SlideShare a Scribd company logo
1 of 4
Web Data Mining For Terrorism Analysis
Terrorism has grown its roots quite deep in certain parts of the world. With increasing terrorist
activities it has become important to curb terrorism and stop its spread before a certain time. So
as identified internet is a major source of spreading terrorism through speeches and videos.
Terrorist organizations use internet to brain wash individuals and also promote terrorist activities
through provocative web pages that inspire helpless people to join terrorist organizations. So
here we propose an efficient web data mining system to detect such web properties and flag them
automatically for human review. Data mining is a technique used to mine out patterns of useful
data from large data sets and make the most use of obtained results. Data mining as well as web
mining are used together at times for efficient system development. Web mining also consists of
text mining methodologies that allow us to scan and extract useful content from unstructured
data. Text mining allows us to detect patterns, keywords and relevant information in unstructured
texts. Both Web mining and data mining systems are widely used for mining from text. Data
mining algorithms are efficient at manipulating organized data sets, while web mining
algorithms are widely used to scan and mine from unorganized and unstructured web pages and
text data available on the internet. Websites created in various platforms have different data
structures and are difficult to read for a single algorithm. Since it is not feasible to build a
different algorithm to suit various web technologies we need to use efficient web mining
algorithms to mine this huge amount of web data. Web pages are made up of HTML (Hyper text
markup language) In various arrangements and have images, videos etc intermixed on a single
web page. So we here propose to use smartly designed web mining algorithms to mine textual
information on web pages and detect their relevancy to terrorism. In this way we may judge web
pages and check if they may be promoting terrorism. This system proves useful in anti terrorism
sectors and even search engines to classify web pages into the category. Their relevancy to the
field helps classify and sort them appropriately and flag them for human review.
Features
 We use web mining algorithms to mine textual information on web pages and detect their
relevancy to terrorism.
 Websites created in different platform can be tracked using this application.
 This system will check web pages whether a webpage is promoting terrorism.
 This system will classify the web pages into various categories and sort them
appropriately.
 There are two features used in this system that is data mining and web mining.
 Data mining is a technique used to mine out patterns of useful data from large data sets
and make the most use of obtained results.
 Web mining also consists of text mining methodologies that allow us to scan and extract
useful content from unstructured data.
 Data mining as well as web mining are used together at times for efficient system
development.
 System will track web pages that are more susceptible to terrorism and will report IP
Address to the user who is using the system.
 This System are used only by the government officials who work for country security.
 System will help the cops to easily track the susceptible community who are held in
terrorism.
Feasibility Study
Our system will detect patterns, keywords and relevant information in unstructured texts in web
page using web mining as well as data mining. Our system will mine webpage using web mining
algorithm to mine textual information on web pages and detect those web pages that are relevant
to terrorism. Data mining as well as web mining is used together at times for efficient result.
 Economic Feasibility
This system will be used by government officials. Since there are many countries
who require protection of their own country. This will provide economic benefits
to the organization. It includes quantification and identification of all the benefits
expected
 Operational Feasibility
This system is more reliable, maintainable, affordable and producible. These are
the parameters which are considered during design and development of this
project. During design and development phase of this project there was
appropriate and timely application of engineering and management efforts to meet
the previously mentioned parameters.
 Technical Feasibility
The back end of this project is SQL server which stores data and other details
which is related to this project. There are basic requirement of hardware to run
this application. This system is developed in .Net Framework using C#. This
application will be online so this application can be accessed by using any device
like (Personal Computers, Laptop and with some hand held devices).
Advantages
 This system will help to reduce terrorism around the world.
 This system proves useful in anti terrorism sectors.
 This system help the cops to track communication held between terrorists.
 This system will detect web pages developed in different platforms.
Disadvantages
 If terrorists communicate in keywords it will be difficult for the cops to track it.
Future Scope
 There can be module where terrorists communicating in code words can be tracked by the
system itself.
 In proposed system, system tracks susceptible IP Address and provides the information to
the officials using the system. In later, system will track particular susceptible person
who is sending messages relevant to terrorism.
Software Requirements:
 Windows
 Sql
 Visual studio 2010
Hardware Components:
 Processor – Dual Core
 Hard Disk – 50 GB
 Memory – 1GB RAM
 Internet Connection
Application
 This system can be used by the cops and other government officials who work for
country security.
References:
 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=1383486&queryText%3DWeb+D
ata+Mining+For+Terrorism+Analysis
 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=4547644&queryText%3DWeb+D
ata+Mining+For+Terrorism+Analysis

