Professional Documents
Culture Documents
i
Acknowledgement
The satisfaction and euphoria that accompanies the successful completion of any task would be
incomplete without mentioning the people who made it possible. With deep gratitude, I
acknowledge all those guidance and encouragement, which served as bacon of light and crowned
our efforts with success. I thank each one of them for their valuable support.
I express my sincere thanks to Dr. B.R. Shetty, Chairman, Brindavan College of Engineering,
Bangalore, for providing necessary facilities and motivation to carry out technical seminar work
successfully.
I would like to mention our special thanks to all the faculty member of Computer Science and
Engineering Department, Brindavan College of Engineering, Bangalore for their invaluable
support and guidance. I finally thank my family and friends who have been encouraging us
constantly and inspiring throughout the completion of our technical seminar.
Fuad Senin 1BO17CS037
ii
Contents
Sl. No Titles Page. No
I Abstract i
2 Acknowledgement ii
3 Table of Contents iii
4 List of Figure iv
Chapter.
Titles Page. No
No
1 Introduction 1
2 Existing System 3
3 Proposed System 5
4 Classification of Attacks 6
4.1 Intrusion Detection 6
4.2 Cyber Threat Situational Awareness 7
4.3 Network Traffic Analysis 9
4.4 Windows Malware Analysis 10
4.5 Android Malware Analysis 10
4.6 Side Channel Attack Detection 11
4.7 Steganalysis & Steganography 12
5 Applications 13
5.1 IoT Applications of Smart Cities 13
5.2 Blockchain Technology for Cyber Security 14
5.3 Cyber Security in Autonomous Vehicle 15
Technology
5.4 Biometric 15
5.5 Cloud Security 16
5.6 Cryptography 17
References 18
iii
List of Figures
Sl. No. Title Page No.
1.1 Types of Cyber Attacks 1
4.1 Hierarchical classifications of 6
DL Methods in Cyber Security
4.2 Active domain name 8
discovery process employed
by recent malwares
iv