DDOS Attack Detection Using Data Mining Technique
                                  
                                                                  Shreshtha  Jha
                               B Tech Final Year, Department of Computer Science, VIT University, Vellore
                              
                                                                
                                  
                                 
                                  
                                  
                                  
                                      
                                      7-15
                                      
                                      Vol: 9, Issue: 1, 2019
                                      
                                      
                                   
                                  
                                  
                                      Receiving Date:
                                      2018-11-23
                                      Acceptance Date:
                                      2019-01-10
                                      Publication Date: 
                                      2019-01-19
                                      
                                      
                                   
                                  
                                                                           Download PDF 
                                                                            
                                                                          
                                    
                                
                                Abstract
                                  
                                      
                                        Cyber Crime is a computerized wrongdoing relating to something that ought to be conceivable on the web and isn't lawful. Bad behavior related to something that is done unlawfully or without endorsement. Every last one of those infringements that are done on the web to get to secured information or endorsement rights is named as ''Cyber Crime''. All around the computerized bad behavior anticipation is spread transversely finished generously. Data figuring underlines the extraction of data from databases and diverse cases can be done up for surmising connection rules. Notwithstanding the way that Data preparing is over the long haul grabbing an all the all the more encompassing degree in different districts, its examination has made awesome importance in Cyber Crimes.                                      
                                      
                                      
                                                                                
                                           
                                               Keywords:
                                        Cyber Attack; Cyber Crimes; Data mining; Data Analysis; Machine Learning; DDOS; IP based Computing; I-Security; Thread Detection                                      
                                          
                                                                                
                                    
                                    
                                   
                                  References
                                   
                                                               
                                  
                                  - Cheww M., Nayikder S., (2015) How Journal of Scientific and Research Publications 5(1).
 
                                  
                             
                              
                                                           
                                  
                                  - Adnirora A., Shaikh H., (2017), Privacy in Online Social Networks (OSNs), International Journal of Advanced Research in Computer Science and Software Engineering 3(5) 
 
                                  
                             
                              
                                                           
                                  
                                  - Adnirora A., Shaikh H., (2017), Privacy in Online Social Networks (OSNs), International Journal of Advanced Research in Computer Science and Software Engineering 3(5) 
 
                                  
                             
                              
                                                           
                                  
                                  - Mana A., Babloo S. (2012), San intelligent analysis of a city crime data using data mining, International conference information electronic engineering 6.
 
                                  
                             
                              
                                                           
                                  
                                  - Kumar A.M., Sharma B.N., Shrivastava S.K., (2015), Online Social Networks: Privacy Challenges and Proposed Security Framework for Facebook, International Journal of Soft Computing and Engineering 4(1).
 
                                  
                             
                              
                                                           
                                  
                                  - Hosseinkhani J., Ibrahim S., Chuprat S., Naniz J.H., (2013), Web Crime Mining by Means of Data Mining Techniques, Research Journal of Applied Sciences, Engineering & Technology 7(10) 2027-2032.
 
                                  
                             
                              
                                                           
                                  
                                  - Liu Y., Gummadi K.P., Krishnamurthy B., Mislove A., (2011), Analyzing Facebook privacy settings: user expectations vs. reality, Proceedings of the ACM SIGCOMM conference on Internet measurement conference, 61-70. 
 
                                  
                             
                              
                                                           
                                  
                                  - Tollenaar N., van der Heijden P.G.M., (2013), Which method predicts recidivism a comparison of statistical, machine learning and data mining predictive models, Journal of the Royal Statistical Society: Series A (Statistics in Society) 176(2), 565–584. 
 
                                  
                             
                              
                                                           
                                  
                                  - Conti M., Poovendran R., Secchiero M., (2012), Fakebook: Detecting fake profiles in on-line social networks, Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 1071–1078. 
 
                                  
                             
                              
                                                           
                                  
                                  - Zope A.R., Vidhate A., Harale N., (2013), Data Mining Approach in Security Information and Event Management, International Journal of Future Computer and Communication 2(2)
 
                                  
                             
                              
                                                           
                                  
                                  - P. Mell and T. Grance, The NIST Definition of Cloud Computing Version 15, Nat’l Inst. of Standards and Technology, Information Technology 
 
                                  
                             
                              
                                                           
                                  
                                  - Seong Min Yoo, Pyunnng Park, Jini Seop Shin, Jin oh, Ho Yong Rya, Jae Cheol Ryou. (2013), User-Centric Key Management Scheme for Personal Cloud Storage, IEEE 
 
                                  
                             
                              
                                                           
                                  
                                  - Wu Suyan, Li wenbo and Hu Xiangyi. (2009), Study of Digital Signature with Encryption Based on Combined Symmetric Key, IEEE. 
 
                                  
                             
                              
                                                           
                                  
                                  - Deepti Chatterjee, Navdeep Dasgupta and Asoke Nath (2012), A new A-Symmetric Cryptography Algorithm using extended DSA method: IEEE
 
                                  
                             
                              
                                                                 
                                    Back