DETECTION OF CYBER CRIME BY DATA MINING TECHNIQUE

Authors

  • Prof. Rukaiya Shaikh Department of Computer Engineering, Al-Ameen College of Engineering, Koregaon Bhima, Pune, India
  • Aman Memon Department of Computer Engineering, Al-Ameen College of Engineering, Koregaon Bhima, Pune, India
  • Manoj Kumar Department of Computer Engineering, Al-Ameen College of Engineering, Koregaon Bhima, Pune, India
  • Ismaeil Pathan Department of Computer Engineering, Al-Ameen College of Engineering, Koregaon Bhima, Pune, India

Keywords:

Cyber Crime, Data Mining, Data Collection, Denial of Service, SQL Injection attack, U2R attack, Log File, Data mining techniques

Abstract

This Nowadays internet is accessed by number of peoples all over the world. The client and server
communicates with each other by exchanging messages among each other. The activity of exchanging can be observed
by Log files. Log files include the detailed description of activities that occur over internet. It shows the IP address,
login and logout durations, etc. There are many attacks that occur over internet but our focus is on the Dos attack.
The Denial of Service attack is identified by one of Data mining technique called pattern recognition. DoS attack is one
of the dangerous attack which overload the server by sending multiple messages or requests from unknown users. We
have built a system in which DoS attack is detected and described under this paper.

Published

2018-05-25

How to Cite

DETECTION OF CYBER CRIME BY DATA MINING TECHNIQUE. (2018). International Journal of Advance Engineering and Research Development (IJAERD), 5(5), 510-514. https://ijaerd.org/index.php/IJAERD/article/view/3464

Similar Articles

1-10 of 2577

You may also start an advanced similarity search for this article.