“…Dikaiakos and Stassopoulou Kumar, 2000, 2002) Tan and Kumer (Dikaiakos et al, 2003(Dikaiakos et al, , 2005Stassopoulou and Dikaiakos, 2006) Almeida et al (Almeida et al, 2001) Lourenco and Belo (Lourenco and Belo, 2006) They used most of the information included in the log including some variations on traffic patterns. In particular, they examined HTTP-traffic characteristics (e.g., methods, error codes, etc) as well as resource referencing behavior (e.g., file type, percentage of distinct requests, resource popularity, and concentration of requests, etc).…”