0% found this document useful (0 votes)
53 views

OOMD MIniProject

This document is a project report on creating UML diagrams for a mobile botnet. It includes an introduction describing the threat of malware apps turning mobile devices into bots. It outlines the system requirements including hardware, software, and communication interfaces. It also includes architecture, use case, data flow, and other diagrams to model the mobile botnet. The conclusion states that botnets are a dangerous evolution in malware and the proposed system is useful for detecting mobile botnets. Future work could involve detecting different botnet protocols and constructing a full detection system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

OOMD MIniProject

This document is a project report on creating UML diagrams for a mobile botnet. It includes an introduction describing the threat of malware apps turning mobile devices into bots. It outlines the system requirements including hardware, software, and communication interfaces. It also includes architecture, use case, data flow, and other diagrams to model the mobile botnet. The conclusion states that botnets are a dangerous evolution in malware and the proposed system is useful for detecting mobile botnets. Future work could involve detecting different botnet protocols and constructing a full detection system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

A PROJECT REPORT ON

“Object Oriented Modelling and Design Mini Project UML diagrams for
Mobile Botnet”

SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSITY IN THE PARTIAL


FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE
OF

BACHELOR OF ENGINEERING (COMPUTER ENGINEERING)

SUBMITTED BY

1)Arjun Shinde 22CEBB45


2)Ramakant Dhumal 22CEBA46
3)Swati Hande 22CEBA64
4)Mayur Jagadale 22CEBA45

DEPARTMENT OF COMPUTER ENGINEERING

SKN SINHGAD INSTITUTE OF TECHNOLOGY AND SCIENCE,LONAVALA-410401

Savitribai Phule Pune University, Pune


2022-23

1
CERTIFICATE

This is to certify that the project report entitles

“Object Oriented Modelling and Design Mini Project UML diagrams for Mobile Botnet”
Submitted by,

1)Arjun Shinde 22CEBB45


2)Ramakant Dhumal 22CEBA46
3)Swati Hande 22CEBA64
4)Mayur Jagadale 22CEBA45

Is a bonafide student of this institute and the work has been carried out by him under the supervision
of Dr.S.M.Patil and it is approved for the partial fulfillment of the requirement of SavitribaiPhule Pune
University, for the award of the degree of Bachelor of Engineering (ComputerEngineering)

(Dr.S.M.Patil) (Dr. S.M Patil)


Guide Head,
Department of Computer Engineering Department of Computer Engineering

(Dr. M.S.Rohokale)
Principal,
SKN Sinhgad Institute of Technology and Science
Lonavala

2
ACKNOWLEDGEMENT

The present world of competition there is a race of existence in which those


are having will to comeforward succeed. Project is like a bridge between theoretical and practical
working. With this willingwe joined this particular project. First of all, we would like to thank the
supreme power the AlmightyGod who is obviously the one has always guided us to work on the right
path of life.

I sincerely thank Dr. S.M Patil sir Head of the Department of Computer
Science of SKN Sinhgad Institute of Technology and Science, for all the facilities provided to me in
the pursuit of this project.

I am indebted to my project guide Dr.S.M.Patil Department of Computer


Science of SKN Sinhgad Institute of Technology and Science. I feel it’s a pleasure to be indebted to
our guide for her valuable support, advice and encouragement and we think her for his superb and
constant guidance towards this project.

I am deeply grateful to all the staff members of CS department, for supporting me in all aspects.

I acknowledge my deep sense of gratitude to my loving parents for being a constant source of
inspiration and motivation.

3
Sr.No. Title Page No.
01 Introduction 5

02 System Requirements 6

03 Diagrams 7

04 Conclusion and Future Enhancements 13

4
INTRODUCTION

Android, being the most widespread mobile operating system is increasingly


becoming a target for malware. Malicious apps designed to turn mobile devices
into bots that may form part of a larger botnet have become quite common, thus
posing a serious threat. This calls for more effective methods to detect botnets on
the Android platform. Hence, in this paper, we present a deep learning approach
for Android botnet detection based on Convolutional Neural Networks (CNN).
Our proposed botnet detection system is implemented as a CNN-based model
that is trained on 342 static app features to distinguish between botnet apps and
normal apps.

5
SYSTEM REQUIREMENTS

Hardware Interface:
➢ Core i5 processor
➢ 4 GB RAM
➢ 20 GB of hard disk space

Software Interface:
➢ PostgreSQL database connectivity
➢ Machine Learnings

Communication Interface
➢ Front end: HTML, CSS, Bootstrap, JavaScript, JQuery
➢ Back end: SVM (Support Vector Machine)

Scope:

➢ Botnets are commonly used to send spam emails, engage in click fraud campaigns and generate malicious traffic for
distributed denial-of-service

6
DIAGRAMS

1. Architecture Diagram

7
• Use-Case Diagram:

8
• Data Flow Diagram

Level 0 DFD

9
Level 1 DFD

10
CONCLUSION

Botnets are a Dangerous evolution in the malware world. They are being used to
damage systems, steal information, and Comprise Systems. They are hard to
detect and eliminate. So, Our System Is Useful To detect Mobile Botnet. In this
study, a feature selection method for detecting botnet viruses is proposed, which
is the AFSA-SVM method. Based on the experimental results, using the AFSA
yielded only slightly higher classification accuracies than using the GA, but less
time was spent to obtain a lesser number of feature subsets.

11
Future Enhancement

The result also shows that both GA and AFSA can still be applied for identifying the critical
features of botnets, filtering unnecessary features, and using these algorithms in various
applications easily. In our research, an IRC botnet was collected as the data set; however,
in real-world situations, botnet viruses are constantly changing, and an increasing number
of botnet viruses are using peer-to-peer (P2P) or other protocols as the attack method.
Therefore, in future studies, the proposed method must be tested for detecting P2P protocols
or other types of botnet viruses. Finally, a feature-selection-based detection system for
detecting botnet viruses can hopefully be constructed in the future.

12

You might also like