Analyzing Online Un-authorize Activity (Cyber Crime) Using Data Mining

  • Unique Paper ID: 146352
  • PageNo: 328-331
  • Abstract:
  • It is very important to maintain security of data and protect it from unauthorized or illegal access. Many intruders try to attack the systems by using different types of cyber attacks like Denial of Service (DoS), Brute force attack, Man-In-the-Middle attack etc. Our focus of research in this paper is Denial of Service (DoS) attacks with the help of pattern recognition techniques in data mining. Through which the Denial of Service attack is identified. When the client and server exchange messages among each other, there is an activity that can be observed in log files. Log files give a detailed description of the activities that occur in a network that shows the IP address, login and logout durations, the user’s behavior etc. In denial of service attack, IT resources of any organization are overloaded with imitation messages or multiple requests from unauthorized users. This system will try to apply pattern recognition technique on the data of user’s or organization’s log file.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{146352,
        author = {Suraj Bharat Kokne and Ashwin Gautam Sonone and Ankush Ramrao Ade and Bhagyashri Pradeep Kedari and Prof. A. A. Bamanikar},
        title = {Analyzing Online Un-authorize Activity (Cyber Crime) Using Data Mining},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {4},
        number = {12},
        pages = {328-331},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=146352},
        abstract = {It is very important to maintain security of data and protect it from unauthorized or illegal access. Many intruders try to attack the systems by using different types of cyber attacks like Denial of Service (DoS), Brute force attack, Man-In-the-Middle attack etc. Our focus of research in this paper is Denial of Service (DoS) attacks with the help of pattern recognition techniques in data mining. Through which the Denial of Service attack is identified. When the client and server exchange messages among each other, there is an activity that can be observed in log files. Log files give a detailed description of the activities that occur in a network that shows the IP address, login and logout durations, the user’s behavior etc. In denial of service attack, IT resources of any organization are overloaded with imitation messages or multiple requests from unauthorized users. This system will try to apply pattern recognition technique on the data of user’s or organization’s log file.},
        keywords = {Denial of Service, Log File, Cyber Crimes, Data mining, outliers, Association rules},
        month = {},
        }

Cite This Article

Kokne, S. B., & Sonone, A. G., & Ade, A. R., & Kedari, B. P., & Bamanikar, P. A. A. (). Analyzing Online Un-authorize Activity (Cyber Crime) Using Data Mining. International Journal of Innovative Research in Technology (IJIRT), 4(12), 328–331.

Related Articles