Professional Documents
Culture Documents
S.LAKSHMI PRIYA
REG NO: 412816621314
Software Requirements
Platform : Windows Xp/7/8
Front End : DOT NET(Visual Studio 2010)
PREDICTING SOURCE
SERVER AND DESTINATION –
FINDING OF SPECIFIC PLACE
OF ATTACK
DATAFLOW DIAGRAM
Level 0
Finding Criminals-Fields
Level 1
Final identification of Attack Fields
UML DIAGRAMS
USE CASE
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
DATABASE DESIGN
Criminal_details
Location_details
Pattern_details
SYSTEM IMPLEMENTATION:
Module Description
Implementation is the stage of the project when the
theoretical design is turned out into a working system.
Terrorists information Feed Module
Travel Pattern Feed Module
Attacking Type – Mining Module
Attacking Location – Mining Module
Finalized Attacking Pattern Define Module
Google Maps Integration Module
Terrorists Information Feed Module
T1. Criminal name As expected Providing Uploaded
correct with successful
required details
T2. Criminal name Not entering Provide all the Enter the
criminal name required Fields criminal name
T3. Criminal As expected Correct Uploaded
activities successful
Not entering
T4. Criminal criminal Providing Enter the
activities activities correct with criminal
required details activities
SCREENSHOTS
Mining Travel Pattern
Adding Criminal Name and Activities-Test Case
Added Criminal Details-Loaded
Message
Viewing Criminal Lists
Viewing Criminal Activity
Viewing Travel Plans
Type of Attack places and Activities
Mining Attack places and Activities
Final Prediction
Google Map Integration
Viewing the Place of Attack
Project Report - Prediction Accuracy
CONCLUSION:
This is used to find out the place of the terrorists and the
possible attacks. Strategies based on new technologies are
raising questions about regulations and the lack of global
frameworks on a range of issues from cybersecurity to privacy
and confidentiality of data.
This project features includes,
Identifying the pattern of attacks by the terrorist based on the
previous mined data.
Identifying the attack pattern through which the terrorist can
attack. This can be retrieved on the previous mined data.
Integrating with Google maps to identify the real travel
pattern of the terrorists.
This project provides an innovation in the field of cyber crime
and it really a needy one in the current situation in India.
FUTURE ENHANCEMENT: