📞 +91-7667918914 | ✉️ ijarcce@gmail.com
International Journal of Advanced Research in Computer and Communication Engineering
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 1, ISSUE 4, JUNE 2012

Handling End User through Markov Model

Mr. Sujeet Singh, Mr. Ganesh Wayal, Mr. Niresh Sharma Department of Computer Science and Engineering, RKDF, Bhopal, India

Abstract: In the cyber crime investigation, log files are an important source of evidence. The importance of event logs, as a source of information in systems and network management cannot be over accentuated. With the ever-increasing size and complexity of today’s event logs, the task of analyzing event logs has become cumbrous to carry out manually. Now these days recent research has focused on the automatic analysis of these logs files in order to identify suspicious user. This paper through some light on those techniques by which it will easy to retrieve the suspicious user using log files. This paper also shows about web mining and Markov model.
.

Keywords: Cyber Forensic, Event Correlation, log file, web mining, Markov Model
👁 32 views
Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

How to Cite:

[1] Mr. Sujeet Singh, Mr. Ganesh Wayal, Mr. Niresh Sharma Department of Computer Science and Engineering, RKDF, Bhopal, India, “Handling End User through Markov Model,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)

Share this Paper