International Journal of Computer Applications
These days, event logs contain immense amounts of knowledge that may simply overwhelm a personality's. Consequently, mining content from the phenomenon of logs is accepted as a crucial function for the system management. This paper presents a completely unique clump rule for log file information sets that helps one to sight frequent patterns from log files, to create log file profiles, and to spot abnormal log file lines. To attain this, clump tool is employed for playacting 2 phases. A military operation is finished on internet group action information. An analysis is finished on internet access log files to research the user group action behavior and user's log-in approach.