You are on page 1of 39

SECURITY EVALUATION OF PATTERN

CLASSIFIERS UNDER ATTACK

Team members: Pavani Erla (15W91A05J3)


Vamshi Krishna Noora(15W91A05L4)
Ramesh Mudavath(15W91A05L2)
Vaishnavi P M(15W91A05L9)
Project Guide:
Mr. K. Rajiv.
Assistant Professor.
Abstract:

Pattern classification systems are commonly used in adversarial applications, like


biometric authentication, network intrusion detection, and spam filtering, in which data
can be purposely manipulated by humans to undermine their operation.
Existing System:

■ Normally authentications for logging in to the services provided by web application by


means of username and password characters.
■ Sharing of text files is available in existing system.

■ Evaluation of the spam files is not available.

■ There no administrator to monitor user activities.


Disadvantages of Existing system:

■ LOW SECURITY
■ POOR ANALIZING
■ SPAM FILES
■ SHOW VULNERABILITES
Proposed System:

■ In our proposed system, high effective authentication with the purpose of log on to web
service securely.
■ Intrusion detection system is available.
■ Sharing of text files and privacy options are also available.
■ Pattern classifiers such as Spam Filters are present.
■ Administrator of the service maintains a repository to filter out spam domains and
keywords.
■ Administrator will monitor all the users activities.
Advantages of Proposed system:

■ HIGH SECURITY
■ INTRUCTION DETECTION
■ EFFECTIVE FILE SHARING
■ HIGH EFFECTIVE AUTHENTICATION
System Architecture:

Database
Modules:

■ PATTERN CLASSIFIER
■ SECURITY
■ SPAM FILTER
Spam Filter:

■ Pattern classification as Multimodal biometric systems for personal identity recognition.


■ It has been shown that combining information coming from different biometric traits can
overcome the limits and the weaknesses inherent in every individual biometric.
■ It can achieve this by connecting password and the biometric authentication.
Security module:

Intrusion detection systems are available which will prevent the intruders form entering in
to the website.
Two main kinds of ids exits: Anomaly detectors and Intruder Identifier.
■ Anomaly detector.
■ Intruder Identifier.
Spam Filter:

■ A Classifier has to discriminate between legitimate and spam emails on the basis of
their textual content.
■ The bag-of-words feature representation has been chosen.
UML Diagrams:

■ Use case diagram


■ Class diagram
■ Sequence diagram
■ Activity diagram
■ State chart diagram
Usecase Diagram:
Class Diagram:
Sequence Diagram:
Activity Diagram:
State chart diagram:
Testing and Results:

■ The purpose of testing is to discover errors.


■ Testing is the process of trying to discover every conceivable fault or weakness in a
work product.
■ It provides a way to check the functionality of
■ Components sub assemblies, assemblies and/or a finished product
■ It is the process of exercising software with the intent of ensuring that the Software
system meets its requirements and user expectations and does not fail in an unacceptable
manner
Testing on Multimodal Biometric system:

Using Invalid Image with correct Password and Username.

19
Using Invalid Password with correct Image and Username.

20
Using Valid Username, Password and Image.

21
Testing on Intrusion Detection System:

Trying to enter into the same user name repeated number of times resulting in account block.

22
The Attacker’s system IP address and Time of the attack details are displayed to the Admin.

23
User can request the Admin to activate the Account the admin can activate the account using blocked users table.

24
Testing on Spam Filter:

Upload the file into the system after user login.

25
File has been updated into the server and by clicking the Apply Spam Filter button we can apply Spam Filter to the File.

26
Files before and after applying Spam Filter.

27
More Project Execution Screenshots:

Home Page

28
Registration Page

29
Admin Login Page

30
User Welcome Page

31
Admin Welcome Page

32
User details page for Admin to monitor user and Activate & deactivate Account.

33
User actions monitor by Admin all uploads and downloads can be visible to Admin.

34
Email notifications to user when ever account has been activated and deactivated.

35
Conclusion:

Our main contribution is a framework for empirical security evaluation that formalizes and
generalizes ideas from previous work.
Future Enhancement:

■ Our future work will be devoted to develop techniques for simulating attacks for
different applications.
■ An intrinsic limitation of our work is that security evaluation is carried out empirically,
and it is thus data dependent.
■ Although the design of secure classifiers is a distinct problem than security evaluation,
our framework could be also exploited to this end.
Any Queries Please?
Thank you!

You might also like