You are on page 1of 18

Monitoring Suspicious Discussion System

By

Muneeba Ashfaq 2020-GCUF-15395

Faisal Ur Rehman 2020-GCUF-15174

Abdullah Shahbaz 2020-GCUF-13951

BACHELOR OF SCIENCE

IN

COMPUTER SCIENCE

DEPARTMENT OF COMPUTER SCIENCE

Government College University Faisalabad


Government College University Faisalabad page

2023

Table of Contents

Table of Content ……………………………………………...…………………………………… ii


1 Introduction ...................................................................................................................................... 1

1.1 General Information .................................................................................................................... 1

1.2 Purpose........................................................................................................................................ 1

1.3 Project Objective ......................................................................................................................... 1

1.4 Intended Audience and Reading Suggestions ............................................................................... 2

1.5 Project Scope ............................................................................................................................... 2

2 Overall Description .......................................................................................................................... 2

2.1 Product Perspective ..................................................................................................................... 2

2.2 Product Features: ......................................................................................................................... 2

2.3 User Classes and Characteristics .................................................................................................. 2

2.4 Operating Environment................................................................................................................ 2

2.5 Design and Implementation Constraints ....................................................................................... 2

2.6 User Documentation .................................................................................................................... 2

2.7 Assumptions and Dependencies ................................................................................................... 2

3 System Features ................................................................................................................................ 3

3.1 System Feature ............................................................................................................................ 3

3.2 Description and Priority ............................................................................................................... 3

3.3 Stimulus/Response Sequences ..................................................................................................... 3

3.4 Functional Requirements ............................................................................................................. 3

3.5 Admin ......................................................................................................................................... 3

3.5.1 Approve profile: ................................................................................................................... 3


Government College University Faisalabad page

3.5.2 ` Secure Data: ......................................................................................................................... 3

3.5.3 Activities Control: ................................................................................................................ 3

3.6 Module1: ........................................................................................................................... …3

3.6.1 Module2: ........................................................................................................................……3

3.6.2 Module 3................................................................................................................................ 3

4 External Interface Requirements..................................................................................................... 4

4.1 User Interfaces............................................................................................................................. 4

4.2 Hardware Interfaces ..................................................................................................................... 4

4.3 Software Interfaces ...................................................................................................................... 4

4.4 Communications Interfaces.......................................................................................................... 4

5 Other Nonfunctional Requirements ................................................................................................ 4

5.1 Performance Requirements .......................................................................................................... 4

5.2 Safety Requirements .................................................................................................................... 4

5.3 Security Requirements ................................................................................................................. 4

5.4 Software Quality Attributes ......................................................................................................... 4

Appendix B: Check List ........................................................................................................................ 12


Appendix C: Supervisory Committee ................................................................................................... 13

iii

Revision History
Government College University Faisalabad page

Name Date Reason For Changes Version


Government College University Faisalabad page 1

1 Introduction
In today's digital age online platforms serve as a significant medium for communication and information
exchange. However, the increased use of these platforms has also led to the rise of malicious activities,
including the spread of misinformation, hate speech, and other forms of harmful content. To address
these challenges, we introduce the " Monitoring Suspicious Discussion System," a project designed to
identify and monitor suspicious discussions on online platforms.
Goals: The goal of the Monitoring Suspicious Discussion System project is to create a tool that can
identify and track potentially harmful or suspicious conversations. This system aims to analyze discussions
and detect unusual patterns, helping to ensure online safety and prevent malicious activities. The key
objectives include developing algorithms to recognize suspicious language, implementing real-time
monitoring capabilities, and providing alerts when potentially harmful discussions are detected.

1.1 General Information


Information to be provided in this section gives a specific name to the project as well as pertinent
information about the personal involved.

Project Name: Monitoring Suspicious Discussion System


Starting Date: 03-10-2022
_

Controlling Agency: GCUF Final Date:14-01-2023


_
_
Prepared By: 890,916,912 Authorized by: Mam Saima

1.2 Purpose:
There two key purposes for the app are as follow:
Early Detection of Threats:
 Identifying Suspicious Content: The system should be designed to analyze discussions and
conversations for patterns or content that could indicate potential threats, such as terrorism,
cybercrime, or other illicit activities.
 Real-time Monitoring: Providing real-time monitoring capabilities to detect suspicious
discussions.
Government College University Faisalabad page 2

Prevention and Mitigation:


 Alerting Authorities: Once suspicious discussions are detected, the system should have
mechanisms to alert relevant authorities or administrators.

1.3 Project Objective


The project objectives are as follow:

• The one of the key objective of a "Monitoring Suspicious Discussion System" project is to develop
a system that can identify and track discussions or conversations that may involve suspicious or harmful
activities.

1.4 Intended Audience and Reading Suggestions


The Monitoring Suspicious Discussion System project is designed for anyone interested in identifying
and tracking potentially harmful or suspicious conversations online.

1. Intended Audience
 Cybersecurity Professionals
 Data Scientists and Analysts
 Researchers in NLP
2. Reading Suggestions:
 Cybersecurity Journals and Publications
 NLP Research Papers
 Online Safety Guidelines

1.5 Project Scope


Developing a system to monitor and analyze online discussions for suspicious activity, enhancing
security measures to detect and mitigate potential threats.

2 Overall Description
2.1 Product Perspective
It aims to enhance online safety by flagging suspicious discussions in real-time.

2.2 Product Features:


The product has various features:
• Natural Language Processing
• User Behavior Analysis
• User Profiling
• Contextual Analysis
• Real-time Monitoring
• User Reporting System
Government College University Faisalabad page 3

2.3 User Classes and Characteristics:


• Admins: The people in charge, like moderators or administrators.
• Moderators: Users with special permissions to watch over discussions.
• Reporters: Users who can notify admins or moderators about concerning content.
Report anything that seems suspicious or harmful.

2.4 Operating Environment:


The suspicious discussion monitoring system will operate on a server-grade hardware platform,
running on Linux-based servers with CentOS 7. It must ensuring compatibility with MySQL 8 and
Apache 2.4 for optimal performance and security.

2.5 Design and Implementation Constraints:


1. Design Constraints: User Privacy, Scalability, Accuracy, Real-time Processing
2. Implementation Constraints: Data Collection, Algorithm Selection, Security
3. Project Constraint: Budget, Timeline
4. User Experience: User Interface, Feedback Mechanism

2.6 User Documentation:


We release user manual describing product features and usage step by step

2.7 Assumptions and Dependencies:


Assumptions: Users will actively report suspicious discussions.

Dependencies: The implementation of advanced machine learning algorithms depends on the


availability of skilled data scientists.

3 System Features
The product provides the various features to user which are describe as below.

3.1 System Feature


3.2 Description and Priority
Description: A system designed to monitor and identify suspicious discussions or activities online for
security purposes.

Priority: High, as it helps in early detection and prevention of potential threats or harmful content.

3.3 Stimulus/Response Sequences


• User Flags Suspicious Content: User reports suspicious discussion content.
• Moderation Team Review: System updates user on the moderation decision.
Government College University Faisalabad page 4

3.4 Functional Requirements


In the context of our project, this refers to the patterns of communication between participants. In
discussions, a stimulus could be a particular phrase, topic, or behavior that prompts a reaction or
response from others.

3.5 Admin: The admin side of the Web App can perform the following functionalities like.
3.5.1 Approve profile: In which the admin approves the profiles of user which agrees over rules.

3.5.2 Secure Data: Admin teams provide complete security.

3.5.3 Activities Control: Admin and its teams can check all the user activities.

3.6 Module 1:
 Users can register and delete their profiles.
 Reset or recover a forgotten password.

3.6.1 Module 2:
 Create, view and manage discussions.
 Participate in discussions by posting comments.

3.6.2 Module 3:
 Review and make discussion on reported content.
 Ensure the web application is responsive across devices.

4 External Interface Requirements


4.1 User Interfaces
The project component user interface is standardized. So, the user can interact smoothly with
interface.

