Cyberthon 2025 Problem Statements - Final
Cyberthon 2025 Problem Statements - Final
AI Cyber Security 09
Corporate Security 05
Description :
The project aims to create a user-friendly interface to assist law enforcement by mapping
crime hotspots based on real-time FIR (First Information Report) data. It uses color-coded
visualizations to highlight areas with high crime rates. It can filter these zones by various
parameters like type of crime, time, and season. Additionally, the system extends to
behavioral analysis of criminals and predictive insights, such as seasonal trends in crime
patterns. The tool will also help in generating optimized patrol routes.
Objectives :
● For Police :
○ A simple and effective tool to monitor, predict, and manage crime.
○ Insights to allocate resources based on the severity and frequency of crime.
● For Developers :
○ Work with dummy/sample FIR data to build and test the system.
○ Implement color-coded visualizations for easy identification of crime
hotspots.
○ Develop algorithms for behavioral and trend analysis.
● For End Users :
○ Intuitive interface with clear visuals and actionable insights.
○ Automated reports and patrol recommendations.
Expected Results :
Description :
This project involves creating a tool to analyze cell tower dump data, which is a collection
of location data for mobile phones connected to a specific tower at a given time. Law
enforcement agencies use this data to identify potential suspects by finding common
mobile numbers that appear at crime scenes or key locations.
Students will simulate this process using a database of dummy mobile numbers and
timestamps, identifying overlaps to narrow down suspect movements. The tool will
automate the analysis and provide clear, actionable insights for investigations.
Objectives :
1. Prelims :
○ Analyze cell tower dump data to identify common mobile numbers that
appear in the same place within a specific timeframe.
○ Develop a system that can handle multiple datasets (e.g., Excel sheets with
dummy data).
2. Mains :
○ Extend the tool to analyze multiple locations.
○ Identify mobile numbers that appear across different locations at different
times.
○ Generate a route map showing the movement of suspects, including date
and time stamps.
3. Automation :
○ Create a simple, user-friendly tool to automate the tedious task of manually
sifting through tower dump data.
Expectations :
Expected Results :
Description :
This project involves building a tool to analyze and monitor network connections, focusing
on detecting hidden or masked activities behind public IP addresses. Criminals or insider
threat actors often disguise their true identity by using public IPs or masking techniques,
making it challenging to trace their activities. The PROBE Tool will help identify and trace
these hidden connections by analyzing IP, MAC, and packet data.
In its advanced stage, the tool will also have the ability to terminate malicious connection
requests made by the threat actor, providing an active defense mechanism. This solution
will be agentless, meaning it won't require installation on individual devices, and will focus
on intrusion detection and network traffic monitoring.
Objectives :
1. Prelims :
○ Trace and identify hidden connections linked to a public or masked IP
address.
○ Analyze network traffic to uncover behind-the-scenes connections using
packet data and MAC addresses.
○ Provide visibility into all devices and connections in a network, including
those attempting to mask their origin.
2. Mains :
○ Add a feature to terminate malicious connection requests from identified
threat actors.
○ Enhance the tool to actively monitor and block suspicious movements in
real-time.
3. Automation and Efficiency :
○ Build an agentless solution for easy deployment across networks.
○ Focus on creating an intuitive interface to visualize network traffic and
suspicious connections.
Expectations :
Expected Results:
Description:
The Drug Website Takeover Tool is designed to assist law enforcement agencies in
targeting and shutting down illegal drug-related websites operating on the surface web or
dark web. These websites may promote or facilitate the sale of narcotics, launder money,
or engage in other criminal activities.
The tool will identify vulnerabilities in such websites and enable law enforcement to disrupt
their operations by taking control of the site, blocking access, or shutting it down entirely,
depending on legal authority and jurisdiction.
Objectives:
Expected Results:
Description :
Development of an NLP Model to guide citizens in filing cybercrime reports on the National
Cyber Crime Reporting Portal (NCRP) correctly through a real time analysis of the
description and incident supporting media files uploaded by the citizen.
