Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

A

MAJOR PROJECT REPORT ON

“ANALYZING AND DETECTING MONEY-LAUNDERING IN


ONLINE SOCIAL NETWORKS”
A project report submitted in partial fulfillment of the requirement for the
award of degree of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
By
MUCHU MANISHA 20D05A0546

MYAKALA JYOTHI 20D05A0549

N.PRAKASH REDDY 20D05A0551

MD. ADNAN AHMED 20DO5A0543


Under the guidance of

Mr. B. MANOHAR, M.Tech, Ph.D.


Assistant professor, CSE Department

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

ST.MARY’S GROUP OF INSTITUTIONS

(APPROVED BY A.I.C.T.E., NEW DELHI-AFFILIATED TO J.N.T.U,


HYDERABAD) Deshmukhi(V), Pochampally (M), Yadadri Bhuvanagiri Dist.,
Telangana.
Batch: 2020-2024
ST.MARY’S GROUP OF INSTITUTIONS

(APPROVED BY A.I.C.T.E., NEW DELHI-AFFILIATED TO


J.N.T.U,HYDERABAD)

Deshmukhi(V), Pochampally (M), Yadadri Bhuvanagiri Dist., Telangana.

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CERTIFICATE

This is certified that the project entitled, “Building an intrusion detection system using a
filter-based feature selection algorithm” is being submitted by MUCHU
MANISHA(20D01A0546), MYAKALA JYOTHI(20D01A0549), N.PRAKASH
REDDY(20D01A0551), MD.ADNAN AHMED(20D01A0543) in partial fulfillment of the
requirements for the award of Degree of BACHELOR OF TECHNOLOGY in
COMPUTER SCIENCE & ENGINEERING from St.MARY’S
GROUP OF INSTITUTIONS is a bonafide work carried out by them during the academic
year 2023-2024 under our guidance and supervision.

Guide Head of the Department

Mr. B. MANOHAR, M.Tech., Ph.D Dr. S. Joy Kumar, M.Tech., Ph.D

EXTERNAL EXAMINER
DECLARATION

We declare that the work report in this titled, " ANALYZING AND DETECTING
MONEY-LAUNDERING IN SOCIAL NETWORKS” submitted to the Department of
Computer Science and Engineering, St. Mary's Group Of Institutions in fulfillment of
degree for the award of Bachelor of Technology, is a bonafide work done by us. No part
of the copied from books, journals or internet and wherever the portion is taken,the same has
been duly referred in the text. The reported results are based on the projects work entirely
done by us and not copied from any other sources. Also ,we declare that the matter embedded
in this has not been submitted by us in full or partially there for the award of any degree of
any other institution or university previously.

MUCHU MANISHA 20D05A0546

MYAKALA JYOTHI 20D05A0549

N.PRAKASH REDDY 20D05A0551

MD. ADNAN AHMED 20DO5A0543


ACKNOWLEDGEMENT

We wish to regard a deep sense of gratitude to my guide Mr.B.MANOHAR, M.tech., Ph.D.,


Assistant Professor, Department of Computer Science and Engineering, ST.MARY’S
GROUP OF INSTITUTIONS who has guided and motivated with scholarly advice,
meticulous care and deep interest throughout the project duration. He has been a constant
source of encouragement and offered valuable guidance and suggestions from time to time
and helped us at various stages of the project work. His motivation has been a source of
inspiration and a model for us to follow. We wish to acknowledge our sincere gratitude to
Dr.S.Joy Kumar M.Tech., Ph.D, Assistant Professor, Head of the Department of CSE,
ST.MARY’S GROUP OF INSTITUTIONS, Deshmukhi, for permitting us to do the project
and giving all sorts of encouragement and scholarly guidance throughout the project work.

We express my sincere thanks and gratitude to Dr.K.Kamal.Has, Professor &


Principal, St.MARY’S GROUP OF INSTITUTIONS HYDERABAD, Deshmukhi, for
having provided with all the facilities of the department to complete this dissertation work
successfully.

We greatly indebted to Dr.K.V.K.Rao, chairman of the college for giving us the


opportunity and moral support throughout the course.

Finally, We wish to express deep sense of gratitude to my family, friends and our
college staff members and laboratory staff of Computer Science Department who helped us
in completing this project work successfully.

MUCHU MANISHA 20D05A0546

MYAKALA JYOTHI 20D05A0549

N.PRAKASH REDDY 20D05A0551

MD.ADNAN AHMED 20DO5A0543


ABSTRACT
Virtual currency in online social networks (OSN) plays an increasingly important role in
supporting various financial activities such as currency exchange, online shopping, and paid
games. Users usually purchase virtual currency using real currency. This fact motivates
attackers to instrument an army of accounts to collect virtual currency unethically or illegally
with no or very low cost and then launder the collected virtual money for massive profit.
Such attacks not only introduce significant financial loss of victim users, but also harm the
viability of the ecosystem. It is therefore of central importance to detect malicious OSN
accounts that engage in laundering virtual currency. To this end, we extensively study the
behaviors of both malicious and benign accounts based on operation data collected from
Tencent QQ, one of the largest OSNs in the world. Then, we devise multi-faceted features
that characterize accounts from three aspects including account viability, transaction
sequences, and spatial correlation among accounts. Finally, we propose a detection method
by integrating these features using a statistical classifier, which can achieve a high detection
rate of 94.2% at a very low false positive rate of 0.97%.
CONTENTS

CHAPTER TOPIC PAGE NO

1. INTRODUCTION 1

2. SYSTEM ANALYSIS 5

2.1 DEFINITION 3

2.2 EXISTING SYSTEM 3

2.3 PROPOSED SYSTEM 4

2.4 SYSTEM STUDY 5

3. SYSTEM DESIGN 12

3.1 DEFINITION 6

3.2 SYSTEM MODULES 7

3.2.1 USER REGISTRATION 6

3.2.2 VIEW AND AUTHORIZE USERS 6

3.2.3 FRIEND REQUEST AND RESPONSE 7

3.2.4 BUYERS 7

3.3 INPUT DESIGN 7

3.4 OUTPUT DESIGN 8

3.5 SYSTEM ARCHITECTURE 9

3.6 LOGICAL DESIGN 12

4. SYSTEM SPECIFICATIONS 13

4.1 HARDWARE REQUIREMENTS 13


4.2 SOFTWAREREQUREMENTS 13

5. SYSTEM ENVIRONMENT 14

6. SAMPLE CODE 30

7. SYSTEM TESTING 43

7.1 TYPES OF TESTS 40

7.2 TEST STRATEGY AND APPROACH 42

7.3 ACCEPTANCE TESTING 43

8. OUTPUT SCREENS 49

9. CONCLUSION 50

BIBLIOGRAPHY 52
LIST OF FIGURES

S NO FIGURE NO TOPIC PAGE NO

1. FIGURE 3.1 SYSTEM ARCHITECTURE 9

2. FIGURE 3.2 USECASE DIAGRAM 10

3. FIGURE 3.3 CLASS DIAGRAM 11

4. FIGURE 3.4 SEQUENCE DIAGRAM 12

5. FIGURE 5.1 JAVA PROGRAMMING 18

6. FIGURE 5.2 JAVA EXECUTION 19

7. FIGURE 5.3 JAVA PLATFORM 25

8. FIGURE 5.3 JAVA APPLICATION 26

9. FIGURE 8.1 HOME PAGE 44

10. FIGURE 8.2 SOCIAL NETWORK LOGIN 44

11. FIGURE 8.3 SOCIAL NETWORK HOME 45

12. FIGURE 8.4 VIEW ALL BUYERS & AUTHORIZE 45

13. FIGURE 8.5 VIEW ALL ECOMMERCE USERS 46

14. FIGURE 8.6 VIEW ALL PRODUCTS 46

15. FIGURE 8.7 PRODUCT REVIEW DETAILS 47

16. FIGURE 8.8 VIEW ALL PURCHASED PRODUCTS 47

17. FIGURE 8.9 VIEW ALL MONEY LAUNDERING ACCOUNTS 48

18. FIGURE 8.10 USER REGISTRATION 48

19. FIGURE 8.11 ECOMMERCE USER LOGIN 49

You might also like