Professional Documents
Culture Documents
Batch-4 Final
Batch-4 Final
1. ABSTRACT
2. PROBLEM STATEMENT
3. LITERATURE REVIEW
4. EXISTING METHODOLOGY
5. PROPOSED METHODOLOGY
6. RESULTS
7. ADVANTAGES
8. APPLICATIONS
• Tushar Sonaqwanev, Shirin Shaikh, Shaista Shaikh, Rahul Shinde and Asif
Sayyad (2015) had grouped crime data according to various types of crimes
that had taken place against women in different states and cities of India.
They used K-means algorithm for clustering, Pearson‟s correlation
coefficient for correlating crimes between two variables and Linear
regression for crime prediction [2].
• Atul bamrara, Gajendra Singh and Mamta Bhati (2013) had attempted to
reveal the varied cyber attack strategies adopted by cyber criminals to target
the selected banks in India where spoofing, brute overflow etc are found
positively correlated with public and private sector banks. Their findings also
showed a positive correlation between Intrusion detection and cyber attacks ;
system monitoring and online identity theft, DOS attack, credit card or ATM
fraud [4].
FEATURE SELECTION
ENSEMBLE CLASSIFIER
DATA PREDI
SET CTION
TRAINING
Detected Cybercrimes:
['Bot', 'DoSHulk', 'Bot', 'Bot', 'Bot', 'Bot', 'DoSHulk', 'Bot', 'Bot', 'Bot',
'Bot', 'Bot', 'Bot', 'Bot', 'Infiltration', 'Bot', 'Bot', 'Bot', 'Bot', 'Bot',
'Infiltration', 'Infiltration', 'Bot', 'Bot', 'Bot', 'Bot', 'Infiltration', 'Infiltration',
'Bot', 'Infiltration', 'Infiltration', 'Bot', 'Infiltration', 'Infiltration', 'Bot', 'Bot',
'DoSHulk', 'Bot', 'Bot', 'Infiltration', 'Infiltration', 'Bot', 'Bot', 'Infiltration',
'Infiltration', 'Bot', 'Bot', 'Bot', 'Infiltration', 'Bot', 'Bot', 'Bot', 'Bot', 'Bot',
'Bot', 'DoSHulk', 'Bot', 'Infiltration', 'Bot', 'Bot', 'Bot', 'Bot', 'Bot',
'Infiltration', 'Bot', 'Bot', 'Infiltration', 'Bot', 'Infiltration', 'Bot', 'Bot', 'Bot',
'Bot', 'Bot', 'DoSHulk', 'Bot', 'Infiltration', 'Bot', 'Bot', 'Infiltration',
'Infiltration’, ……………………………………………………..]
Improved Security
Automation
Scalability
Predictive Capabilities
Efficiency
Network Security
Fraud Detection
Threat Intelligence
SOFTWARE REQUIREMENTS: