Professional Documents
Culture Documents
■ LOW SECURITY
■ POOR ANALIZING
■ SPAM FILES
■ SHOW VULNERABILITES
Proposed System:
■ In our proposed system, high effective authentication with the purpose of log on to web
service securely.
■ Intrusion detection system is available.
■ Sharing of text files and privacy options are also available.
■ Pattern classifiers such as Spam Filters are present.
■ Administrator of the service maintains a repository to filter out spam domains and
keywords.
■ Administrator will monitor all the users activities.
Advantages of Proposed system:
■ HIGH SECURITY
■ INTRUCTION DETECTION
■ EFFECTIVE FILE SHARING
■ HIGH EFFECTIVE AUTHENTICATION
System Architecture:
Database
Modules:
■ PATTERN CLASSIFIER
■ SECURITY
■ SPAM FILTER
Spam Filter:
Intrusion detection systems are available which will prevent the intruders form entering in
to the website.
Two main kinds of ids exits: Anomaly detectors and Intruder Identifier.
■ Anomaly detector.
■ Intruder Identifier.
Spam Filter:
■ A Classifier has to discriminate between legitimate and spam emails on the basis of
their textual content.
■ The bag-of-words feature representation has been chosen.
UML Diagrams:
19
Using Invalid Password with correct Image and Username.
20
Using Valid Username, Password and Image.
21
Testing on Intrusion Detection System:
Trying to enter into the same user name repeated number of times resulting in account block.
22
The Attacker’s system IP address and Time of the attack details are displayed to the Admin.
23
User can request the Admin to activate the Account the admin can activate the account using blocked users table.
24
Testing on Spam Filter:
25
File has been updated into the server and by clicking the Apply Spam Filter button we can apply Spam Filter to the File.
26
Files before and after applying Spam Filter.
27
More Project Execution Screenshots:
Home Page
28
Registration Page
29
Admin Login Page
30
User Welcome Page
31
Admin Welcome Page
32
User details page for Admin to monitor user and Activate & deactivate Account.
33
User actions monitor by Admin all uploads and downloads can be visible to Admin.
34
Email notifications to user when ever account has been activated and deactivated.
35
Conclusion:
Our main contribution is a framework for empirical security evaluation that formalizes and
generalizes ideas from previous work.
Future Enhancement:
■ Our future work will be devoted to develop techniques for simulating attacks for
different applications.
■ An intrinsic limitation of our work is that security evaluation is carried out empirically,
and it is thus data dependent.
■ Although the design of secure classifiers is a distinct problem than security evaluation,
our framework could be also exploited to this end.
Any Queries Please?
Thank you!