Objectives :
To develop an NLP model that categorizes fraud based on victim descriptions, focusing on
improving model accuracy.
Outputs :
Text Preprocessing : Tokenization, stop word removal, stemming, and text cleaning to
prepare data.
Model Development : Selection of a suitable NLP model (e.g., Logistic Regression,
LSTM, or BERT) for multi-class fraud categorization.
Accuracy Measurement : Evaluate the model based on metrics such as accuracy,
precision, recall, and F1-score.
Result :
Participants will deliver a working NLP model with an emphasis on achieving the highest
possible accuracy
S.No Problem Problem Statement Name Domain
Statement ID
Description:
The Phishing Detection Tool is designed to help individuals and organizations identify
and block phishing attempts. Phishing is a type of cyberattack where attackers trick users
into revealing sensitive information, such as passwords, credit card numbers, or personal
data, by pretending to be legitimate entities through fake emails, websites, or messages.
This tool will analyze suspicious emails, URLs, or messages, identify potential phishing
indicators, and alert users about the threat. It can also provide educational feedback on
why a message or site is flagged as phishing.
Objectives:
Expected Results:
Description:
The Real-Time Data Breach Alert System is a tool designed to notify individuals and
organizations as soon as their sensitive information, such as email addresses, passwords,
or credit card details, is found in data breaches. The system actively scans dark web
forums, public breach databases, and other sources to detect leaks of confidential data
and instantly alerts users to take action, such as changing passwords or securing
accounts.
This tool helps mitigate potential damage by enabling users to respond quickly to a data
breach.
Objectives:
Expected Results:
Description :
The DNS Spoofing / Email Spoofing Detection Tool is designed to help individuals and
organizations detect and prevent spoofing attacks.
This tool will monitor and identify suspicious activities in DNS records or email headers,
helping users detect and mitigate spoofing attempts.
Objectives :
Expected Results :
Description :
The Cyber Crime Reporting AI Assistant is a tool designed to help individuals and
organizations report cybercrimes easily and efficiently. The AI assistant guides users
through the process of reporting incidents such as hacking, phishing, identity theft, online
harassment, and other digital crimes.
The tool simplifies the reporting process by collecting relevant details, organizing the
information, and either submitting it to the appropriate authorities or providing clear
instructions on how to do so. It also offers resources and guidance to help users
understand their situation and take immediate action.
Objectives :
Expected Results:
Description :
The AI Assistant for Cyber Laws is a user-friendly tool designed to help individuals and
law enforcement officers understand and navigate cyber laws. It provides clear answers to
legal questions related to cybercrimes, such as hacking, phishing, online harassment,
identity theft, and data privacy.
This assistant simplifies complex legal terms, offers guidance on reporting procedures,
and helps police officers quickly access the relevant legal sections needed for case
handling.
Objectives :
Expected Results :
Description :
The Speech Emotion Recognition (SER) Tool is designed to assist cybercrime police in
analyzing the tone and emotional state of individuals during live phone calls. By identifying
emotions such as fear, anger, distress, or nervousness, the tool enables law enforcement
officers to better assess the mental state of victims, suspects, or informants in real-time.
This tool can enhance decision-making during investigations, prioritize responses to critical
calls, and provide insights into the caller's intentions or urgency.
Objectives :
Expected Results :
Description:
The Fake News Detection System is a tool designed to identify and flag fake or
misleading news articles, posts, or messages. It uses artificial intelligence (AI) to analyze
content, cross-check facts, and determine whether the information is genuine or fake.
This tool is especially useful for combating the spread of misinformation on social media,
websites, and other communication platforms, helping individuals and authorities maintain
trust in the information they consume or share.
Objectives:
Expected Results:
Description :
The Deep Fake Detection System is a tool designed to identify manipulated media
content, such as altered videos, images, or audio created using AI techniques. Deep fakes
are often used to spread misinformation, commit fraud, or defame individuals. This tool
uses AI algorithms to analyze media and determine whether it has been tampered with.
The system is particularly useful for law enforcement, journalists, and individuals to verify
the authenticity of digital content and prevent the spread of malicious or misleading media.
