Professional Documents
Culture Documents
Presentation 1
Presentation 1
COMPUTER
SECURITY
REGISTERATION # CIIT/SP21-
REE-012/ISB
CCTV
SUPERVISER :DR.MUHAMMAD AWAIS JAVED SECURITY
CYBERSECURITY MOBILE
SECURITY
NETWORK
BUGS
OUTLINES
Introduction
Research Challenges
Literature Review
Problem Statement
Research Methodology
Conclusion
Introduction (1/1)
The rapid expansion of electronic commerce has created numerous opportunities for businesses, government
organizations, and individuals to expand their markets.
Anomaly
Anomaly refers to any abnormal behavior or malicious traffic in the network
Introduction
Security logs
Logging is the process of recording events that occur during the execution of operating systems processes, networks, and application
A robust anomaly detection also enables prevention from future attacks and provides useful insights to the organizations
Vulnerabilities Analysis
Different attackers infiltrate target or victim machines by exploiting vulnerabilities in the system
Introduction(1/2)
There are two common attack detection
approaches:
2. Anomaly Detection
The second approach known as anomaly detection use methodologies to profile normal and abnormal activities and declares
deviation from those normal profiles as anomaly detection.
Introduction (1/3)