Open Access   Article Go Back

An Approach for BOT NET in Data Mining

Nirmala H.G.1 , Dhruv Kumar Thakur2 , Ananya Kundu3 , Abhishek Paul4 , Gurunath R5

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 638-641, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.638641

Online published on Sep 30, 2018

Copyright © Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R, “An Approach for BOT NET in Data Mining,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.638-641, 2018.

MLA Style Citation: Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R "An Approach for BOT NET in Data Mining." International Journal of Computer Sciences and Engineering 6.9 (2018): 638-641.

APA Style Citation: Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R, (2018). An Approach for BOT NET in Data Mining. International Journal of Computer Sciences and Engineering, 6(9), 638-641.

BibTex Style Citation:
@article{H.G._2018,
author = {Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R},
title = {An Approach for BOT NET in Data Mining},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {638-641},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2920},
doi = {https://doi.org/10.26438/ijcse/v6i9.638641}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.638641}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2920
TI - An Approach for BOT NET in Data Mining
T2 - International Journal of Computer Sciences and Engineering
AU - Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 638-641
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
807 289 downloads 223 downloads
  
  
           

Abstract

In this research work, we are trying to focus the need of protecting the big amount of data using BOT NET. Here data mining means extracting some important data from the information house. The data mining process results in instances and learning whereas the coal or valuable stone mining result in coal or jewel.

Key-Words / Index Term

BOT NET, Ad Fraud, Methbot, botmaster

References

[1] K. Lee, J. Caverlee, S. Webb, "Uncovering social spammers: social honeypots+ machine learning", Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, pp. 435-442, 2010.
[2] B. Perozzi, R. Al-Rfou, S. Skiena, "Deepwalk: Online learning of social representations", Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 701-710, 2014.
[3] E. Ferrara, O. Varol, C. Davis, F. Menczer, A. Flammini, The rise of social bots, 2014.
[4] M Paul , G Sanyal , Debabrata Samanta, Gia Nhu Nguyen ; Dac-Nhuong Le, Admission Control Algorithm Based-on Effective Bandwidth in V2I Communication, IET Communications, 10 pp.DOI: 10.1049/iet-com.2017.0825 , Online ISSN 1751-8636.
[5] M Paul , Debabrata Samanta, and G Sanyal,” Dynamic job Scheduling in Cloud Computing based on horizontal load balancing”, International Journal of Computer Technology and Applications (IJCTA) , Vol. 2 (5), pp. 1552-1556, 2011, ISSN: 2229-6093.
[6] Manoj Mukherjee, Titan Paul, Debabrata Samanta,” Detection of damaged paddy leaf detection using image processing”, Journal of Global Research in Computer Science (JGRCS), pp.7-10, Volume 3, No. 10, October 2012, ISSN: 2229-371X.
[7] Debabrata Samanta, M Paul and G Sanyal , ”Segmentation Technique of SAR Imagery using Entropy”, International Journal of Computer Technology and Applications (IJCTA) , Vol. 2 (5), pp.1548-1551, 2011,ISSN: 2229-6093.
[8] Debabrata Samanta and G Sanyal, Development of Edge Detection Technique for Images using Adaptive Thresholding, Proc. of Fifth International Conference on Information Processing (ICIP-2011), CCIS 157, pp. 671-676, 5-7 Aug.2011. @ Springer-Verlag Berlin Heidelberg.
[9] Syed K A Khadri,, Debabrata Samanta, and M Paul, "Approach of Message Communication Using Fibonacci Series: In Cryptology", Lecture Notes on Information Theory, Vol. 2, No. 2, pp. 168-171, June 2014. doi: 10.12720/lnit.2.2.168-171.
[10] Debabrata Samanta, Prajna Paramita Chaudhury, Arya Ghosh ,” Scab Diseases Detection of Potato using Image Processing” , International Journal of Computer Trends and Technology (IJCTT) , pp. 109-113 , Jan – 2012 Volume no 3 Issue1. ISSN: 2231-2803.
[11] Anna-senpai. [FREE] world’s largest net:Mirai botnet, client,echo loader, CNC source code release. https://hackforums.net/showthread.php?tid=5420472.
[12] M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster.Building a dynamic reputation system for DNS. In 19th USENIXSecurity Symposium, 2010.
[13] M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. AbuNimeh, W. Lee, and D. Dagon. From throw-away traffic to bots:Detecting the rise of DGA-based malware. In 21st USENIX SecuritySymposium, 2012.
[14] Arbor Networks. Worldwide infrastructure security report.https://www.arbornetworks.com/images/documents/WISR2016_EN_Web.pdf.
[15] H. Asghari, M. Ciere, and M. J. G. Van Eeten. Post-mortem ofa zombie: Conficker cleanup after six years. In 24th USENIXSecurity Symposium, 2015.