Cyberthon 2025
Register Now

Domain 2
AI Cyber Security

Explore the 9 problem statements focused on cybersecurity innovations.

CT-AICS - 01: Cyber Crime Case Classification

Description: Development of an NLP Model to guide citizens in filing cybercrime reports on the National Cyber Crime Reporting Portal (NCRP) correctly through a real time analysis of the description and incident supporting media files uploaded by the citizen.

Download PDF

CT-AICS - 02: Phishing Detection Tool

Description: The Phishing Detection Tool is designed to help individuals and organizations identify and block phishing attempts. Phishing is a type of cyberattack where attackers trick users into revealing sensitive information, such as passwords, credit card numbers, or personal data, by pretending to be legitimate entities through fake emails, websites, or messages. This tool will analyze suspicious emails, URLs, or messages, identify potential phishing indicators, and alert users about the threat. It can also provide educational feedback on why a message or site is flagged as phishing.

Download PDF

CT-AICS - 03: Real - Time Data Breach Alert System

Description: The Real-Time Data Breach Alert System is a tool designed to notify individuals and organizations as soon as their sensitive information, such as email addresses, passwords, or credit card details, is found in data breaches. The system actively scans dark web forums, public breach databases, and other sources to detect leaks of confidential data and instantly alerts users to take action, such as changing passwords or securing accounts. This tool helps mitigate potential damage by enabling users to respond quickly to a data breach.

Download PDF

CT-AICS - 04: DNS Spoofing / Email Spoofing detection tool

Description: The DNS Spoofing / Email Spoofing Detection Tool is designed to help individuals and organizations detect and prevent spoofing attacks.

DNS Spoofing: A cyberattack where attackers redirect users from legitimate websites to malicious ones by altering the DNS (Domain Name System) records.

Email Spoofing: A tactic where attackers forge the sender's email address to make it appear as if the email came from a trusted source, often used for phishing or spreading malware.

This tool will monitor and identify suspicious activities in DNS records or email headers, helping users detect and mitigate spoofing attempts.

Download PDF

CT-AICS - 05: Cyber Crime Reporting AI Assistant

Description: The Cyber Crime Reporting AI Assistant is a tool designed to help individuals and organizations report cybercrimes easily and efficiently. The AI assistant guides users through the process of reporting incidents such as hacking, phishing, identity theft, online harassment, and other digital crimes. The tool simplifies the reporting process by collecting relevant details, organizing the information, and either submitting it to the appropriate authorities or providing clear instructions on how to do so. It also offers resources and guidance to help users understand their situation and take immediate action.

Download PDF

CT-AICS - 06: AI Assistant For Cyber Laws

Description: The AI Assistant for Cyber Laws is a user-friendly tool designed to help individuals and law enforcement officers understand and navigate cyber laws. It provides clear answers to legal questions related to cybercrimes, such as hacking, phishing, online harassment, identity theft, and data privacy. This assistant simplifies complex legal terms, offers guidance on reporting procedures, and helps police officers quickly access the relevant legal sections needed for case handling.

Download PDF

CT-AICS - 07: Speech Emotion Recognition on live calls for Cyber Crime Police

Description: The Speech Emotion Recognition (SER) Tool is designed to assist cybercrime police in analyzing the tone and emotional state of individuals during live phone calls. By identifying emotions such as fear, anger, distress, or nervousness, the tool enables law enforcement officers to better assess the mental state of victims, suspects, or informants in real-time. This tool can enhance decision-making during investigations, prioritize responses to critical calls, and provide insights into the caller's intentions or urgency.

Download PDF

CT-AICS - 08: Fake News Detection System

Description:The Fake News Detection System is a tool designed to identify and flag fake or misleading news articles, posts, or messages. It uses artificial intelligence (AI) to analyze content, cross-check facts, and determine whether the information is genuine or fake. This tool is especially useful for combating the spread of misinformation on social media, websites, and other communication platforms, helping individuals and authorities maintain trust in the information they consume or share.

Download PDF

CT-AICS - 09: Deep Fake Detection

Description: The Deep Fake Detection System is a tool designed to identify manipulated media content, such as altered videos, images, or audio created using AI techniques. Deep fakes are often used to spread misinformation, commit fraud, or defame individuals. This tool uses AI algorithms to analyze media and determine whether it has been tampered with. The system is particularly useful for law enforcement, journalists, and individuals to verify the authenticity of digital content and prevent the spread of malicious or misleading media. .

Download PDF
Collaborators and Supporters
Hackers Meetup Coimbatore
Coimbatore Flyer