More Related Content

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Tnet web data mining for terrorism analysis

  • 1. Web Data Mining For Terrorism Analysis Terrorism has grown its roots quite deep in certain parts of the world. With increasing terrorist activities it has become important to curb terrorism and stop its spread before a certain time. So as identified internet is a major source of spreading terrorism through speeches and videos. Terrorist organizations use internet to brain wash individuals and also promote terrorist activities through provocative web pages that inspire helpless people to join terrorist organizations. So here we propose an efficient web data mining system to detect such web properties and flag them automatically for human review. Data mining is a technique used to mine out patterns of useful data from large data sets and make the most use of obtained results. Data mining as well as web mining are used together at times for efficient system development. Web mining also consists of text mining methodologies that allow us to scan and extract useful content from unstructured data. Text mining allows us to detect patterns, keywords and relevant information in unstructured texts. Both Web mining and data mining systems are widely used for mining from text. Data mining algorithms are efficient at manipulating organized data sets, while web mining algorithms are widely used to scan and mine from unorganized and unstructured web pages and text data available on the internet. Websites created in various platforms have different data structures and are difficult to read for a single algorithm. Since it is not feasible to build a different algorithm to suit various web technologies we need to use efficient web mining algorithms to mine this huge amount of web data. Web pages are made up of HTML (Hyper text markup language) In various arrangements and have images, videos etc intermixed on a single web page. So we here propose to use smartly designed web mining algorithms to mine textual information on web pages and detect their relevancy to terrorism. In this way we may judge web pages and check if they may be promoting terrorism. This system proves useful in anti terrorism sectors and even search engines to classify web pages into the category. Their relevancy to the field helps classify and sort them appropriately and flag them for human review. Features  We use web mining algorithms to mine textual information on web pages and detect their relevancy to terrorism.  Websites created in different platform can be tracked using this application.  This system will check web pages whether a webpage is promoting terrorism.  This system will classify the web pages into various categories and sort them appropriately.  There are two features used in this system that is data mining and web mining.  Data mining is a technique used to mine out patterns of useful data from large data sets and make the most use of obtained results.  Web mining also consists of text mining methodologies that allow us to scan and extract useful content from unstructured data.
  • 2.  Data mining as well as web mining are used together at times for efficient system development.  System will track web pages that are more susceptible to terrorism and will report IP Address to the user who is using the system.  This System are used only by the government officials who work for country security.  System will help the cops to easily track the susceptible community who are held in terrorism. Feasibility Study Our system will detect patterns, keywords and relevant information in unstructured texts in web page using web mining as well as data mining. Our system will mine webpage using web mining algorithm to mine textual information on web pages and detect those web pages that are relevant to terrorism. Data mining as well as web mining is used together at times for efficient result.  Economic Feasibility This system will be used by government officials. Since there are many countries who require protection of their own country. This will provide economic benefits to the organization. It includes quantification and identification of all the benefits expected  Operational Feasibility This system is more reliable, maintainable, affordable and producible. These are the parameters which are considered during design and development of this project. During design and development phase of this project there was appropriate and timely application of engineering and management efforts to meet the previously mentioned parameters.  Technical Feasibility The back end of this project is SQL server which stores data and other details which is related to this project. There are basic requirement of hardware to run this application. This system is developed in .Net Framework using C#. This application will be online so this application can be accessed by using any device like (Personal Computers, Laptop and with some hand held devices). Advantages  This system will help to reduce terrorism around the world.  This system proves useful in anti terrorism sectors.
  • 3.  This system help the cops to track communication held between terrorists.  This system will detect web pages developed in different platforms. Disadvantages  If terrorists communicate in keywords it will be difficult for the cops to track it. Future Scope  There can be module where terrorists communicating in code words can be tracked by the system itself.  In proposed system, system tracks susceptible IP Address and provides the information to the officials using the system. In later, system will track particular susceptible person who is sending messages relevant to terrorism. Software Requirements:  Windows  Sql  Visual studio 2010 Hardware Components:  Processor – Dual Core  Hard Disk – 50 GB  Memory – 1GB RAM  Internet Connection Application  This system can be used by the cops and other government officials who work for country security. References:  http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=1383486&queryText%3DWeb+D ata+Mining+For+Terrorism+Analysis