Abstract

Internet could be a major supply of spreading terrorist act through speeches and videos. Terrorist organizations use net particularly social networks to brain wash people and promote terrorist activities through provocative websites that inspire helpless individuals to affix terrorist organizations. Therefore, here we have a tendency to propose Associate in Nursing economical net data processing system to observe such net properties and flag them mechanically for human review. websites are created from hypertext mark-up language (Hypertext markup language). In numerous arrangements and have pictures, texts etc., intermixed on a single website. Here, we have a tendency to used data processing further as net mining to observe patterns and mine out matter info on websites. Here, we have a tendency to are victimization E-mail System to observe the unwanted messages that are additional prone to terrorist act and can send to the spam on to the recipient who is victimization the system. Despite the speedy increase of cyber threats, there has still been very little analysis into the foundations of the topic or methodologies that would serve to guide info systems researchers and practitioners UN agency touch upon cybersecurity. additionally, very little is thought regarding crime- as-a-service (CaaS), a criminal business model that underpins the crime underground. This analysis gap and also the sensible cybercrime issues we have a tendency to face have impelled North American nation to research the crime underground economy by taking an information analytics approach from a style science perspective. to realize this goal, we: (1) propose a data analysis framework for analyzing the crime underground; (2) propose CaaS and crimeware definitions; (3) propose Associate in Nursing associated classification model, Associate in Nursingd (4) develop an example application to demonstrate however the planned framework and classification model might be enforced in apply. We then use this application to research the crime underground economy by analyzing an oversized knowledge set obtained from the net hacking community. By taking a style science analysis approach, this paper contributes to the planning of the email phishing in the area of cybercrime and the area is to fulfill the data security to the email messages consisting the data and providing them the security using the naïve bayes to planning the International Journal of Scientific Research in Engineering and Management (IJSREM) Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930 © 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12419 | Page 2 industries will harden attacks by the crime underground. Among these, one of the attack is the email phishing. Keywords: CAAS (Crimeware-as-a-Service), ICMP (Internet Control Message Protocol), IRC (Internet Relay Chat), MIB (Management Information Base), CVE (Common Vulnerabilities and Exposures).

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call