Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 29

Ravindra College of Engineering for Women

CYBERCRIME DETECTION USING


MACHINE LEARNING

PROJECT GUIDE : PROJECT MEMBERS :


M.Jyothirmai M.Tech, (Ph.D) M. Mani chandana - 203T1A0429
Assistant Professor T. Harika - 203T1A0453
C. Pravallika - 203T1A0409
G. Aishwarya - 213T5A0403

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
CONTENTS

1. ABSTRACT
2. PROBLEM STATEMENT
3. LITERATURE REVIEW
4. EXISTING METHODOLOGY
5. PROPOSED METHODOLOGY
6. RESULTS
7. ADVANTAGES
8. APPLICATIONS

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
CONTENTS

9. SYSTEM REQUIREMENT SPECIFICATION


10. CONCLUSION
11. FUTURE SCOPE
12. REFERENCES

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
ABSTRACT

• The abstract provides an overview of our project, which


focuses on utilizing machine learning techniques to detect
cybercrime.
• As cyber threats continue to evolve, it's crucial to develop
robust methods for identifying and mitigating these risks.
• Our project aims to address this challenge by leveraging
advanced machine learning algorithms to detect and classify
various types of cybercrimes.

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
PROBLEM STATEMENT
• Cybercrime poses a significant threat to individuals,
organizations, and governments worldwide. With the
proliferation of digital technologies, cybercriminals have
become increasingly sophisticated in their methods, making it
challenging to detect and prevent malicious activities.
• Traditional cybersecurity measures are often reactive and
struggle to keep pace with emerging threats.
• There is a pressing need for proactive approaches that can
accurately identify and mitigate cyber threats in real-time.

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
LITERATURE REVIEW
• Rasoul Kiani, Silamak Mahdavi and Amin Keshavarzi (2015) had applied a
theoretical model based on data mining techniques such as clustering and
classification to real crime dataset recorded by police in England and Wales
within 1990 to 2011. They assigned weights to the features in order to
improve the quality of their model and removed low value from them. They
employed Genetic algorithm for optimizing of Outlier detection operator
parameters using Rapid miner tool [1].

• Tushar Sonaqwanev, Shirin Shaikh, Shaista Shaikh, Rahul Shinde and Asif
Sayyad (2015) had grouped crime data according to various types of crimes
that had taken place against women in different states and cities of India.
They used K-means algorithm for clustering, Pearson‟s correlation
coefficient for correlating crimes between two variables and Linear
regression for crime prediction [2].

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
• Lawrence McClenden and Natarajan Meghanathan (2015) had proved how
effective and accurate the machine learning algorithms used in data mining
analysis can be at predicting violent crime patterns. With the aid of WEKA
tool, they observed that Linear regression algorithm was very effective and
accurate in predicting than Additive regression and Decision stamp
algorithms when implemented them with same finite set of features on the
Communities and Crime dataset [3].

• Atul bamrara, Gajendra Singh and Mamta Bhati (2013) had attempted to
reveal the varied cyber attack strategies adopted by cyber criminals to target
the selected banks in India where spoofing, brute overflow etc are found
positively correlated with public and private sector banks. Their findings also
showed a positive correlation between Intrusion detection and cyber attacks ;
system monitoring and online identity theft, DOS attack, credit card or ATM
fraud [4].

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
EXISTING METHODOLOGY
• The existing methodology refers to the current approach or methods that
are already in use to tackle a particular problem or achieve an objective.

• In the context of cybercrime detection, the existing methodology may


include traditional techniques such as signature-based detection systems,
firewalls, intrusion detection systems (IDS), antivirus software, and
manual threat analysis.

• Signature-based detection systems compare incoming data against a


database of known attack signatures, while firewalls monitor and control
network traffic based on predetermined security rules.

• However, these existing methods have limitations, such as being reactive,


susceptible to evasion techniques, and unable to detect new or unknown
threats effectively.

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
PROPOSED METHOD
• Cybercrime poses a significant threat to individuals,
organizations, and governments worldwide.

• With the proliferation of digital technologies, cybercriminals


have become increasingly sophisticated in their methods, making
it challenging to detect and prevent malicious activities.

• Traditional cybersecurity measures are often reactive and


struggle to keep pace with emerging threats.

• There is a pressing need for proactive approaches that can


accurately identify and mitigate cyber threats in real-time.

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
BLOCK DIAGRAM

FEATURE SELECTION

ENSEMBLE CLASSIFIER

DATA PREDI
SET CTION
TRAINING

CLASSIFICATION AND METRIC


CALCULATION

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
1. Feature Selection : This step involves choosing the most
relevant pieces of information (features) from the data that will
help in making accurate predictions. It's like picking out the
most important clues from a puzzle.

2. Ensemble Classifier : Think of this as a team of different


classifiers (prediction models) working together to make
decisions. Each classifier has its own strengths and weaknesses,
and by combining them, we can make more reliable predictions.
RCEW, Pasupula (V), Nandikotkur Road,
Near Venkayapalli, KURNOOL
3. Data : This is the information we use to train our prediction
models. It includes both the features (selected in step 1) and the
corresponding labels or outcomes we want to predict.

4. Training: In this phase, we feed the selected features and their


corresponding labels into the ensemble classifier. The classifier
learns from this data, adjusting its internal parameters to make
better predictions over time, much like studying for a test.
RCEW, Pasupula (V), Nandikotkur Road,
Near Venkayapalli, KURNOOL
5. Prediction: Once the ensemble classifier has been trained, we
can use it to make predictions on new, unseen data. We input the
features of the new data into the classifier, and it outputs
predictions about the labels or outcomes, based on what it learned
during training.

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
6. Classification and Metric Calculation: This is where we
evaluate how well our predictions match the actual outcomes. We
compare the predicted labels to the true labels in the data to see
how accurate our predictions are. We may use various metrics
(such as accuracy, precision, recall, etc.) to measure the
performance of our classifier and understand its strengths and
weaknesses in classifying different types of data. It's like grading
the predictions to see how well our model did overall.

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
RESULTS

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
RESULTS

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
RESULTS

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
RESULTS

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
RESULTS

Detected Cybercrimes:

['Bot', 'DoSHulk', 'Bot', 'Bot', 'Bot', 'Bot', 'DoSHulk', 'Bot', 'Bot', 'Bot',
'Bot', 'Bot', 'Bot', 'Bot', 'Infiltration', 'Bot', 'Bot', 'Bot', 'Bot', 'Bot',
'Infiltration', 'Infiltration', 'Bot', 'Bot', 'Bot', 'Bot', 'Infiltration', 'Infiltration',
'Bot', 'Infiltration', 'Infiltration', 'Bot', 'Infiltration', 'Infiltration', 'Bot', 'Bot',
'DoSHulk', 'Bot', 'Bot', 'Infiltration', 'Infiltration', 'Bot', 'Bot', 'Infiltration',
'Infiltration', 'Bot', 'Bot', 'Bot', 'Infiltration', 'Bot', 'Bot', 'Bot', 'Bot', 'Bot',
'Bot', 'DoSHulk', 'Bot', 'Infiltration', 'Bot', 'Bot', 'Bot', 'Bot', 'Bot',
'Infiltration', 'Bot', 'Bot', 'Infiltration', 'Bot', 'Infiltration', 'Bot', 'Bot', 'Bot',
'Bot', 'Bot', 'DoSHulk', 'Bot', 'Infiltration', 'Bot', 'Bot', 'Infiltration',
'Infiltration’, ……………………………………………………..]

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
ADVANTAGES

 Improved Security
 Automation
 Scalability
 Predictive Capabilities
 Efficiency

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
APPLICATIONS

 Network Security
 Fraud Detection
 Threat Intelligence

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
SYSTEM REQUIREMENT
SPECIFICATION
HARDWARE REQUIREMENTS:
• High-performance computing resources for data processing
and model training.
• Sufficient storage capacity to store large datasets and trained
machine learning models.
• Network infrastructure capable of handling data traffic and
communication between systems.

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
SYSTEM REQUIREMENT
SPECIFICATION

SOFTWARE REQUIREMENTS:

• Operating System: Windows, Linux, or macOS

• Programming Languages: Python, SQL

• Machine Learning Libraries: scikit-learn, TensorFlow, Keras

• Data Visualization Tools: Matplotlib, Seaborn, Tableau

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
CONCLUSION
• By integrating advanced algorithms like
supervised/unsupervised learning, dimensionality reduction,
and oversampling, we can fortify cyber threat detection. This
methodology proactively adapts, overcoming shortcomings of
signature-based systems. Through extensive data analysis,
machine learning pinpoints malicious patterns, accurately
classifying cybercrimes and uncovering novel threats.

• Implementation necessitates collaboration among cybersecurity


experts, data scientists, and industry stakeholders. By
leveraging machine learning and big data analytics, we bolster
defenses against cyber threats, protecting critical infrastructure,
businesses, and individuals from harm.
RCEW, Pasupula (V), Nandikotkur Road,
Near Venkayapalli, KURNOOL
FUTURE SCOPE
• Advanced AI/ML techniques like deep learning, reinforcement
learning, and GANs enhance cybercrime detection's accuracy
and efficiency. Behavioral biometrics (keystroke dynamics,
mouse movements, voice recognition) bolster proactive user
identification and anomaly detection. Blockchain ensures
immutable auditing for secure transaction tracking.

• Quantum-safe cryptography mitigates threats from quantum


computing. Proactive threat intelligence, hunting, and
continuous monitoring combat sophisticated threats.
Collaborative defense and information sharing foster collective
security against cyber threats across sectors and borders.

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
REFERENCES
1) Dr. Zakaria Suliman Zubi and Ayman Altaher Mahmmud, “Crime Data Analysis using Data
mining Techniques to Improve Crimes Prevention”, International Journal of Computers, Vol.
8, 2014, pp. 39-45.
2) Rasoul Kiani, Silamak Mahdavi and Amin Keshavarzi, “Analysis and Prediction
of Crimes by Clustering and Classification”, IJARAI, Vol. 4, Issue 8, 2015, pp. 1-
7.
3) Dr. K. Chitra and B. Subhashini, “Data mining Techniques and its Applications in
Banking Sector”, IJETAE, Vol. 3, Issue 8, August 2013, pp. 219-226.
4) Uttam Mande, Y. Srinivas and J. V. R. Murthy, “An Intelligent Analysis of Crime
Data using Data mining & Auto Correlation Models”, IJERA, vol. 2, Issue 4,
August 2012, pp. 149-153.
5) Lawrence McClenden and Natarajan Meghanathan, “Using Machine Learning
Algorithms to Analyze Crime Data”, Machine Learning and Applications: An
International Journal, Vol. 2,Issue 1, March 2015, pp.1-12.
6) Atul bamrara, Gajendra Singh and Mamta Bhati, “Cyber Attacks and Defense
Strategies in India: An Emprical Assessment of Banking Sector”, IJCC,Vol.7,
Issue 7, January-June 2013,pp. 49-61.

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
7) Anisha Agarwal, Dhanashree Chougule, Arpita Agarwal and Divya Chimote,
“Application for Analysis and Predicion of Crime data using Data mining”,
Proceedings of IRF-IEEEforum International Conference, India, April 2016, pp.
35-38.
8) K. Chitra Lekha and Dr. S. Prakasam, “Performance Assessment of Different
Classification Techniques”, CiiT International Journal of Data mining and
Knowledge Engineering, Vol. 9, Issue 1, January 2017, pp. 20-23.
9) Javad Hosseinkhani, Suhaimi Ibrahim, Suriyati Chuprat and javid Hosseinkhani
Naniz, “Web Crime mining by means of Data mining Techniques”, Research
Journal of Applied Sciences, Engineering and Technology, Vol. 7, Issue 10, 2014,
pp. 2027-2032.
10) Linda Delamaire, Hussein Abdou and John Pointon, “Credit Card fraud and
Detection techniques: A review‟, Banks and Bank Systems, UK,Vol. 4, Issue 4,
2009.

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
QUERIES?

RCEW, Pasupula (V), Nandikotkur Road,


Near Venkayapalli, KURNOOL
RCEW, Pasupula (V), Nandikotkur Road,
Near Venkayapalli, KURNOOL

You might also like