Case Study based On Cyber Crime And Confusion Matrix

CYBER-SECURITY

CYBER-ATTACK

CYBER-CRIME

Examples of the different types of cybercrime :

These examples are enough to send alerts everywhere. They warn us against being cautious and alert against such mails. Money laundering through mail has become very common. Let us not assume ourselves to be safe and under any protection shield.

Donโ€™t trust emails or text messages so easily. First confirm and assure then take your desired step. Also do not trust anonymous and pretentious mails or phone calls because you never know in which form cyber criminals are knocking at your doorstep.

๐ถ๐ด๐‘†๐ธ-๐‘†๐‘‡๐‘ˆ๐ท๐‘Œ: ๐ถ๐‘ฆ๐‘๐‘’๐‘Ÿ ๐ด๐‘ก๐‘ก๐‘Ž๐‘๐‘˜ ๐‘œ๐‘› ๐ถ๐‘œ๐‘ ๐‘š๐‘œ๐‘  ๐ต๐‘Ž๐‘›๐‘˜

Email Classification: spam vs. important

Workflow building, applying and evaluating a supervised classification model: data reading and preprocessing, partitioning, model training, prediction, and model evaluation. This workflow predicts whether emails are โ€œspamโ€ or โ€œnormalโ€.
Confusion matrix and class statistics in the interactive view of the Scorer (JavaScript) node.

What is the Confusion Matrix?

Figure 1: A visual representation of the confusion matrix

How to interpret a Confusion Matrix

Figure 2: Confusion Matrix

Confusion Matrix example

๐˜ผ๐™˜๐™˜๐™ช๐™ง๐™–๐™˜๐™ฎ

๐‘บ๐’†๐’๐’”๐’Š๐’•๐’Š๐’—๐’Š๐’•๐’š

๐‘ท๐’“๐’†๐’„๐’Š๐’”๐’Š๐’๐’

๐‘บ๐’‘๐’†๐’„๐’Š๐’‡๐’Š๐’„๐’Š๐’•๐’š

What can you do with classification metrics?

Conclusion

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store