A headway methodology for online web-based social network against cybercriminal mining

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Data mining is the way toward gathering information from various setting and condenses them into helpful data. Information mining can be utilized to decide the connection between inside elements and outside elements .It permits the clients to investigate, order and decides the connections deduced in them. Content mining as a rule alluded to as content information mining can be utilized be utilized to concentrate data from content. Content mining can be utilized as a part of data recovery, design acknowledgment and information mining systems. The presentation of online networking and interpersonal organizations has changed the open doors accessible for us as well as we should be careful about the dangers. Late explores demonstrate that the quantity of wrongdoings are expanding through online web-based social networking and they may bring about enormous misfortune to associations. Existing digital advancements are not viable to secure organizations. Existing mining techniques focus on dictionaries in which they can distinguish just a predetermined number of relations. Here a hereditary calculation approach is presented in which inert ideas can be removed. Hereditary Calculation is a straight pursuit which requires just little data from vast hunt zone.. At that point these ideas are subjected to separate the semantics which construes the comparing connections. Hereditary calculation gives a superior arrangement in which exactness and time effectiveness can be moved forward. The principle commitment of the paper demonstrates that they distinguish the relating cybercriminal systems.

  • Keywords

    Cybercriminal; Information Mining; Social Network.

  • References

      [1] R. Xia, C. Zong, X.Hu and E.Cambria,Feature ensemble plus samples selection:A comprehensive approach to domain adaptation for sentiment classification ,IEEE Intell. Syst.,vol 28,no.3,pp.10-18,2013 https://doi.org/10.1109/MIS.2013.27.

      [2] R.Li,S.Bao,J.Wang,Y.Yu and Y.Cao, Cominer: An effective algorithm for mining competitors from the web, Data Mining, in Proc.Int. Conf. Data Mining, 2006, pp. 948-952

      [3] D.Rajagopal, D.Olsher, E.Cambria and K. Kwok (2013): Commonsense topic modeling In Proc.ACM Int. Conf.Knowledge Discovery Data mining, Chicago.

      [4] Sangno Lee, Jeff Baker,Jaeki Song : An empirical comparison of four text mining methods Proceedings of the 43rd Hawaii International Conference on System Sciences 2010.

      [5] A. Sidorova, N. Evangelopoulos, J. Valacich and T. Ramakrishnan, Uncovering the intellectual core of the information systems discipline, MIS Quarterly, 32 (2008), pp. 467-482. https://doi.org/10.2307/25148852.

      [6] Lingfeng Niu, Yong Shi :Semi-Supervised PLSA for Document Clustering:2010 International Conference On Data Mining Workshops.

      [7] M Blie and M.I Jordan (2003): Latent Dirichlet Allocation.J.Mach.Learn Res, 993-1022.

      [8] S. Geman and D. Geman, Stochastic relaxation, Gibbs distributions, and the Bayesian relation of images, IEEE Trans. Pattern Anal. Mach. Intell., vol. 6, no. 6, pp. 721741, 1984.

      [9] D.Maynard, V.Tablan and C.Ursu, (2001): Name entity Recognition from diverse text types, In Proc,Conf.Recent Advances Natural Language processing.

      [10] Quan Fang, Jitao Sang, Changsheng Xu, Fellow, IEEE, and Yong Rui, Fellow, IEEE,” Topic-Sensitive Influencer Mining in Interest-Based Social Media Networks via Hypergraph Learning”, IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 16NO. 3, APRIL 2014.

      [11] Xiao-Bing Xue and Zhi-Hua Zhou, Senior Member, IEEE, “Distributional Features for Text Categorization”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 3, MARCH 2009.

      [12] Yang Li Institute of Computing Technology, Chinese Academy of Sciences, PH.D., Kexueyuan South Rd. 6, Beijing China, Bin-Xing Fang Institute of Computing Technology, Chinese Academy of Sciences,Professor, Kexueyuan South Rd. 6, Beijing China.

      [13] Shangguang Wang, Member, IEEE, Zibin Zheng, Member, IEEE, Zhengping Wu, Member, IEEE, Fangchun Yang, Member, IEEE, Michael R. Lyu, Fellow, IEEE, “Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems”, IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. , NO., MARCH 2014.

      [14] Rahul Ramachandran, John Rushing, Amy Lin, Helen Conover, Xiang Li, Sara Graves, U. S. Nair, Kwo-Sen Kuo, Member, IEEE, and Deborah K. Smith,” Data Prospecting–A Step Towards Data Intensive Science”, IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, VOL. 6, NO. 3, JUNE 2013.

      [15] K.Vijayakumar·C,Arun,Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC,Cluster Computing DOI 10.1007/s10586-017-1176-x,Sept 2017.

      [16] K.Vijayakumar·C,Arun, Analysis and selection of risk assessment frameworks for cloud based enterprise applications”, Biomedical Research, ISSN: 0976-1683 (Electronic), January 2017.

      [17] K. Vijayakumar,C.Arun,Automated risk identification using NLP in cloud based development environments,J Ambient Intell Human Computing,DOI 10.1007/s12652-017-0503-7,Springer-Verlag Berlin Heidelberg May 2017.

      [18] K.Sathesh Kumar, K.Shankar, M. Ilayaraja and M. Rajesh,“Sensitive Data Security In Cloud Computing Aid Of Different Encryption Techniques” Journal of Advanced Research in Dynamical and Control Systems, vol.18, no.23, 2017.




Article ID: 10008
DOI: 10.14419/ijet.v7i1.9.10008

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.