An Approach for BOT NET in Data Mining

Authors

  • Nirmala HG Dept. of Computer Applications, Dayananda Sagar College of Arts, Science and Commerce, Bangalore, India
  • Thakur DK Dept. of Computer Applications, Dayananda Sagar College of Arts, Science and Commerce, Bangalore, India
  • Kundu A Dept. of Computer Applications, Dayananda Sagar College of Arts, Science and Commerce, Bangalore, India
  • Paul A Dept. of Computer Applications, Dayananda Sagar College of Arts, Science and Commerce, Bangalore, India
  • Gurunath R Dept. of Computer Applications, Dayananda Sagar College of Arts, Science and Commerce, Bangalore, India

DOI:

https://doi.org/10.26438/ijcse/v6i9.638641

Keywords:

BOT NET, Ad Fraud, Methbot, botmaster

Abstract

In this research work, we are trying to focus the need of protecting the big amount of data using BOT NET. Here data mining means extracting some important data from the information house. The data mining process results in instances and learning whereas the coal or valuable stone mining result in coal or jewel.

References

K. Lee, J. Caverlee, S. Webb, "Uncovering social spammers: social honeypots+ machine learning", Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, pp. 435-442, 2010.

B. Perozzi, R. Al-Rfou, S. Skiena, "Deepwalk: Online learning of social representations", Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 701-710, 2014.

E. Ferrara, O. Varol, C. Davis, F. Menczer, A. Flammini, The rise of social bots, 2014.

M Paul , G Sanyal , Debabrata Samanta, Gia Nhu Nguyen ; Dac-Nhuong Le, Admission Control Algorithm Based-on Effective Bandwidth in V2I Communication, IET Communications, 10 pp.DOI: 10.1049/iet-com.2017.0825 , Online ISSN 1751-8636.

M Paul , Debabrata Samanta, and G Sanyal,” Dynamic job Scheduling in Cloud Computing based on horizontal load balancing”, International Journal of Computer Technology and Applications (IJCTA) , Vol. 2 (5), pp. 1552-1556, 2011, ISSN: 2229-6093.

Manoj Mukherjee, Titan Paul, Debabrata Samanta,” Detection of damaged paddy leaf detection using image processing”, Journal of Global Research in Computer Science (JGRCS), pp.7-10, Volume 3, No. 10, October 2012, ISSN: 2229-371X.

Debabrata Samanta, M Paul and G Sanyal , ”Segmentation Technique of SAR Imagery using Entropy”, International Journal of Computer Technology and Applications (IJCTA) , Vol. 2 (5), pp.1548-1551, 2011,ISSN: 2229-6093.

Debabrata Samanta and G Sanyal, Development of Edge Detection Technique for Images using Adaptive Thresholding, Proc. of Fifth International Conference on Information Processing (ICIP-2011), CCIS 157, pp. 671-676, 5-7 Aug.2011. @ Springer-Verlag Berlin Heidelberg.

Syed K A Khadri,, Debabrata Samanta, and M Paul, "Approach of Message Communication Using Fibonacci Series: In Cryptology", Lecture Notes on Information Theory, Vol. 2, No. 2, pp. 168-171, June 2014. doi: 10.12720/lnit.2.2.168-171.

Debabrata Samanta, Prajna Paramita Chaudhury, Arya Ghosh ,” Scab Diseases Detection of Potato using Image Processing” , International Journal of Computer Trends and Technology (IJCTT) , pp. 109-113 , Jan – 2012 Volume no 3 Issue1. ISSN: 2231-2803.

Anna-senpai. [FREE] world’s largest net:Mirai botnet, client,echo loader, CNC source code release. https://hackforums.net/showthread.php?tid=5420472.

M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster.Building a dynamic reputation system for DNS. In 19th USENIXSecurity Symposium, 2010.

M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. AbuNimeh, W. Lee, and D. Dagon. From throw-away traffic to bots:Detecting the rise of DGA-based malware. In 21st USENIX SecuritySymposium, 2012.

Arbor Networks. Worldwide infrastructure security report.https://www.arbornetworks.com/images/documents/WISR2016_EN_Web.pdf.

H. Asghari, M. Ciere, and M. J. G. Van Eeten. Post-mortem ofa zombie: Conficker cleanup after six years. In 24th USENIXSecurity Symposium, 2015.

Downloads

Published

2025-11-15
CITATION
DOI: 10.26438/ijcse/v6i9.638641
Published: 2025-11-15

How to Cite

[1]
H. Nirmala, D. K. Thakur, A. Kundu, A. Paul, and R. Gurunath, “An Approach for BOT NET in Data Mining”, Int. J. Comp. Sci. Eng., vol. 6, no. 9, pp. 638–641, Nov. 2025.