Open Access   Article Go Back

Analysis of Security Threats using Machine Learning and Cloud Computing Technology

Prajwal Kulkarni1 , Sneha Pattar2 , Gopal Krishna Shyam3

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 32-35, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.3235

Online published on May 15, 2019

Copyright © Prajwal Kulkarni, Sneha Pattar, Gopal Krishna Shyam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Prajwal Kulkarni, Sneha Pattar, Gopal Krishna Shyam, “Analysis of Security Threats using Machine Learning and Cloud Computing Technology,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.32-35, 2019.

MLA Style Citation: Prajwal Kulkarni, Sneha Pattar, Gopal Krishna Shyam "Analysis of Security Threats using Machine Learning and Cloud Computing Technology." International Journal of Computer Sciences and Engineering 07.14 (2019): 32-35.

APA Style Citation: Prajwal Kulkarni, Sneha Pattar, Gopal Krishna Shyam, (2019). Analysis of Security Threats using Machine Learning and Cloud Computing Technology. International Journal of Computer Sciences and Engineering, 07(14), 32-35.

BibTex Style Citation:
@article{Kulkarni_2019,
author = {Prajwal Kulkarni, Sneha Pattar, Gopal Krishna Shyam},
title = {Analysis of Security Threats using Machine Learning and Cloud Computing Technology},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {32-35},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1084},
doi = {https://doi.org/10.26438/ijcse/v7i14.3235}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.3235}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1084
TI - Analysis of Security Threats using Machine Learning and Cloud Computing Technology
T2 - International Journal of Computer Sciences and Engineering
AU - Prajwal Kulkarni, Sneha Pattar, Gopal Krishna Shyam
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 32-35
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

Theatrical Events of fear like Terrorism based operations have be sighted everywhere throughout the world. This surveillance system analyses and speculates the possible suspects depending upon their conducts, records them into Watch-List, classifies them and stores their images in the Government cloud. Whenever the suspects in the Watch-List land at any Local camera resembling movement cams, Metro stations and Airports which are served by the government cloud, it recognizes them using facial recognition software. Instantly the framework alarms the experts and significant information is sent to the Military Intelligence. Based on the rundowns and photos gathered by the Military surveillance systems, they coordinate with the machine which utilizes facial acknowledgment programming to perceive the suspects in nearby reconnaissance cameras which are served by the administration cloud. The most problems faced is issues of privacy, there is a strict law for invading of public privacy just on suspicion without any proof. Hence its not possible for putting a surveillance on any individual. This machine resolves as it provides physical proofs of why that individual is being surveillance, moreover even common crimes within the city could be stopped by the local authority as facial recognition spots this individual in any camera. The application of this machine is limitless as terabytes of data is available in the local cloud just the accumulating this data and processing through proper channel is necessary

Key-Words / Index Term

Terrorism, machine learning, Local Cloud, Government Cloud

References

[1] Andrey I. Kapitanov, Ilona I. Kapitanova,Vladimir M. Troyanovskiy, Vladimir F. Shangin, Nikolay O. Krylikov National Research University of Electronic Technology Zelenograd, Moscow, Russia Approach to Automatic Identification of Terrorist and Radical
Content in Social Networks Messages, 2018
[2] Norshuhani Zamin: A Comprehensive Survey on Security in Cloud
Computing, 2009 Computation World:
[3] Vassilis Plachouras Thomson Reuters, Corporate Research and Development 1 Mark Square, London, EC2A 4EG, United Kingdom Email: vassilis.plachouras@thomsonreuters.com Information Extraction of Regulatory Enforcement Actions: From Anti-Money Laundering Compliance to Countering Terrorism Finance, 2015
[4] Jochen L. Leidner Thomson Reuters, Corporate Research and Development 1 Mark Square, London, EC2A 4EG, United Kingdom Email: jochen.leidner@thomsonreuters.com Information Extraction of Regulatory Enforcement Actions: From Anti-Money Laundering Compliance to Countering Terrorism Finance, 2015
[5]https://www.cfr.org/backgrounder/tracking-down-terrorist-financing,
2019
[6] B.Thuraisingham.: and Counter-Terrorism. CRS Press / Chapman Hall, Web Data Mining and Applications in Business, 2015
[7]https://www.cfr.org/backgrounder/tracking-down-terrorist-financing,
2019