DOI QR코드

DOI QR Code

Web Server Log Visualization

  • Kim, Jungkee (Department of Glocal IT, Sungkonghoe University)
  • Received : 2018.10.08
  • Accepted : 2018.10.21
  • Published : 2018.12.31

Abstract

Visitors to a Web site leave access logs documenting their activity in the site. These access logs provide a valuable source of information about the visitors' access patterns in the Web site. In addition to the pages that the user visited, it is generally possible to discover the geographical locations of the visitors. Web servers also records other information such as the entry into the site, the URL, the used operating system and the browser, etc. There are several Web mining techniques to extract useful information from such information and visualization of a Web log is one of those techniques. This paper presents a technique as well as a case a study of visualizing a Web log.

Keywords

OTNBCL_2018_v7n4_101_f0001.png 이미지

Figure 1. Preparation chart on the Web log analysis

OTNBCL_2018_v7n4_101_f0002.png 이미지

Figure 2. Three dimensional graphs of a day access

OTNBCL_2018_v7n4_101_f0003.png 이미지

Figure 3. Two dimensional graph between access time and remote hosts

OTNBCL_2018_v7n4_101_f0004.png 이미지

Figure 4. Two dimensional graph between access time and access pages

Table 1. Types of Web Server Logs [8]

OTNBCL_2018_v7n4_101_t0001.png 이미지

Table 2. HTTP/1.0 server status codes

OTNBCL_2018_v7n4_101_t0002.png 이미지

References

  1. J. Tolle, "Transactional log analysis: Online catalogs," in Proc. 6th annual international ACM SIGIR conference on Research and development in information retrieval, SIGIR'83. ACM, New York: Association for Computing Machinery, pp 147-160, 1983.
  2. B. J. Jansen and U. Pooch, "Web user studies: A review and framework for future work," Journal of the American Society of Information Science and Technology, 52(3), pp. 235-246, 2001. https://doi.org/10.1002/1097-4571(2000)9999:9999<::AID-ASI1607>3.0.CO;2-F
  3. M. Agosti and GM Di Nunzio, "Gathering and mining information from web log files," in Lecture notes in computer science, vol. 4877. Springer, pp 104-113, 2007.
  4. S. Park, J. H. Lee, and H. J. Bae, "End user searching: A Web log analysis of NAVER, a Korean Web search engine," The Journal of Library & information science research, Elsevier, Vol. 27, pp. 203-221, 2005. https://doi.org/10.1016/j.lisr.2005.01.013
  5. K. R. Suneetha and R. Krishnamoorthi, "Identifying user behavior by analyzing web server access log file," International Journal of Computer Science and Network Security, Vol. 9(4), pp. 327-332, 2009.
  6. N. Goel and C. K. Jha, "Analyzing users behavior from web access logs using automated log analyzer tool," International Journal of Computer Applications, vol. 62(2), pp. 29-33, 2013. https://doi.org/10.5120/10054-4643
  7. W3C, "Logging control," http://www.w3.org/Daemon/User/Config/Logging.html.
  8. T. A. Al-Asadi and A. J. Obaid, "Discovering similar user navigation behavior in web log data," International Journal of Applied Engineering Research, 11(16), pp. 8797-8805, 2016.
  9. B. J. Jansen, "Search log analysis: What it is, what's been done, how to do it," Library & Information Science Research, Vol. 28, pp. 407-432, 2006. https://doi.org/10.1016/j.lisr.2006.06.005
  10. Syracuse University, Northeast Parallel Architecture Center, http://surface.syr.edu/npac/.
  11. B. Ki and S. Klasky, "Scivis," Concurrency: Practice and Experience, Vol. 10, pp. 1107-1115, 1998. https://doi.org/10.1002/(SICI)1096-9128(199809/11)10:11/13<1107::AID-CPE417>3.0.CO;2-K