Objectives :
Expected Results :
Description:
The Secure Coding Analysis Tool is a software solution designed to analyze code
written by developers and identify security vulnerabilities or flaws that could be exploited
by attackers. The tool focuses on ensuring that the code adheres to secure coding
standards and best practices, reducing the risk of security breaches in corporate software
systems.
Objectives:
Expected Results :
Description:
The tool uses techniques like encryption, anonymization, data masking, and differential
privacy to safeguard data integrity.
Objectives :
Expected Results :
Description:
This approach enhances security, reduces the risk of password-related breaches, and
improves the user experience by eliminating the need to remember or manage complex
passwords.
Objectives:
Expected Results:
Description:
The system monitors, protects, and responds to potential threats on these devices,
ensuring the corporate network and sensitive data remain secure. It plays a critical role in
safeguarding remote workers, preventing data breaches, and complying with corporate
security standards.
Objectives:
Expected Results:
Description:
This tool evaluates corporate systems, processes, and practices to identify potential
security gaps, track risks, and generate comprehensive audit reports. By automating the
audit process, it reduces human errors, saves time, and ensures consistent adherence to
regulatory requirements like GDPR, ISO 27001, or HIPAA.
Objectives:
For Organizations:
Description:
Objectives:
Expected Results:
Description:
In OSINT applications, drones can be used to monitor public events, map terrains, conduct
environmental surveillance, and track movements over large areas. Their agility and ability
to collect data from diverse locations make them invaluable tools for intelligence gathering.
Objectives:
Description:
The Crypto Analysis and Intelligence Mapping Tool is designed to trace cryptocurrency
transactions and provide a clear understanding of their flow. Using spider maps and
detailed reports, the tool helps uncover the trails of digital assets, mapping out wallet
connections and identifying potential patterns of suspicious activity.
The tool can trace IP addresses linked to specific transaction IDs and compile a tabulated
report of wallet history, providing valuable insights for law enforcement agencies (LEAs) to
investigate cryptocurrency-related crimes.
Objectives:
Description:
The Dark Web and CDR Analysis Tool is designed to help investigators uncover links
between activities on the Dark Web and call-related data from Call Detail Records (CDRs).
The tool leverages OSINT (Open-Source Intelligence) and advanced data analytics to
identify connections between suspicious communications, Dark Web transactions, and
illegal activities.
By combining insights from the Dark Web with CDR data, investigators can identify
patterns, trace networks, and gather actionable intelligence to combat cybercrime, fraud,
trafficking, and other illicit activities.
Objectives:
Description:
The Virtual Number and VoIP Intelligence Tool is designed to assist in tracing virtual
numbers and Voice over Internet Protocol (VoIP) calls often used in cybercrimes like
bullying, harassment, and fraud. Virtual numbers, which can originate from any country
code (e.g., +1, +44), make it challenging to track perpetrators.
This tool decodes the IP and gathers basic information about VoIP calls, including SIP
(Session Initiation Protocol) details. It provides intelligence on the origin of the virtual
number, websites or platforms used, and basic user details, helping investigators gain
insights into cybercriminal activities.
Objectives:
Description:
The New Age Women Safety App is designed to automatically sense danger and trigger
an SOS alert, even when the user cannot operate their mobile device. Using multimodal
data from the mobile device, such as audio, video, images, motion detection, and other
sensors, the app identifies potentially dangerous situations and sends alerts to pre-defined
emergency contacts or law enforcement with the user’s real-time location.
This app serves as a proactive solution to enhance women's safety by leveraging smart
technologies to respond to emergencies effectively.
Objectives:
Description:
The Online Child Protection System is designed to safeguard children from online
threats such as cyberbullying, grooming, exploitation, inappropriate content, and other
forms of digital harm. This tool monitors online activities, detects potentially harmful
interactions or content, and provides alerts to parents, guardians, or law enforcement
agencies. Using AI and advanced algorithms, the system aims to create a safe online
environment for children while respecting privacy and ethical considerations.
Objectives:
For Organizations: