Professional Documents
Culture Documents
Final Document
Final Document
1) Extract, transform, and load transaction data onto the data warehouse
system.
2) Store and manage the data in a multidimensional database system.
3) Provide data access to business analysts and information technology
professionals.
4) Analyze the data by application software.
5) Present the data in a useful format, such as a graph or table.
Different levels of analysis are available:
Rule induction: The extraction of useful if-then rules from data based on
statistical significance.
Data visualization: The visual interpretation of complex relationships in
multidimensional data. Graphics tools are used to illustrate data
relationships.
1) It’s one of the most effective services that are available today. With the help
of data mining, one can discover precious information about the customers
and their behavior for a specific set of products and evaluate and analyze,
store, mine and load data related to them
2) An analytical CRM model and strategic business related decisions can be
made with the help of data mining as it helps in providing a complete
synopsis of customers
3) An endless number of organizations have installed data mining projects and
it has helped them see their own companies make an unprecedented
improvement in their marketing strategies (Campaigns)
4) Data mining is generally used by organizations with a solid customer focus.
For its flexible nature as far as applicability is concerned is being used
vehemently in applications to foresee crucial data including industry analysis
and consumer buying behaviors
5) Fast paced and prompt access to data along with economic processing
techniques have made data mining one of the most suitable services that a
company seek
1. Marketing / Retail:
Data mining helps marketing companies build models based on historical data
to predict who will respond to the new marketing campaigns such as direct mail,
online marketing campaign…etc. Through the results, marketers will have
appropriate approach to sell profitable products to targeted customers.
Data mining brings a lot of benefits to retail companies in the same way as
marketing. Through market basket analysis, a store can have an appropriate
production arrangement in a way that customers can buy frequent buying products
together with pleasant. In addition, it also helps the retail companies offer certain
discounts for particular products that will attract more customers.
2. Finance / Banking
Data mining gives financial institutions information about loan information and
credit reporting. By building a model from historical customer’s data, the bank and
financial institution can determine good and bad loans. In addition, data mining
helps banks detect fraudulent credit card transactions to protect credit card’s
owner.
3. Manufacturing
4. Governments
5. Law enforcement:
Data mining can aid law enforcers in identifying criminal suspects as well as
apprehending these criminals by examining trends in location, crime type, habit,
and other patterns of behaviors.
6. Researchers:
Data mining can assist researchers by speeding up their data analyzing process;
thus, allowing those more time to work on other projects.
LITERATURE SURVEY
Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in
the visitor’s browser are posing a serious threat to client security, compromising
innocent users who visit these sites without having a patched web browser.
Currently, there is neither a freely available comprehensive database of threats on
the Web nor sufficient freely available tools to build such a database. In this work,
we introduce the Monkey-Spider project [Mon]. Utilizing it as a client honeypot,
we portray the challenge in such an approach and evaluate our system as a high-
speed, Internetscale analysis tool to build a database of threats found in the wild.
Furthermore, we evaluate the system by analyzing different crawls performed
during a period of three months and present the lessons learned.
Malicious web pages that use drive-by download attacks or social engineering
techniques to install unwanted software on a user's computer have become the
main avenue for the propagation of malicious code. To search for malicious web
pages, the first step is typically to use a crawler to collect URLs that are live on the
Internet. Then, fast prefiltering techniques are employed to reduce the amount of
pages that need to be examined by more precise, but slower, analysis tools (such as
honey clients). While effective, these techniques require a substantial amount of
resources. A key reason is that the crawler encounters many pages on the web that
are benign, that is, the "toxicity" of the stream of URLs being analyzed is low. In
this paper, we present EVILSEED, an approach to search the web more efficiently
for pages that are likely malicious. EVILSEED starts from an initial seed of
known, malicious web pages. Using this seed, our system automatically generates
search engines queries to identify other malicious pages that are similar or related
to the ones in the initial seed. By doing so, EVILSEED leverages the crawling
infrastructure of search engines to retrieve URLs that are much more likely to be
malicious than a random page on the web. In other words EVILSEED increases the
"toxicity" of the input URL stream. Also, we envision that the features that
EVILSEED presents could be directly applied by search engines in their prefilters.
We have implemented our approach, and we evaluated it on a large-scale dataset.
The results show that EVILSEED is able to identify malicious web pages more
efficiently when compared to crawler-based approaches.
Functionality and layout have regularly been used to perform static analysis
to determine maliciousness in the desktop space [20], [37], [51]. Features such
as the frequency of iframes and the number of redirections have traditionally
served as strong indicators of malicious intent. Due to the significant changes made
to accommodate mobile devices, such assertions may no longer be true. Previous
techniques also fail to consider mobile specific webpage elements such as calls to
mobile APIs. For instance, links that spawn the phone’s dialer (and the reputation
of the number itself) can provide strong evidence of the intent of the page. New
tools are therefore necessary to identify malicious pages in the mobile web. We
first experimentally demonstrate that the distributions of identical static features
when extracted from desktop and mobile webpages vary dramatically.
3.2.1 Disadvantages:
3.3.1 Advantages:
To the best of our knowledge kAYO is the first technique that detects mobile
specific malicious webpages by static analysis.