TABLE OF CONTENTS
S.NO CHAPTER NAME OF THE CONTENT PAGE.NO
BONAFIED CERTIFICATE
ACKNOWLEDGEMENT
DECLARATION
ABSTRACT
LIST OF CONTENTS
LIST OF FIGURES
LIST OF TABLES
ABBRIVATIONS
CHAPTER -1 INTRODUCTION
1.1 PROJECT INTRODUCTION
1.2 LITERATURE SURVEY
CHAPTER -2 SYSTEM ANALYSIS
2.1 EXISTING SYSTEM
2.1.1 DIS ADVANTAGES OF EXISTING SYSTEM
2.2 PROPOSED SYSTEM
2.2.1 ADVANTAGES OF PROPOSED SYSTEM
2.3 SYSTEM STUDY
2.3.1 FEASIBILITY STUDY
2.3.2 ECONOMICAL FEASIBILITY
2.3.3 TECHNICAL FEASIBILITY
2.3.4 SOCIAL FEASIBILITY
2.3.5 OPERATIONAL FEASIBILITY
CHAPTER -3 REQUIREMENT SPECIFICATIONS
3.1 HARDWARE REQUIREMENTS
3.2 SOFTWARE REQUIREMENTS
CHAPTER -4 TECHNOLOGIES USED
4.1 MACHINE LEARNING AND ARTIFICIAL
INTELLIGENCE
4.1.1 ROLE OF MACHINE LEARNING
4.1.2 MACHINE LEARNING ALGORITHMS USED
4.2 PYTHON
4.2.1 PYTHO PROGRAMMING LANGUAGE
4.2.2 LIBRARIES USED
4.3 DATASET SOURCES
4.3.1 KAGGLE DATASET
CHAPTER -5 SYSTEM DESIGN
5.1 RANSOMWARE DETECTION FRAMEWORK
5.1.1 OVERVIEW
5.1.2 DATA PREPROCESSING AND FEATURE
EXTRACTION
5.1.3 MODEL SELECTION AND TRAINING
5.1.4 IMPLEMENTATION DETAILS
5.2 ARCHITECTURE OF DETECTION SYSTEM
5.2.1 SYSTEM FLOW DIAGRAM
5.2.2 METHODOLOGY OF THE PROPOSED
ALGORITHM
5.2.3. RANDOM FOREST
5.2.4 SUPPORT VECTOR MACHINE
5.2.5 K-NEAREST NEIGHBORS
5.3 UML DIAGRAMS
5.3.1 CLASS DIAGRAM
5.3.2 USE CASE DIAGRAM
5.3.3 SEQUANCE DIAGRAM
5.3.4 ACTIVE DIAGRAM
5.3.5 COMPONENT DIAGRAM
CHAPTER -6 CODING AND IMPLEMENTATION
6.1 SOURCECODE
6.1.1 PREPROCESSING SCRIPTS
6.1.2 TRAINING SCRIPTS
6.1.3 TESTING AND EVALUATION SCRIPTS
CHAPTER -7 SYSTEM TESTING
7.1 INTRODUCTION
7.2 TESTING & VALIDATIONS
7.2.1 UNIT TESTING
7.2.2 INTEGRATION TESTING
7.2.3 FUNCTIONAL TESTING
7.2.4 SYSTEM TESTING
7.2.5 WHITE BOX TESTING
7.2.6 BLACK BOX TESTING
7.2.7 ACCEPTANCE TESTING
7.2.8 TEST CASES
CHAPTER -8 SCREENSHOTS
RESULT AND SCREENSHOTS
CHAPTER -9 CONCLUSIONANDFUTURE ENHANCEMENT
9.1 CONCLUSION
9.2 FUTURE ENHANCEMENT
CHAPTER -10 REFERENCES