Académique Documents
Professionnel Documents
Culture Documents
S.LAKSHMI PRIYA
REG NO: 412816621314
Software Requirements
Platform : Windows Xp/7/8
Front End : DOT NET(Visual Studio 2010)
PREDICTING SOURCE
SERVER AND DESTINATION –
FINDING OF SPECIFIC PLACE
OF ATTACK
UML DIAGRAMS:
USE CASE:
CLASS DIAGRAM:
SEQUENCE DIAGRAM:
ACTIVITY DIAGRAM:
DATAFLOW DIAGRAM:
Level 0:
Finding Criminals-Fields:
Level 1:
Final identification of Attack Fields:
DATABASE DESIGN:
Criminal_details:
Location_details:
Pattern_details:
SYSTEM IMPLEMENTATION:
Module Description:
Implementation is the stage of the project when the
theoretical design is turned out into a working system.
Terrorists information Feed Module
Travel Pattern Feed Module
Attacking Type – Mining Module
Attacking Location – Mining Module
Finalized Attacking Pattern Define Module
Google Maps Integration Module
Terrorists Information Feed Module:
T1. Criminal Details As expected Providing Uploaded
correct with successful
required details
T2. Criminal Details Not entering Provide all the Enter all the
all the fields required Fields required Fields
T3. Criminal Activity As expected Correct successful
T4. Attack Place As expected Providing
correct with successful
required details
CONCLUSION:
This is used to find out the place of the terrorists and the
possible attacks. Strategies based on new technologies are
raising questions about regulations and the lack of global
frameworks on a range of issues from cybersecurity to privacy
and confidentiality of data.
This project features includes,
Identifying the pattern of attacks by the terrorist based on the
previous mined data.
Identifying the attack pattern through which the terrorist can
attack. This can be retrieved on the previous mined data.
Integrating with Google maps to identify the real travel
pattern of the terrorists.
This project provides an innovation in the field of cyber crime
and it really a needy one in the current situation in India.
FUTURE ENHANCEMENT: