 CONFIRM CONFIGURATION & REQUIREMENTS... 5 Accessing

More information

v6.1 Websense Enterprise Reporting Administrator s Guide

v6.1 Websense Enterprise Reporting Administrator s Guide v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,

More information

Digital media glossary

Digital media glossary A Ad banner A graphic message or other media used as an advertisement. Ad impression An ad which is served to a user s browser. Ad impression ratio Click-throughs divided by ad impressions. B Banner A

More information

Network Technologies

Network Technologies Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:

More information

Using Web Statistics:

Using Web Statistics: Using Web Statistics: 2003 HIPnet IT Conference Breakout 3, June 17 th Camille Haylock, Web Designer Constella Health Sciences Overview Web Server Log Analysis Tools Interpretation of Statistics Frequently

More information

Bisecting K-Means for Clustering Web Log data

Bisecting K-Means for Clustering Web Log data Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining

More information

CDN Operation Manual

CDN Operation Manual NTT Communications Cloudⁿ CDN Operation Manual Ver.1.1 Please refrain from secondary use such as distributing, reproducing, and transferring this document. 1 Version Number Edited on Revisions Ver.1.0

More information

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey 1 Google Analytics for Robust Website Analytics Deepika Verma, Depanwita Seal, Atul Pandey 2 Table of Contents I. INTRODUCTION...3 II. Method for obtaining data for web analysis...3 III. Types of metrics

More information

Users Interest Correlation through Web Log Mining

Users Interest Correlation through Web Log Mining Users Interest Correlation through Web Log Mining F. Tao, P. Contreras, B. Pauer, T. Taskaya and F. Murtagh School of Computer Science, the Queen s University of Belfast; DIW-Berlin Abstract When more

More information

graphical Systems for Website Design

graphical Systems for Website Design 2005 Linux Web Host. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication may be reproduced,

More information

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2. IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft

More information

A Study of Web Traffic Analysis

A Study of Web Traffic Analysis Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Web Usage Mining. from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher

Web Usage Mining. from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher Web Usage Mining from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher Many slides are from a tutorial given by B. Berendt, B. Mobasher,

More information

VOL. 3, NO. 7, July 2013 ISSN 2225-7217 ARPN Journal of Science and Technology 2011-2012. All rights reserved.

VOL. 3, NO. 7, July 2013 ISSN 2225-7217 ARPN Journal of Science and Technology 2011-2012. All rights reserved. An Effective Web Usage Analysis using Fuzzy Clustering 1 P.Nithya, 2 P.Sumathi 1 Doctoral student in Computer Science, Manonmanaiam Sundaranar University, Tirunelveli 2 Assistant Professor, PG & Research

More information

Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it

Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination

Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination 8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,

More information

Web Mining Functions in an Academic Search Application

Web Mining Functions in an Academic Search Application 132 Informatica Economică vol. 13, no. 3/2009 Web Mining Functions in an Academic Search Application Jeyalatha SIVARAMAKRISHNAN, Vijayakumar BALAKRISHNAN Faculty of Computer Science and Engineering, BITS

More information

End User Guide The guide for email/ftp account owner

End User Guide The guide for email/ftp account owner End User Guide The guide for email/ftp account owner ServerDirector Version 3.7 Table Of Contents Introduction...1 Logging In...1 Logging Out...3 Installing SSL License...3 System Requirements...4 Navigating...4

More information

LogLogic Blue Coat ProxySG Syslog Log Configuration Guide

LogLogic Blue Coat ProxySG Syslog Log Configuration Guide LogLogic Blue Coat ProxySG Syslog Log Configuration Guide Document Release: September 2011 Part Number: LL600070-00ELS100000 This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic

More information