You are on page 1of 6

1.

MSc Project ProposalForm

Student Number
1926045
Student Name RAVI KUMAR MALGA

Course Name MSc Cyber Security with Project Management

Supervisor Name XIAOHUA FENG

Project Title Network vulnerability elimination with machine


learning

The artifact is developed with python


Description of your artefact programming language and machine learning to
get the benefits of artificial intelligence.

This research has been following a strong


What methodology methodology to identify the accurate result outcome.
(structured process) will Here a particular research strategy is used. The main
you be following to realise strategy of this research is based on logical and
your artefact? scientific experiments. Different scientific
experiments will be performed during quantitative
data analysis. This strategy will help to analyze the
output critically for establishing this research study
with better approach. Mathematical machine learning
modeling and several machines learning analysis will
be implemented in the logical research strategy.
Deductive research design will be chosen for this
research, as this research design will help to establish
logical research strategy and scientific experiments.
A deductive research design is chosen for this
research to perform the quantitative data analysis in
this network vulnerability elimination system with
machine learning. The deductive design will help to
share accurate numerical outcome results for this
research. Research findings will be identified
accurately with the help of this research design.
Research approach is sharing proper plan for
establishing this research study. It is this research’s
strong approach as it will be performed quantitative
metadata analysis and mixed data collection method.
A strong scientific approach will develop various
mathematical modeling. This research will be
performed in very systematic ways. Pragmatism
research philosophy is chosen for this research. This
particular research philosophy will be performed
mixed data collection method for performing data
analysis for this proposed network vulnerability issue
elimination system. Quantitative data analysis will be
performed with the help of this research philosophy.
This research philosophy will measure output of this
proposed research study. This is how this research
will be performed to develop a system that will
eliminate network vulnerabilities issues with
machine learning. This is chosen method for this
research study that will perform appropriate data
analysis and statistical and mathematical model
developments. Scientific experiments will be very
easy with the help of this chosen methodology.

This project has been performed with the


How does your project relate knowledge and skills related to degree
your degree course and courses. This project is perfectly
build upon the implementing machine learning to remove
units/knowledge you have network security risks. In this project several
studied/acquired? network risks have been identified. Then with
the help of machine learning, network risk
elimination has been proposed. It will go to
help in cyber defense. Cyber security defense
is the main degree course. Network
vulnerability elimination will establish more
secured cyber defense system in the
world.The literature review has been
conducted related to cyber defense and
network risks elimination. After that a clinical
artifact design is shared for implementing
machine learning to eliminate network risks.
In that chapter python programming language
of this project is shared and described. Shear
machine learning implementation design is
shared there. In the cyber defense module I
have already performed Networking
Concepts, Intrusion detection system and
Intrusion prevention system, Cyber Kill
Chain, Open source Intelligence Framework.
All these things are previously done with
machine learning approaches. Thus I have
chosen this project.
During this project several important technical
What are the benefits have been provided. During this project a
main contributions of your clinical concepts of different authors regarding this
project as compared to state- network vulnerability elimination has been shared.
of-the-art? This project has been produced an integrated
network vulnerability elimination system. During
this project unique network risk mitigation
techniques are produced. This project is producing
network risk identification clearly with the help of
machine learning algorithm. This project is sharing
simple process for eliminating network risks which is
making this project more unique. Exiting network
risk mitigation solutions share complex approaches.
Machine learning is sharing benefits of artificial
intelligence, which is creating this project more
unique. Artificial intelligence is the advanced
technology that has been established in this project.
This is the main selling point of this project. It will
create high demand among the customers regarding
this project. The decision making capability are
created very high for eliminating network
vulnerabilities during creation of this project. These
capabilities will share high future scope for this
project.

The python programming language is used here


Resources with python software. Project libre is also used
to plan this project.
2. Project Plan and GANTT Chart

Figure 1: Gantt chart


(Source: Self-created in project libra)

Figure 2: Gantt chart


(Source: Self-created in project libra)
Figure 3: Gantt chart
(Source: Self-created in project libra)

The above image is the gnatt chart of this Network vulnerability elimination with machine
learning project. From the above image sub phases inter dependency. Project work
extermination has been shared in the above image.

You might also like