Adil Khan 10 months ago
AdiKhanOfficial #FYP Ideas

Active Chat monitoring and Suspicious Chat Detection

The increasing demand of security for chat communication is a large scale  problem which must be noticed .Using internet the chat communication  is going widely and popular in the world but the problem of security for organizational reasons  such as use of wrong conversation  sho

Project Title

Active Chat monitoring and Suspicious Chat Detection

Project Area of Specialization

Cyber Security

Project Summary

The increasing demand of security for chat communication is a large scale  problem which must be noticed .Using internet the chat communication  is going widely and popular in the world but the problem of security for organizational reasons  such as use of wrong conversation  should be matter between two parties or multiple ..Another problem should be notice that using of another applications such as Messenger ,Whats,app and Gmail, a third party such as organization  owner and administration group should do not know the secret conversation of this chat applications if it going against the sensitive organization. The need of this chat monitoring is very important for any secure and sensitive organization such as army and intelligence agencies to monitor the full activities of communication of internal employers because the internal employers are most dangerous threat for any organization.  This project is based on the chatting communication of single or group users while the need of much security for any special internal organization such as defense areas. This project “Active chat monitoring and suspicious chat detection” will handle these like problems for secure organization .Using the dual functionality mode of communication such as Internet mode and intranet mode, both are the secure source of transferring secure communication between sender and receiver and the monitoring of admin.Using the socket programing it’s possible to chat within the organization which is good. Active chat monitoring can handle the overall communication of sender and receiver by using the algorithm of server filtration of chats.. If some bodies use the suspicious keywords which are dangerous for any organization means the requirements of a defense and sensitive organization then it will be monitored by the admin of the system and the admin can have the rights to check the conversation of the users which have violated the rules of organization by miss use of illegal words such as bomb, kill and wanted etc. The suspicious key words must be set by admin for secure and safe communication and if somebody uses it they will target by tracing the IP of the system and can forwarded for further investigation.

Project Objectives

The purpose of the chat application is to allow users be able to the chat with each other, like a normal chat application. The users will be able to chat with each other, most likely only from user to user, no group chatting will be developed, unless there is time to do so .Active chat application is monitoring application for chatting and to control chat over network following are the main objectives and goals.

  • This system will reduce illegal activities held on internet or intranet.
  • This system will provide security for many organization.
  • This system will act as an evidence for investigation.
  • This system can be used by government officials to check any suspicious activities that are going on the this applications.
  • Third parties such as Detective can also this type of system legally.
  • The system is used to track the IP address of both the chatting parties.

Project Implementation Method

The methodology which mostly suit with our Active Chat Monitoring application is the Water Fall Model. The Waterfall Model was the first Process Model to be introduced. It is also referred to as a linear-sequential life cycle model. It is very simple to understand and use. In a waterfall model, each phase must be completed before the next phase can begin and there is no overlapping in the phases.

The waterfall Model illustrates the software development process in a linear sequential flow. This means that any phase in the development process begins only if the previous phase is complete. In this waterfall model, the phases do not overlap.

  • Upfront documentation and planning stages allow for large or shifting teams to remain informed and move towards a common goal.
  • Is simple to understand, follow and arrange tasks.
  • Facilitates departmentalization and managerial control based on schedule or deadlines.
  • Allows for early design or specification changes to be made easily.
  • Clearly defines milestones and deadlines.

Benefits of the Project

Active chat monitoring application  using data mining algorithm for sending and receiving messages. A suspicious key words must be define for suspicious chat detection and takes the monitoring of ongoing messages. The suspicious key words should define according to the need of the organization

Active chat monitoring is best due to the following features

  • Accurate authentication

Due to this feature users have different types such as admin of the system, operators and normal users of the system can login with their specific IDs  and all the users have their special role such as  common user only to use this app  while admin have full rights for this app.

  • User friendly

The active chat monitoring application is so user friendly and the best way to use this application for messages conversation is easy to use it.

  • Adding suspicious key words

Admin have the rights to add the suspicious key words for secure and pure chat communication depending on the needs of the company or organization which type of conversation they wants to allow for the users to communicate with each other.

  • Dual mode of use

User can use both modes of this application such as intranet or internet for their secure communication depending on the need of the users and his secret communication which they wants to do with second user or in the group.

  • Use as a Evidence

If someone violated the rules of  the company by using the suspicious key words in their conversation so they will be interrupted by sending a notification to the admin with their IP addresses and the full messages now the admin can check the record of the user who violated the rules. Now the admin have the rights to use this illegal conversation for as a evidence.           

This system will mostly use in the security organization and sensitive companies where each and word should use according to the rules of an organization. Internal employers can use this application as well it’s good for it because messages  chatting is very important aspect of every society which is needed to provide it for the organization staff but if there came the talk of security then other applications fail to fulfill this need of security to provide it for the third party to see the conversation going between two parties or group of parties because within sensitive organization it’s very important to monitor the communication very well otherwise its will create a lot of problems of security for such sensitive organization. Global security is very important for data sharing during the use of internet path because the monitor is very important also globally. As we see the other chat applications they can’t provide this kind of facility for third party to monitor the conversation of two parties because it’s never include in the policies of such organization so for this we noticed that such kind of application should be developed which fulfill the needs of third party.

Technical Details of Final Deliverable

Working procedure is to very simple by means that it developed like other chat applications but little changes such as the authorities is very high with administration if they wants to add you or remove you and all the users are under the super vision of admin. The using procedure is very simple every user can use it without any worries but if changes from other users then the main thing is the admin section which are denied from other users.

Software Requirements

The software which we use for the development of Desktop Application is;

  • The operating which we use for desktop development was window 10.
  • Database for internal application is SQL Server management studio 2014.
  • For platform development we use Visual studio 2013.
  • The Programming language we use for development is C#.

Hardware Requirements

Items

Processors

Ram

System Storage

Data Server

Memory Space

Requirements for internal System

2x1.6GHz CPU

1GB Ram

240 GB Hardesk for internal storage

1 TB space for data storage.

Items

Requirements for internal System

Final Deliverable of the Project

HW/SW integrated system

Type of Industry

IT

Technologies

Big Data

Sustainable Development Goals

Industry, Innovation and Infrastructure

Required Resources

Elapsed time in (days or weeks or month or quarter) since start of the project Milestone Deliverable
Month 1LiteratureStudy and observe
Month 2Analysis of Proposed ProjectStudy and observe
Month 3Preparation of Projectfind a way of implementation
Month 4Implementation of ProjectStarting of projects
Month 5Module 1Start and complete Module 1
Month 6Module 2Start and complete Module 2
Month 7Module 3Start and complete Module 3
Month 8Module 4Start and complete Module 4
Month 9Result FormulationFinal the Requirements
Month 10Implementation the Project completelyComplete and Test all modules
Month 11AnalysisAchieve the Final Objectives
Month 12Final Write-up & Thesis Submission Complete the Project
If you need this project, please contact me on contact@adikhanofficial.com
Cryptographic Processor Design

Crypto processors are specialized processors that execute cryptographic algorithms within...

1675638330.png
Adil Khan
10 months ago
Python Lab Assignment No 1 - Solved

Python Lab Assignment No 1 - Solved

1675638330.png
Adil Khan
6 years ago
Feasibility of net metering system for common household in Peshawar

Net metering (also known as net energy metering or NEM) is a billing arrangement that allo...

1675638330.png
Adil Khan
10 months ago
Multi election system blockchain based

Web based voting allows the voter to vote from any place in state or out of state. The vot...

1675638330.png
Adil Khan
10 months ago
Recommendation based ordering system using graph database

During the last decades, the online retailing business has globally been experiencing a su...

1675638330.png
Adil Khan
10 months ago