An Approach for BOT NET in Data Mining
Nirmala H.G.1 , Dhruv Kumar Thakur2 , Ananya Kundu3 , Abhishek Paul4 , Gurunath R5
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-9 , Page no. 638-641, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.638641
Online published on Sep 30, 2018
Copyright © Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R, “An Approach for BOT NET in Data Mining,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.638-641, 2018.
MLA Style Citation: Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R "An Approach for BOT NET in Data Mining." International Journal of Computer Sciences and Engineering 6.9 (2018): 638-641.
APA Style Citation: Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R, (2018). An Approach for BOT NET in Data Mining. International Journal of Computer Sciences and Engineering, 6(9), 638-641.
BibTex Style Citation:
@article{H.G._2018,
author = {Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R},
title = {An Approach for BOT NET in Data Mining},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {638-641},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2920},
doi = {https://doi.org/10.26438/ijcse/v6i9.638641}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.638641}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2920
TI - An Approach for BOT NET in Data Mining
T2 - International Journal of Computer Sciences and Engineering
AU - Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 638-641
IS - 9
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
807 | 289 downloads | 223 downloads |
Abstract
In this research work, we are trying to focus the need of protecting the big amount of data using BOT NET. Here data mining means extracting some important data from the information house. The data mining process results in instances and learning whereas the coal or valuable stone mining result in coal or jewel.
Key-Words / Index Term
BOT NET, Ad Fraud, Methbot, botmaster
References
[1] K. Lee, J. Caverlee, S. Webb, "Uncovering social spammers: social honeypots+ machine learning", Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, pp. 435-442, 2010.
[2] B. Perozzi, R. Al-Rfou, S. Skiena, "Deepwalk: Online learning of social representations", Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 701-710, 2014.
[3] E. Ferrara, O. Varol, C. Davis, F. Menczer, A. Flammini, The rise of social bots, 2014.
[4] M Paul , G Sanyal , Debabrata Samanta, Gia Nhu Nguyen ; Dac-Nhuong Le, Admission Control Algorithm Based-on Effective Bandwidth in V2I Communication, IET Communications, 10 pp.DOI: 10.1049/iet-com.2017.0825 , Online ISSN 1751-8636.
[5] M Paul , Debabrata Samanta, and G Sanyal,” Dynamic job Scheduling in Cloud Computing based on horizontal load balancing”, International Journal of Computer Technology and Applications (IJCTA) , Vol. 2 (5), pp. 1552-1556, 2011, ISSN: 2229-6093.
[6] Manoj Mukherjee, Titan Paul, Debabrata Samanta,” Detection of damaged paddy leaf detection using image processing”, Journal of Global Research in Computer Science (JGRCS), pp.7-10, Volume 3, No. 10, October 2012, ISSN: 2229-371X.
[7] Debabrata Samanta, M Paul and G Sanyal , ”Segmentation Technique of SAR Imagery using Entropy”, International Journal of Computer Technology and Applications (IJCTA) , Vol. 2 (5), pp.1548-1551, 2011,ISSN: 2229-6093.
[8] Debabrata Samanta and G Sanyal, Development of Edge Detection Technique for Images using Adaptive Thresholding, Proc. of Fifth International Conference on Information Processing (ICIP-2011), CCIS 157, pp. 671-676, 5-7 Aug.2011. @ Springer-Verlag Berlin Heidelberg.
[9] Syed K A Khadri,, Debabrata Samanta, and M Paul, "Approach of Message Communication Using Fibonacci Series: In Cryptology", Lecture Notes on Information Theory, Vol. 2, No. 2, pp. 168-171, June 2014. doi: 10.12720/lnit.2.2.168-171.
[10] Debabrata Samanta, Prajna Paramita Chaudhury, Arya Ghosh ,” Scab Diseases Detection of Potato using Image Processing” , International Journal of Computer Trends and Technology (IJCTT) , pp. 109-113 , Jan – 2012 Volume no 3 Issue1. ISSN: 2231-2803.
[11] Anna-senpai. [FREE] world’s largest net:Mirai botnet, client,echo loader, CNC source code release. https://hackforums.net/showthread.php?tid=5420472.
[12] M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster.Building a dynamic reputation system for DNS. In 19th USENIXSecurity Symposium, 2010.
[13] M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. AbuNimeh, W. Lee, and D. Dagon. From throw-away traffic to bots:Detecting the rise of DGA-based malware. In 21st USENIX SecuritySymposium, 2012.
[14] Arbor Networks. Worldwide infrastructure security report.https://www.arbornetworks.com/images/documents/WISR2016_EN_Web.pdf.
[15] H. Asghari, M. Ciere, and M. J. G. Van Eeten. Post-mortem ofa zombie: Conficker cleanup after six years. In 24th USENIXSecurity Symposium, 2015.