4.2 Hardware Interfaces


The suspicious discussion monitoring system project incorporates hardware interfaces for real-time data
capture and analysis, enhancing its ability to detect and address potential threats efficiently.
4.3 Software Interfaces
Creating a system to monitor suspicious discussions involves designing software interfaces for real-time
data ingestion, natural language processing (NLP) for content analysis.

4.4 Communications Interfaces


Developing a project for monitoring suspicious discussions with a focus on robust and secure
communication interfaces.
Government College University Faisalabad page 5

5 Other Nonfunctional Requirements


5.1 Performance Requirements
 Ensure the system swiftly identifies and flags potentially suspicious discussions in real-time.

5.2 Safety Requirements


• Ensure real-time analysis of user interactions, promptly flagging and addressing any suspicious or
harmful content, while prioritizing user privacy and data security.

5.3 Security Requirements


• User Authentication: Require users to create accounts with strong, unique passwords.
• Access Control: Define different user roles (e.g., regular user, moderator, admin) with appropriate
access levels.

5.4 Software Quality Attributes


• Reliability: Ensures the system consistently performs its intended functions accurately.
• Security: Protects against unauthorized access and safeguards data integrity.
• Maintainability: Simplifies future modifications and updates while minimizing the risk of
introducing errors.

6 WBS Project Management


Monitoring Suspicious Discussion System
Web Application
Government College University Faisalabad page 6

Description
WBS (work breakdown structure) is a project management technique that takes a step by step procedure to
complete large projects with several moving pieces. By breaking down the project into smaller components,
a WBS can integrate, requirement, design, logical division of App into modules text, development
deliverables into a single tool.
7.1 Analysis Model:
Use Case:

Description
A use case diagram is a written description of how admin, user 1, user 2 will perform tasks in over App.
Government College University Faisalabad page 7

7.2 Class Diagram

Description
A class diagram is a diagram that represents the structure of a system by showing its classes, attributes and
methods, and the relationships between them. In a class diagram classes include admin, user 1, user 2. Admin
class would have attributes like, name, email, password etc. user 1 would have attributes like id, name,
email, use 2 would have attributes like id, user name etc.
Government College University Faisalabad page 8

7.3 Sequence Diagram

Description
A sequence diagram is a diagram that shows the interactions between components in a system. In a
sequence diagram we described the objects would includes admin, user 1, user 2.
Government College University Faisalabad page 9

7.4 Activity Diagram

Description
An activity diagram for the admin app would show the flow of activities that are involved in
managing the app. It would represent the various actions that can perform such as login, add
user, delete user etc.
Government College University Faisalabad page 10

7.6 ERD

Description
An ERD or entity relationship diagram, is a diagram that represents the entities in a system and the
relationships between them. In an ERD diagram would show the relationships between these entities such
as an admin, user 1 and user 2. It is a visual representation of data that can be used to understand and design
database components.

Tools & Technologies

8.1 Programming Languages


PHP, HTML/CSS (Extensible Markup Language)

8.2 Databases/Data storages


MySQL
8.3 Operating System
Windows 10/11
Government College University Faisalabad page 11

Appendix B: Check List

Check List Yes No

I. Starting/Ending Dates Yes

II. Project Scope Yes

III. Product modules (covering all aspects of scope) Yes

IV. System Features (covering scope) Yes

V. Interface Requirements Yes

VI. Non-Functional Requirements Yes

VII. WBS Yes

VIII. Tools and Technologies Detail (for implementation) Yes

IX. Plagiarism Report


Government College University Faisalabad page 12

Appendix C: Supervisory Committee

For Approval of any two Consultant Teachers

Teacher Consulted Teacher Consulted

Name: _ _.
Designation: _ .Comments: _
Name: _ _. _

_
_ _

__
_
_

Signature: _ _
Designation: _ . Signature: _
Comments: _

_
Government College University Faisalabad page 13

(For office use only)


Date:

Approved Group id:

Meeting Required: Date Time: Place:

Rejected

Remarks:
Government College University Faisalabad page 17

Project Title (if Revised):

Project Coordinator

You might also like