1 / 20

Group 5

Group 5. Abhishek Das, Bharat Jangir. Project Overview. We received a total responses of 119 responses. The division of the responses were as follows: – 73 surveymonkey.com – 26 Facebook and Reddit – 20 Friends, Email and on paper responses.

torn
Download Presentation

Group 5

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Group 5 Abhishek Das, Bharat Jangir.

  2. Project Overview • We received a total responses of 119 responses. • The division of the responses were as follows: – 73 surveymonkey.com – 26 Facebook and Reddit – 20 Friends, Email and on paper responses. • We first divided the task of collection from various sources in different parts: – Bharat Jangir from Surveymonkey.com – Abhishek Das from Facebook, Reddit – Kevin Talmagde from Friends, Email and on paper

  3. Surveymonkey.com Benefits • Easy to use • Secured • Trusted website • We can format the results obtained in various different ways. • Easy registration process and free

  4. Survey Overview. • We decided to keep the survey short to increase the number of responses otherwise people tend to lose interest. We wanted questions to be ubiquitous. • We then trimmed our question set from 18 questions to 6 question. We did this by giving each question a score based on easiness and guaranteed level of response (1-5).

  5. Questionnaire • There were total of only 6 questions: –Age –Gender –Highest level of education –Do you use Antivirus? If so, which one? –Reuse of username –Reuse of password

  6. Team Organization

  7. Outcome • We received a total responses of 119 in about 7 weeks time. Majority of the results came in from the initial weeks. Less number of females versus males who were open to taking surveys. • Validity? - Completely anonymous - Website is secure - Plenty of time to publicize about the survey

  8. Analysis - By Gender

  9. Analysis- By Education

  10. Analysis - By Education

  11. Analysis - By username reuse

  12. Analysis - By password reuse

  13. More about algorithms and implementation • Password Reuse and use of anti virus: Initially by plotting a pie chart on the data set we found out that people do reuse passwords for more than one websites. We plotted a decision tree to support our claims. • C4.5 / j48 algorithm was used to generate this decision tree. • This algorithm classifies the attributes on the basis of entropy.

  14. At each node it chooses an element that effectively splits the data on the basis of information gain. • Higher the information gain, closer it lies to the node. • Nodes are then split and re-split till the information gain is 0 or we reach end of splitting attributes. • Education level affecting the use of antivirus: The table below shows how education level affects the user whether or not to use anti virus for protection.

  15. More about algorithms and implementation • Apriori algorithm was used learn the association rule learning. • It identifies the frequent datasets and extends them to larger item sets as long as those item appear frequently. • This frequent item set is determined by Apriori rule to determine association rule. • Example - Market analysis basket.

  16. Tool used - WEKA

  17. J48 classification tree algorithm in use to classify population for the use of anti virus vs education level.

  18. Jitter plot showing the population classification

  19. References: 1) Blog report - Cyber security survey shows low internet security confidence across EU. http://www.stemgroup.co.uk/news/cyber-security-survey-shows-low-internet-security-co nfidence-across-eu 2) Password reuse opens doors for cyber criminals End-users must have a different password for every website and security domain – Feb-15,2011. http://www.infoworld.com/d/security-central/password-reuse-opens-doors-cyber-crimin als-457 3) University of Wakito, New Zealand, Weka documentation http://grepcode.com/file/repo1.maven.org/maven2/nz.ac.waikato.cms.weka/weka-dev/3.7.9/w eka/classifiers/trees/J48.java#J48 4) University of Wakito, New Zealand, Weka documentation http://grepcode.com/file/repo1.maven.org/maven2/nz.ac.waikato.cms.weka/predictiveApriori/1 .0.2/weka/associations/PredictiveAprioriTest.java#PredictiveAprioriTest

  20. Any Question???

More Related