You are on page 1of 4

ABSTRACT

The cyber-electronic-scape is a changing environment as current network security measures like


signature-based detection techniques, firewalls and sandboxing are failing to keep up.
With corporate networks becoming a prime target for threat actors, software vendors are
beginning to use deep learning and other types of AI in cyber security. Much of the progress
we’ve seen in artificial intelligence in the past five years is due to deep learning. Advances in
software algorithm models, processing power and dramatically lower costs have put deep
learning within reach of more companies, opening the door for broader innovation in products
and services, and also supporting the execution of complex business processes. Deep learning
and neural network technology are some of the most advanced techniques that can be used to
help defend an enterprise from threats. Although deep learning was having a significant impact
on image and speech recognition, these techniques were not being used in computer security.

i
Acknowledgement
The satisfaction and euphoria that accompanies the successful completion of any task would be
incomplete without mentioning the people who made it possible. With deep gratitude, I
acknowledge all those guidance and encouragement, which served as bacon of light and crowned
our efforts with success. I thank each one of them for their valuable support.

I express my sincere thanks to Dr. B.R. Shetty, Chairman, Brindavan College of Engineering,
Bangalore, for providing necessary facilities and motivation to carry out technical seminar work
successfully.

I express my sincere thanks to Dr. Rajashekar Patil, Principal, Brindavan College of


Engineering, Bangalore, for providing necessary facilities and motivation to carry out technical
seminar work successfully.
I express my heartfelt gratitude and humble thanks to Prof. Meena Kumari K S,
Head of Department, CSE, Brindavan College of Engineering, for the constant encouragement
and help to carry out technical seminar work successfully.
I would also like to express my humble thanks to Seminar guide Prof. Avinash N.,
Assistant Professor, CSE, Bangalore for guiding and having facilitated us to complete our
technical seminar work successfully
I take this opportunity to express my sincere gratitude to Seminar Coordinator Prof.
Padmavathi H G, Associate Professor, CSE, Brindavan College of Engineering, and
Bangalore for encouraging us throughout the technical seminar work.

I would like to mention our special thanks to all the faculty member of Computer Science and
Engineering Department, Brindavan College of Engineering, Bangalore for their invaluable
support and guidance. I finally thank my family and friends who have been encouraging us
constantly and inspiring throughout the completion of our technical seminar.
Fuad Senin 1BO17CS037

ii
Contents
Sl. No Titles Page. No
I Abstract i
2 Acknowledgement ii
3 Table of Contents iii
4 List of Figure iv
Chapter.
Titles Page. No
No
1 Introduction 1
2 Existing System 3
3 Proposed System 5
4 Classification of Attacks 6
4.1 Intrusion Detection 6
4.2 Cyber Threat Situational Awareness 7
4.3 Network Traffic Analysis 9
4.4 Windows Malware Analysis 10
4.5 Android Malware Analysis 10
4.6 Side Channel Attack Detection 11
4.7 Steganalysis & Steganography 12
5 Applications 13
5.1 IoT Applications of Smart Cities 13
5.2 Blockchain Technology for Cyber Security 14
5.3 Cyber Security in Autonomous Vehicle 15
Technology
5.4 Biometric 15
5.5 Cloud Security 16
5.6 Cryptography 17
References 18

iii
List of Figures
Sl. No. Title Page No.
1.1 Types of Cyber Attacks 1
4.1 Hierarchical classifications of 6
DL Methods in Cyber Security
4.2 Active domain name 8
discovery process employed
by recent malwares

iv

You might also like