← Back to VOLUME 1, ISSUE 4, JUNE 2012
This work is licensed under a Creative Commons Attribution 4.0 International License.
Handling End User through Markov Model
Mr. Sujeet Singh, Mr. Ganesh Wayal, Mr. Niresh Sharma Department of Computer Science and Engineering, RKDF, Bhopal, India
Abstract: In the cyber crime investigation, log files are an important source of evidence. The importance of event logs, as a source of information in systems and network management cannot be over accentuated. With the ever-increasing size and complexity of today’s event logs, the task of analyzing event logs has become cumbrous to carry out manually. Now these days recent research has focused on the automatic analysis of these logs files in order to identify suspicious user. This paper through some light on those techniques by which it will easy to retrieve the suspicious user using log files. This paper also shows about web mining and Markov model.
.
Keywords: Cyber Forensic, Event Correlation, log file, web mining, Markov Model
.
Keywords: Cyber Forensic, Event Correlation, log file, web mining, Markov Model
👁 31 views
Downloads: Download PDF
How to Cite:
[1] Mr. Sujeet Singh, Mr. Ganesh Wayal, Mr. Niresh Sharma Department of Computer Science and Engineering, RKDF, Bhopal, India, “Handling End User through Markov Model,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
