Analyzing Online Un-authorize Activity (Cyber Crime) Using Data Mining
Author(s):
Suraj Bharat Kokne, Ashwin Gautam Sonone, Ankush Ramrao Ade, Bhagyashri Pradeep Kedari, Prof. A. A. Bamanikar
Keywords:
Denial of Service, Log File, Cyber Crimes, Data mining, outliers, Association rules
Abstract
It is very important to maintain security of data and protect it from unauthorized or illegal access. Many intruders try to attack the systems by using different types of cyber attacks like Denial of Service (DoS), Brute force attack, Man-In-the-Middle attack etc. Our focus of research in this paper is Denial of Service (DoS) attacks with the help of pattern recognition techniques in data mining. Through which the Denial of Service attack is identified. When the client and server exchange messages among each other, there is an activity that can be observed in log files. Log files give a detailed description of the activities that occur in a network that shows the IP address, login and logout durations, the user’s behavior etc. In denial of service attack, IT resources of any organization are overloaded with imitation messages or multiple requests from unauthorized users. This system will try to apply pattern recognition technique on the data of user’s or organization’s log file.
Article Details
Unique Paper ID: 146352

Publication Volume & Issue: Volume 4, Issue 12

Page(s): 328 - 331
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews