You are on page 1of 4

Web Data Mining For Terrorism Analysis

Terrorism has grown its roots quite deep in certain parts of the world. With increasing terrorist
activities it has become important to curb terrorism and stop its spread before a certain time. So
as identified internet is a major source of spreading terrorism through speeches and videos.
Terrorist organizations use internet to brain wash individuals and also promote terrorist activities
through provocative web pages that inspire helpless people to join terrorist organizations. So
here we propose an efficient web data mining system to detect such web properties and flag them
automatically for human review. Data mining is a technique used to mine out patterns of useful
data from large data sets and make the most use of obtained results. Data mining as well as web
mining are used together at times for efficient system development. Web mining also consists of
text mining methodologies that allow us to scan and extract useful content from unstructured
data. Text mining allows us to detect patterns, keywords and relevant information in unstructured
texts. Both Web mining and data mining systems are widely used for mining from text. Data
mining algorithms are efficient at manipulating organized data sets, while web mining
algorithms are widely used to scan and mine from unorganized and unstructured web pages and
text data available on the internet. Websites created in various platforms have different data
structures and are difficult to read for a single algorithm. Since it is not feasible to build a
different algorithm to suit various web technologies we need to use efficient web mining
algorithms to mine this huge amount of web data. Web pages are made up of HTML (Hyper text
markup language) In various arrangements and have images, videos etc intermixed on a single
web page. So we here propose to use smartly designed web mining algorithms to mine textual
information on web pages and detect their relevancy to terrorism. In this way we may judge web
pages and check if they may be promoting terrorism. This system proves useful in anti terrorism
sectors and even search engines to classify web pages into the category. Their relevancy to the
field helps classify and sort them appropriately and flag them for human review.

Features

 We use web mining algorithms to mine textual information on web pages and detect their
relevancy to terrorism.
 Websites created in different platform can be tracked using this application.
 This system will check web pages whether a webpage is promoting terrorism.
 This system will classify the web pages into various categories and sort them
appropriately.
 There are two features used in this system that is data mining and web mining.
 Data mining is a technique used to mine out patterns of useful data from large data sets
and make the most use of obtained results.
 Web mining also consists of text mining methodologies that allow us to scan and extract
useful content from unstructured data.
 Data mining as well as web mining are used together at times for efficient system
development.
 System will track web pages that are more susceptible to terrorism and will report IP
Address to the user who is using the system.
 This System are used only by the government officials who work for country security.
 System will help the cops to easily track the susceptible community who are held in
terrorism.

Feasibility Study

Our system will detect patterns, keywords and relevant information in unstructured texts in web
page using web mining as well as data mining. Our system will mine webpage using web mining
algorithm to mine textual information on web pages and detect those web pages that are relevant
to terrorism. Data mining as well as web mining is used together at times for efficient result.

 Economic Feasibility
This system will be used by government officials. Since there are many countries
who require protection of their own country. This will provide economic benefits
to the organization. It includes quantification and identification of all the benefits
expected

 Operational Feasibility
This system is more reliable, maintainable, affordable and producible. These are
the parameters which are considered during design and development of this
project. During design and development phase of this project there was
appropriate and timely application of engineering and management efforts to meet
the previously mentioned parameters.

 Technical Feasibility
The back end of this project is SQL server which stores data and other details
which is related to this project. There are basic requirement of hardware to run
this application. This system is developed in .Net Framework using C#. This
application will be online so this application can be accessed by using any device
like (Personal Computers, Laptop and with some hand held devices).

Advantages

 This system will help to reduce terrorism around the world.


 This system proves useful in anti terrorism sectors.
 This system help the cops to track communication held between terrorists.
 This system will detect web pages developed in different platforms.

Disadvantages

 If terrorists communicate in keywords it will be difficult for the cops to track it.

Future Scope

 There can be module where terrorists communicating in code words can be tracked by the
system itself.
 In proposed system, system tracks susceptible IP Address and provides the information to
the officials using the system. In later, system will track particular susceptible person
who is sending messages relevant to terrorism.

Software Requirements:

 Windows
 Sql
 Visual studio 2010

Hardware Components:

 Processor – Dual Core


 Hard Disk – 50 GB
 Memory – 1GB RAM
 Internet Connection

Application

 This system can be used by the cops and other government officials who work for
country security.

References:

 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=1383486&queryText
%3DWeb+Data+Mining+For+Terrorism+Analysis
 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=4547644&queryText
%3DWeb+Data+Mining+For+Terrorism+Analysis

You might also like