0% found this document useful (0 votes)
7 views6 pages

Data security approach on cyber crime

This document presents a capstone project focused on data security approaches to combat cybercrime, specifically targeting phishing and terrorism-related activities online. The authors propose a data analysis framework and a classification model using machine learning techniques, including Naïve Bayes and K-means algorithms, to detect and filter suspicious emails. The project aims to enhance cybersecurity by analyzing web vulnerabilities and employing data mining to prevent the spread of harmful content.

Uploaded by

DEEPAK KOLAGANI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views6 pages

Data security approach on cyber crime

This document presents a capstone project focused on data security approaches to combat cybercrime, specifically targeting phishing and terrorism-related activities online. The authors propose a data analysis framework and a classification model using machine learning techniques, including Naïve Bayes and K-means algorithms, to detect and filter suspicious emails. The project aims to enhance cybersecurity by analyzing web vulnerabilities and employing data mining to prevent the spread of harmful content.

Uploaded by

DEEPAK KOLAGANI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

International Journal of Scientific Research in Engineering and Management (IJSREM)

Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930

DATA SECURITY APPROACH ON CYBERCRIME USING WEB VULNERABILITY

A FINAL YEAR CAPSTONE DESIGN PROJECT

P.VELMURUGADASS K.VISWAS AYYAPPA


Department of computer Department of computer
Science and engineering Science and engineering
Kalasalingam academy of Kalasalingam academy of
Research and education, Research and education,
Krishnankoil, India Krishnankoil, India
[email protected] [email protected]

G.VENKATA SRINIVAS C.HRUTHINATH KUMAR


Department of computer Department of computer
Science and engineering Science and engineering
Kalasalingam academy of Kalasalingam academy of
Research and education, Research and education,
Krishnankoil, India Krishnankoil, India
[email protected] [email protected]

would serve to guide info systems researchers and


Abstract: Internet could be a major supply of practitioners UN agency touch upon cybersecurity.
spreading terrorist act through speeches and additionally, very little is thought regarding crime-
videos. Terrorist organizations use net as-a-service (CaaS), a criminal business model that
particularly social networks to brain wash underpins the crime underground. This analysis gap
people and promote terrorist activities through and also the sensible cybercrime issues we have a
provocative websites that inspire helpless tendency to face have impelled North American
individuals to affix terrorist organizations. nation to research the crime underground economy
Therefore, here we have a tendency to propose by taking an information analytics approach from a
Associate in Nursing economical net data style science perspective. to realize this goal, we:
processing system to observe such net (1) propose a data analysis framework for
properties and flag them mechanically for analyzing the crime underground; (2) propose CaaS
human review. websites are created from and crimeware definitions; (3) propose Associate in
hypertext mark-up language (Hypertext Nursing associated classification model, Associate
markup language). In numerous arrangements in Nursingd (4) develop an example application to
and have pictures, texts etc., intermixed on a demonstrate however the planned framework and
single website. Here, we have a tendency to classification model might be enforced in apply.
used data processing further as net mining to We then use this application to research the crime
observe patterns and mine out matter info on underground economy by analyzing an oversized
websites. Here, we have a tendency to are knowledge set obtained from the net hacking
victimization E-mail System to observe the community. By taking a style science analysis
unwanted messages that are additional prone approach, this paper contributes to the planning
to terrorist act and can send to the spam on to of the email phishing in the area of cybercrime and
the recipient who is victimization the system. the area is to fulfill the data security to the email
Despite the speedy increase of cyber threats, messages consisting the data and providing them
there has still been very little analysis into the the security using the naïve bayes to planning the
foundations of the topic or methodologies that

© 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12419 | Page 1


International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930

industries will harden attacks by the crime physical actions so as to urge data regarding the
underground. Among these, one of the attack victim like looking through Associate in Nursing
is the email phishing. organization’s trash, that is termed Dumpster
diving. A Dumpster is a valuable supply {of data
|of data |of knowledge} like personal information
Keywords: regarding staff, manuals, memos of sensitive data.
CAAS (Crimeware-as-a-Service), ICMP in a very social approach, attackers deem socio
(Internet Control Message Protocol), IRC psychological techniques like Cialdini's principles
(Internet Relay Chat), MIB (Management of persuasion to govern their victims. samples of
Information Base), CVE (Common persuasion strategies embody the employment of
Vulnerabilities and Exposures). authority. Attackers typically use search engines to
assemble personal data regarding future victims.
1. INTRODUCTION: There are tools that may gather and mixture data
from completely different internet resources.
The rapid development of Internet The user has to create an account on the e-mail
technologies has immensely changed on-line server by clicking the creating account on the
users’ experience, while security issues are login page. The user can send or receive the e-
also getting more overwhelming. The current mail once he created the account. The system
situation is that new threats may not solely will check the mail data and will make the large
cause severe injury to customers’ computers data into smaller parts, classify the data and will
however conjointly aim to steal their cash and crosscheck the server for the keywords which are
identity. Among these threats, phishing may spam. Then, it will classify whether the mail is
be a noteworthy one and may be a criminal spam or ham.
activity that uses social engineering and The overview of the cybercrime data mining is to
technology to steal a victim’s identity mine out the patterns in the email to prevent the
knowledge and account info. Most social crime anticipate criminal activity. The Naïve
engineering attacks area unit initiated and Bayes and the K-means algorithm are used to
administrated by the attackers in person. By classify the datasets and to mine the patterns. So,
means that of in person handled social that it can record and form the prediction or the
engineering attacks area unit particularly output about the spamming mails.
those that use the manner of impersonation Data mining is a technique that are capable to
principally deception to be in distress, a scan the accuracy and performance in
troublesome state of affairs, or urgency. cybercrime. Web mining is also a technique of
Social engineering attacks area unit initiated text mining technique which can mine out the
usually in 2 ways: By the attackers one by patterns in the large datasets. The both are
one and by creating use of computers. the techniques to mine out the data present in the
opposite ways that of handling social mail. After, finding the data in the dataset it is
engineering attacks area unit by exploitation going to classify it and verify it with the
computers or automatic means that. a way of keywords which are already in the given dataset.
assaultive is thru faux websites, that area unit Web mining improves the functionality of an
simply created. Websites that appear as if the online software by classifying content and
legitimate sites can also be created therefore identifying web sites. It's utilized for internet
simply. One very talked-about style of social searching (e.g., Google, Yahoo), as well as
engineering attack is finished by giving free vertical searching (e.g., Fat Lens, Become, and
downloads or terribly high discounts and so on). To forecast user behavior, web mining is
inspiring them to use their official ids. The used. Web mining is particularly beneficial to a
persons could also be attracted and supply certain website and e-service, such as landing
substantial details within the method. In the page optimization. Website mining is separated
scope of social engineering, attackers use into three categories of mining techniques:
some necessary approaches that may be place website mining, internet structure mining, and
into physical, social, and technical class. in an internet usage mining and data mining using
exceedingly physical approach, because the methods.
name implies, the offender performs some

© 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12419 | Page 2


International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930

Cybercrime has undergone a revolutionary Therefore, more practical phishing detection


modification, going from being product- technology is required to curb the threat of
oriented to service-oriented as a result of the phishing emails. during this project, we tend to
fact it operates within the virtual world, with 1st analyzed the e-mail structure.
totally different abstraction and temporal
constraints, differentiates it from different crime Then supported associate degree improved
taking place within the physical world [11]. As repeated Convolutional Neural Networks
a part of this alteration, the crime underground (RCNN) model with structure vectors and a
has emerged as a secret crime marketplace as a focus mechanism, we tend to planned a
result of rising technological changes have replacement phishing email detection model
provided organized cybercriminal teams with named Titaness, that is employed to model
unexampled opportunities for exploitation [12]. emails at the e-mail header, the e-mail body,
The crime underground includes a extremely the character level.
skilled business model that supports its own
underground economy [5]. This business 3. PROPOSED WORK:
model, referred to as CaaS, is ‘‘a business
model employed in the underground market The proposed system uses machine
wherever illegal services are provided to assist learning algorithms to get implemented.
underground consumers conduct cybercrimes,  There are some features used in the
like attacks, infections, and concealing in an system they are data mining and web
automatic manner,’’ [3]. Thus, CaaS is referred mining. Data mining could be a technique
to as a do-it-for-me service, not like crimeware
want to mine out patterns of helpful data
that may be a do-it-yourself product.
from large data sets. Web mining conjointly
consists of text mining methodologies that
takes us to scan and extract and mine useful
content from unstructured data.
 This system will check the sender
messages and whether the message is
promoting terrorism. Data mining and the
web mining are used together at tough times
for efficient system development. System
will find the unnecessary messages that are
more suspected to terrorism and will send
directly to the receiver’s spam account.
In this, the advantage is that the data can
be easily taken into smaller parts for easy
consideration. From, the small datasets the
2. PROBLEM STATEMENT: phishing can be easily done, and the process
The phishing email is one in all the numerous will be fast.
threats within the world nowadays and has
4. BLOCK DIAGRAM:
caused tremendous monetary losses. Though
the strategies of confrontation are frequently
being updated, the results of these strategies
aren't terribly satisfactory at this time.
Moreover, phishing emails are growing at
associate degree dismaying rate in recent
years.

© 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12419 | Page 3


International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930

5. SOFTWARE REQUIREMENTS: pandas furthermore even Python, as will


become clear in this article.
• Python On Windows, you can run Jupyter using the
• NumPy alternate route Anaconda adds to your
• MySQL beginning menu, which will open another
tab in your default internet browser. This
• Jupiter notebook isn't a journal presently, yet don't freeze!
There's very little to it. This is the Notebook
PYTHON Dashboard, explicitly intended for making
due to your Jupyter Notebooks. Consider it
Python is a computer programming the Launchpad for investigating, altering,
language frequently used to build websites and making your scratchpad.
and software, automate responsibilities, and
conduct statistical analysis. Python is a NumPy:
preferred cause language, meaning it may  Arrays of NumPy provide the
be used to create a spread of different introduction of modern statistics
programs and is not specialized for any
unique problems. Characteristics of Python with a large amount of data.
Following are critical traits of Python NumPy makes making these
Programming projects very easy and hassle-free.
• It helps practical and based  NumPy provides hidden lists and
programming strategies in addition frequent items for similar members.
to OOP. It also comes with functions like
• It can be used as a scripting
logical transitions, Fourier
language or maybe compiled to
byte-code for constructing large variations, standard line algebra,
packages. and much more.
• It provides very high-level dynamic  While changing the layout of an N-
data types and helps dynamic type dimensional array, NumPy will
checking. create new arrays of that and
remove the old ones.
Jupyter notebook:
 This python package provides
The Jupyter Notebook is an unimaginably useful integration tools. You can
amazing asset for intelligently creating and easily integrate NumPy with
Introducing information science projects.
programming languages such as C,
This article will walk you through how to
set up Jupyter Journals on your nearby C ++, and Fortran code.
machine and how to begin utilizing them  NumPy offers such services as
to do information science projects. MATLAB. Both allow users to
To capitalize on this instructional exercise, speed up the process.
you ought to be acquainted with
programming, explicitly Python and pandas. MySQL:
All things considered, assuming you have
insight with another dialect, the Python in  MySQL is a relational database.
this article shouldn't be excessively  MySQL offers a most powerful
mysterious, will in any case assist you with transactional database such as
getting Jupyter Notebooks set up locally. robust transactional support for the
Jupyter Notebooks can likewise go about as system.
an adaptable stage for having the
opportunity to grasp with

© 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12419 | Page 4


International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930

Algorithm:
A naïve Bayes classifier is an algorithm that
classifies things using Bayes' theorem.
Naive Bayes classifiers are based on the
assumption of robust (or naive)
independence between data point
properties. Spam filters, text analysis, and
medical diagnosis are all examples of
common applications for naive Bayes
classifiers. Because they are simple to
implement, these classifiers are commonly
employed in machine learning. Simple
Bayes or independent Bayes are other
names for naive Bayes. Here, we have used
the naïve Bayes classifier to mine out the
common words or to stop words from the
mail what’s the user send. The common
words like, and, then, the, there, or,
therefore, hereafter, these, it, is, it’s, this,
he, she, her, him, etc., This are called
preprocessing. In this process we have to
eliminate these kind of words. From those
messages, we are having a tendency to
Result and discussion:
getting to light the filtration words. It is an In this section, we show the results obtained for
useful algorithm for most of the machine the spamming. By using classification
learning side projects which are helpful to algorithms, we developed this code. By using
the society and the people. It keeps us to this code, we can easily find the spam or ham
give more security to our objects. using our code and the design.In this code
mainly, Naïve Baye’s classification takes place,
everyone knows about the classification. For
example, if we send a mail if it contains any war
related means it goes under category war, or if it
contains any violence words it goes under
category of violence.

Conclusion:
In this paper, we developed a page to tell the
email is spam or ham. To curb and destroy the
terrorism and spreading of their activities
through online social media through unwanted
messages and images to cover the helpless
people, we need to use the powerful method or

© 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12419 | Page 5


International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930

system. That system should be useful to the http://www.wired.com/news/business/0,1367,3422


cops for easily give awareness to common 1,00.html (15 May 2003).
people and find the person who are
spreading the harmful words as well as 5. “Powerful Attack Cripples Internet”.
who are all involved in terrorism. The Associated Press for Fox News 23 October 2002.
system will destroy the terrorism found in http://www.foxnews.com/story/0,2933,66438,00.h
the emails using their message content, tml. (9 April 2003)
sender mail and the receiver mail. So,
6. Joseph Lo and Others. “An IRC Tutorial”,
finally the project is to destroy the ham
irchelp.com. 1997.
mails in the emails and all. The system will
http://www.irchelp.org/irchelp/irctutorial.html#par
easily get the spam mails and the ham
t1. (8 April 2003).
mails using the algorithms and all.
7. Nicolas Pioch. “A Short IRC Primer”.
Edition 1.2, January 1997.
REFERENCES http://www.irchelp.org/irchelp/ircprimer.html#DD
1. David Karig and Ruby Lee, “Remote C. (21 April 2003).

Denial of Service Attacks and


Countermeasures,” Princeton University 8. Kleinpaste, Karl, Mauri Haikola, and Carlo Kid.
Department of Electrical Engineering “The Original IRC Manual”. March 18, 1997.
Technical Report CE-L2001-002, October http://www.user-com.undernet.org/documents/irc-
2001. manual.html#seen (21 April 2003).
2. Lincoln Stein and John N. Stuart. “The 9. Kevin J. Houle. “Trends in Denial of Service
World Wide Web Security FAQ”, Version Attack Technology”. CERT Coordination Center,
3.1.2, February 4, 2002. Carnegie Mellon Software Engineering Institute.
http://www.w3.org/security/faq/ (8 April October 2001. www.nanog.org/mtg-
2003). 0110/ppt/houle.ppt. (14 March 2003).
3. Paul J. Criscuolo. “Distributed Denial 10. Federal Computer Incident Response Center
of Service Trin00, Tribe Flood Network, (FedCIRC), “Defense Tactics for Distributed
Tribe Flood Network 2000, And Denial of Service Attacks”. Federal Computer
Stacheldraht CIAC-2319”. Department of Incident Response Center. Washington, DC, 2000.
Energy Computer Incident Advisory
Capability (CIAC), UCRL-ID-136939, Rev.
1., Lawrence Livermore National
Laboratory, February 14, 2000.

4. “Yahoo on Trail of Site Hackers”,


Wired.com, February 8, 2000.

© 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12419 | Page 6

You might also like