International School Capstone Project Proposal CMU-CS450 Capstone Project I

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

International School

Capstone Project Proposal

CMU-CS450 Capstone Project I

Test Plan Document


Version: 1.1
Date: 05 Nov 2020

APPLY MACHINE LEARNING IN DETECTING PHISHING WEBSITES

Submitted by

Khai, Tran Dinh


Duc, Nguyen Tan
Thuy, Pham Thanh

Approved by

MSc. Tuan, Nguyen Kim

Test Plan Review Panel Representative:

Name Signature Date

Capstone Project 1- Mentor:

Name Signature Date


Capstone Project Proposal v1.3 – AMLIDPW

PROJECT INFORMATION

Project Acronym AMLIDPW


Project Title Apply Machine Learning In Detecting Phishing Websites
Start Date 12/08/2020 End Date 05/12/2020
Lead Institution International School, Duytan University
Project Mentor MSc. Nguyen Kim Tuan
Scrum Master / Khai, Tran Dinh
Project Leader & Email: khaitran9499@gmail.com
contact details
Tel: 0707375015
Team members Name Email Tel
1 Duc, Nguyen Tan nguyentanduc259@gmail.com 0935684175
2 Thuy, Pham Thanh btpham99@gmail.com 0905562806

REVISION HISTORY

Version Date Comments Author Approval


1.0 11/11/2020 Initial Release C1NE.03
1.1 05/11/2020 Update References C1NE.03

Table of Contents

C1NE.03 Page 2 of 9
Capstone Project Proposal v1.3 – AMLIDPW

I.INTRODUCTION: 3

1. Purpose: 3

2. Scope: 3

II.SCENARIO: 4
1.Scenario 1: Detecting legitimate websites. 4
2.Scenario 2: Detecting phishing websites. 4

VI.CONCLUSION: 5

I.INTRODUCTION:
This document is the Test Plan for the AMLIDPW System project. It describes
the testing strategy and approach to testing QA will use to validate the quality of this

C1NE.03 Page 3 of 9
Capstone Project Proposal v1.3 – AMLIDPW

product prior to release. It also contains the various resources needed to successfully
complete this project.
1. Purpose:
+ The purpose of this document is to describe what the system must do
such as specific functions, non functional features and constraints and to
describe and describe how the system works, tasks and functions. of the
components in the system.
+ Describing the cyber security system which is called Apply Machine
Learning in Detecting Phishing Websites.
2. Scope:
+ Planning requirements management: collect required by the group to
collect the requirements to take this job, reporting requirements, test
requirements, remove carpet, Mehrad Italian survey requirements
experts.
+ Collect required: determine the required needs to collect, the wishes of
you involved. Provide the basis for the complete product to create
malformed add to the project.
+ Scopes of the project:
● The system should be useful in many e-commercial websites for
maintaining the security and reliability of customers and people
online.
● The system should be useful in preventing online frauds leading to
leakage of important and private user data.
● The scope of using Machine Language over other Traditional
Detecting Methods.

II.SCENARIO:
1.Scenario 1: Detecting legitimate websites.
+ Purpose: The goal of this situation is to check whether the legitimate
website that uses our application recognizes it as a legitimate website.
+ Prepare: Kali linux, python version 3.8.6
+ Implement:
● Step 1: Enable the tool and python version 3.8.6 into the file's
installed directory path.

● Step 2: execute file run.py.


C1NE.03 Page 4 of 9
Capstone Project Proposal v1.3 – AMLIDPW

● Step 3: Enter Url and check if percent of math algorithm up 15


parameters will be legitimate website based on the indicators that we set out
to compare and check it.

● Step 4: Execute file train.py to know how the algorithm work

● After determined analysis and successful calculation, the


following table shows the following table with 30 different parameters to make a
decision to consider if there is a website with more than 16 parameters defined as 1,
the website is legal

C1NE.03 Page 5 of 9
Capstone Project Proposal v1.3 – AMLIDPW

❖ Result : The system works based on a good algorithm and has


successfully identified a legitimate website, we used train.py file to test the algorithm
and decided 17 parameters true.
2.Scenario 2: Detecting phishing websites.
+ Purpose: The goal of this situation is to check whether the
legitimate website that uses our application recognizes it as a phishing website
+ Prepare Kali linux, python version 3.8.6
+ Implement
● Step 1: Enable the tool and python version 3.8.6 into the file's
installed directory path.

● Step 2: execute file run.py to know how the algorithm worked.

C1NE.03 Page 6 of 9
Capstone Project Proposal v1.3 – AMLIDPW

● Step 3: Enter Url and check if percent of math algorithms under


15 parameters will be phishing websites based on the indicators that we set
out to compare and check it.

● Step 4: Execute file train.py to know how the algorithm work

● After determined analysis and successful calculation, the


following table shows the following table with 30 different parameters to make a
decision to consider if there is a website with less than 15 parameters defined as 1,
the website is legal
❖ Result: The system works based on a good algorithm and has
successfully identified a legitimate website, we used train.py file to test the algorithm
and decided 12 parameter true less 15 so this is a phishing
1.Scenario 3: Checking a websites out of list.
+ Purpose: The goal of this situation is using a web page outside of the
dataset to check if the system is working
+ Prepare: Kali linux, python version 3.8.6
+ Implement:
● Step 1: Enable the tool and python version 3.8.6 into the file's
installed directory path.

● Step 2: execute file run.py.

C1NE.03 Page 7 of 9
Capstone Project Proposal v1.3 – AMLIDPW

● Step 3: Enter Url and check if percent of math algorithm up 50%


will be legitimate website based on the indicators that we set out to compare
and check it.

● Step 4: Execute file train.py to know how the algorithm work

● After determined analysis and successful calculation, the


following table shows the following table with 30 different parameters to make a
decision to consider if there is a website with more than 16 parameters defined as 1,
the website is legal

C1NE.03 Page 8 of 9
Capstone Project Proposal v1.3 – AMLIDPW

❖ Result : The system works based on a good algorithm and has


successfully i If the site is outside the dataset, the algorithm determines whether these
30 indexes are true or false and if there are only 7 indexes true, then it is illegal.

C1NE.03 Page 9 of 9

You might also like