Details

DDOS Attack Detection Using Data Mining Technique

Shreshtha Jha

B Tech Final Year, Department of Computer Science, VIT University, Vellore

7-15

Vol: 9, Issue: 1, 2019

Receiving Date: 2018-11-23 Acceptance Date:

2019-01-10

Publication Date:

2019-01-19

Download PDF

Abstract

Cyber Crime is a computerized wrongdoing relating to something that ought to be conceivable on the web and isn't lawful. Bad behavior related to something that is done unlawfully or without endorsement. Every last one of those infringements that are done on the web to get to secured information or endorsement rights is named as ''Cyber Crime''. All around the computerized bad behavior anticipation is spread transversely finished generously. Data figuring underlines the extraction of data from databases and diverse cases can be done up for surmising connection rules. Notwithstanding the way that Data preparing is over the long haul grabbing an all the all the more encompassing degree in different districts, its examination has made awesome importance in Cyber Crimes.

Keywords: Cyber Attack; Cyber Crimes; Data mining; Data Analysis; Machine Learning; DDOS; IP based Computing; I-Security; Thread Detection

References

  1. Cheww M., Nayikder S., (2015) How Journal of Scientific and Research Publications 5(1).
  2. Adnirora A., Shaikh H., (2017), Privacy in Online Social Networks (OSNs), International Journal of Advanced Research in Computer Science and Software Engineering 3(5)
  3. Adnirora A., Shaikh H., (2017), Privacy in Online Social Networks (OSNs), International Journal of Advanced Research in Computer Science and Software Engineering 3(5)
  4. Mana A., Babloo S. (2012), San intelligent analysis of a city crime data using data mining, International conference information electronic engineering 6.
  5. Kumar A.M., Sharma B.N., Shrivastava S.K., (2015), Online Social Networks: Privacy Challenges and Proposed Security Framework for Facebook, International Journal of Soft Computing and Engineering 4(1).
  6. Hosseinkhani J., Ibrahim S., Chuprat S., Naniz J.H., (2013), Web Crime Mining by Means of Data Mining Techniques, Research Journal of Applied Sciences, Engineering & Technology 7(10) 2027-2032.
  7. Liu Y., Gummadi K.P., Krishnamurthy B., Mislove A., (2011), Analyzing Facebook privacy settings: user expectations vs. reality, Proceedings of the ACM SIGCOMM conference on Internet measurement conference, 61-70.
  8. Tollenaar N., van der Heijden P.G.M., (2013), Which method predicts recidivism a comparison of statistical, machine learning and data mining predictive models, Journal of the Royal Statistical Society: Series A (Statistics in Society) 176(2), 565–584.
  9. Conti M., Poovendran R., Secchiero M., (2012), Fakebook: Detecting fake profiles in on-line social networks, Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 1071–1078.
  10. Zope A.R., Vidhate A., Harale N., (2013), Data Mining Approach in Security Information and Event Management, International Journal of Future Computer and Communication 2(2)
  11. P. Mell and T. Grance, The NIST Definition of Cloud Computing Version 15, Nat’l Inst. of Standards and Technology, Information Technology
  12. Seong Min Yoo, Pyunnng Park, Jini Seop Shin, Jin oh, Ho Yong Rya, Jae Cheol Ryou. (2013), User-Centric Key Management Scheme for Personal Cloud Storage, IEEE
  13. Wu Suyan, Li wenbo and Hu Xiangyi. (2009), Study of Digital Signature with Encryption Based on Combined Symmetric Key, IEEE.
  14. Deepti Chatterjee, Navdeep Dasgupta and Asoke Nath (2012), A new A-Symmetric Cryptography Algorithm using extended DSA method: IEEE
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.

alexistogel toto online

bandar alexistogel

alexistogel bandar gacor

alexistogel link

alexistogel online

alexistogel bandar togel

link alternatif alexistogel

alexistogel

alexistogel

alexistogel

alexistogel daftar

alexistogel toto macau

alexistogel bandar macau

alexistogel slot

alexistogel agen slot

situs alexistogel

alexistogel

alexistogel

alexistogel

alexistogel

alexistogel bandar slot

alexistogel

Alexistogel Toto Macau

bandar alexistogel

slot alexistogel

alexistogel bandar togel

alexistogel

alexistogel slot

alexistogel

daftar alexistogel

alexistogel online

rtp alexistogel

alexistogel slot

alexistogel gacor

link alternatif alexistogel

alexistogel login

alexistogel

alexistogel slot dana

agen togel online

bandar togel online

alexistogel rtp

alexistogel slot

alexistogel daftar

slot online dana

situs slot online

alexistogel

bandar togel online

slot online terpercaya

togel slot online

agen slot online gacor

rtp live slot online

bandar slot online

bandar slot online gacor

agen slot online

daftar bandar togel slot

bandar togel online

togel slot hari ini

link alternatif togel slot

rtp slot online gacor

slot online gacor

alexistogel terpercaya

rtp slot gacor

slot online gacor

tips slot maxwin

togel slot gacor

prediksi togel

game slot gacor

trik slot online

prediksi togel jitu

game slot online

togel online terpercaya

daftar togel slot online

bandar togel terpercaya

slot online gacor

trik slot bonus

prediksi togel online

rtp slot online

panduan togel online

prediksi togel

RTP LIVE

Bandar Toto Macau

Situs Slot Gacor

bandarbola855 resmi

bandarbola855 gacor

bandarbola855 slot

link bandarbola855

bandarbola855 rtp

bandarbola855 link

bandarbola855 bandar

bandarbola855

bandarbola855 slot

bandarbola855 terpercaya

bandarbola855 slot

bandarbola855 daftar

bandarbola855 link

bandarbola855

bandarbola855

bandarbola855

iosbet

iosbet

link iosbet

slot online iosbet

iosbet link login

slot iosbet

iosbet gacor

iosbet

slot iosbet

agen iosbet

bandar iosbet

iosbet

iosbet link

iosbet

iosbet

iosbet

iosbet

liatogel

login liatogel

liatogel totomacau