Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 7

SYNOPSIS PRESENTATION

DEPARTMENT OF ELECTRICAL ENGINEERING


COMSATS INSTITUTE OF INFORMAT TECHNOLOGY
ISLAMABAD,PAKISTAN

COMPUTER
SECURITY

PERESENTED BY : QAISAR AYUB

REGISTERATION # CIIT/SP21-
REE-012/ISB
CCTV
SUPERVISER :DR.MUHAMMAD AWAIS JAVED SECURITY

CYBERSECURITY MOBILE
SECURITY

NETWORK
BUGS
OUTLINES

 Introduction
 Research Challenges
 Literature Review
 Problem Statement
 Research Methodology
 Conclusion
Introduction (1/1)
 The rapid expansion of electronic commerce has created numerous opportunities for businesses, government
organizations, and individuals to expand their markets.

 Confidentiality, Integrity, and Availability (CIA) are important security features.


 Cybercriminals seek to access, modify, or delete confidential information for financial gain, fame, personal revenge, or to disrupt organizational services

 Anomaly
 Anomaly refers to any abnormal behavior or malicious traffic in the network

Introduction
 Security logs
 Logging is the process of recording events that occur during the execution of operating systems processes, networks, and application

 A robust anomaly detection also enables prevention from future attacks and provides useful insights to the organizations

 Vulnerabilities Analysis
 Different attackers infiltrate target or victim machines by exploiting vulnerabilities in the system
Introduction(1/2)
There are two common attack detection
approaches:

1. Signature based attack detection approach


This approach contains the signatures of intrusion patterns and effective in identifying known attacks.

2. Anomaly Detection
 The second approach known as anomaly detection use methodologies to profile normal and abnormal activities and declares
deviation from those normal profiles as anomaly detection.
Introduction (1/3)

 In this thesis, we will develop an efficient anomaly detection technique that


works for future cyber security networks.
 The proposed algorithm will be evaluated in terms of different metrics such
as accuracy and precision.
Research Challenges

 How to exploit operating system and differentiate Anomaly from benign


events
 How to chose an anomaly detection approach to detect variants of new
attacks in less time
Literature Review

You might also like