Hosting Customer Clustering Based On Log Web Server Using K-Means Algorithm
Keywords:Data Mining, Clustering, Hosting Customer K-Means Algorithm, Log Web Server,
AbstractTo compete in global industries, a company must have a good business strategy. Especially for domain and hosting company that has many competitors there. The business strategy could be found with hosting customer behavior based on log web server analytics. The most important log web server associated with customer access is recorded in the access.log file. Potential customers were read from access activity in the form of request method /pesan on access.log. One of popular method for data mining from log server is Clustering with K-Means Algorithm. This algorithm was chosen because K-Means has a fast execution time, easy to implement, and good for a big numeric data. The evaluation technique determining the optimal value of K is used Elbow Method and the Calinski Harabasz Index. K-Means algorithm can be used to determine the pattern of hosting customers based log web server. The results of this research indicate that the clustering process based on web server log with K-Means Algorithm can be used to know the pattern of customer hosting. There are total 5 clusters for data by week and data access time. The pattern of hosting customers that are formed in ordering a succession of clusters 1,2,3,4,0. The most ordered areas are Jakarta in cluster 1, Bandung Semarang, Surabaya on cluster 2 and Medan, Tangerang, Malang, Yogyakarta on cluster 3. The frequency of booking is mostly done at the beginning of the month at 12.00 - 23.59. This customer behavior could be a reference to know the best business strategy to expand the marketing in cluster 4 and 0 and help any other stakeholder for making some policy to develop the company.
How to Cite
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.