Automated data collection has encouraged the use of data mining for intrusion and crime detection. Indeed, banks, large corporations, insurance companies, casinos, etc. are increasingly mining data about their customers or employees in view of detecting potential intrusion, fraud or even crime. In many organization intruders are identified by their outer look or by other sensitive attributes like gender, race or religion. This will not help to detect correct intruder. Detecting the intruder based on the sensitive attributes will not help to detect the correct intruder as well as it will lead to discrimination of particular person. Identifying the intruder by sensitive attributes is wrong method to detect the potential intruder. Our proposed system will detect the objective misbehavior of the potential intruder, rather than from sensitive attributes like gender, race or religion. Legal data will be stored in database based on these data intruder will be detected rather than sensitive attributes. Legal data includes behavior of past crime done by the intruder. If system identifies any suspected intruder, system will mine the data in database. These data will be compared with the behavior of the suspected person. If these data matches than system will declare the person to be potential intruder or criminal. Therefore, legitimate classification rules can still be extracted but discriminating rules based on sensitive attributes cannot.
Features:
-
Identifies criminal, based on the past data stored in database.
-
Compares the pattern of the suspected person with the pattern of past criminal. Based on these comparison system will detect whether the person is intruder or not.
-
System will detect the objective misbehavior of the potential intruder, rather than sensitive attributes like gender, race etc.
-
If system identifies any suspected intruder, system will mine the data in database. Based on these data system will detect the intruder.
-
Legal data will be stored in database based on these data system will suspect the criminal.
-
This system can be used in many government or private organizations where security plays a major role.
-
This system will be useful to reduce crime around the country.
-
Feasibility Study
Our proposed system will detect the intruder or criminal based on the objective misbehavior of the potential intruder, rather from sensitive attributes like gender, race or religion. Legal data will be stored in database based on these data, intruder will be detected rather than sensitive attributes. Legal data includes misbehavior of past crime done by the potential intruder.
-
Economic Feasibility
This system can be used in many government and private organization. This system will capture the objective misbehavior of the intruder. This system requires server which will manage data related to system. This will provide economic benefits to the organization. It includes quantification and identification of all the benefits expected.
-
Operational Feasibility
This system is more reliable, maintainable, affordable and producible. These are the parameters which are considered during design and development of this project. During design and development phase of this project there was appropriate and timely application of engineering and management efforts to meet the previously mentioned parameters.
-
Technical Feasibility
The back end of this project is SQL server which stores parameters related to behavior of the intruder and other details which is related to this project. There are basic requirement of hardware to run this application. This system is developed in .Net Framework using C#. This application will be online so this application can be accessed by using any device like (Personal Computers, Laptop and with some hand held devices).
Advantages
-
This system can be used in many government or private organizations where security plays a major role.
-
This system will be helpful to reduce fraud or crime.
-
This system can be used in many banking sectors for security purpose.
Disadvantages:
-
As the system suspects only those intruder whose pattern matches with the past criminal. If the intruder uses new pattern system might not suspect the intruder.
Future Scope
-
There can be a module where criminal personal data will be displayed along with his image.
Software Requirements:
-
Windows
-
Sql
-
Visual studio 2010
Hardware Components:
-
Processor – Dual Core
-
Hard Disk – 50 GB
-
Memory – 1GB RAM
-
Internet Connection
Application:
-
This system can be used by many firms where security plays a major role.