Week-1 Introduction to deep learning in cyber-security






INTRODUCTION TO DEEP LEARNING IN CYBER-SECURITY

Cyber-security is a very crucial issue in today's fast-growing digital world. Almost everything we do rely on the internet. There are numerous attacks that have been very common threats in a cyber society. Some of these are ransomware, DOS (Denial-of-service) attack, malware, viruses, etc. The existing methods used for cyber-security are largely signature oriented and it becomes difficult to identify and stop these attacks if they change their behaviors. I order to prevent these attacks it is also essential to detect them on a real-time basis. Due to such reasons identify malicious malware is becoming a challenging task. To solve this problem effectively, we use deep learning technology to identify attacks on real data.

Deep learning is an AI (Artificial intelligence) methodology. It is a subset of machine learning. Deep learning makes the use of Artificial Neural Networks (ANNs). It has been proposed to use the methodology and the connectors used by the human brain to process the data and information. DL framework can be used for intrusion detection, phishing attacks, malware, and many major security threats. Deep learning methodology would not use predefined steps. It is designed to use the best options by themselves. 






Drashti Rathod (11677786)
PROJECT TITLE
Deep-learning in cyber-security
WEEK NUMBER
1
DATE
4/3/2020


PLANNING                           
MILESTONE
PLANNED
ACTUAL
COMMENT



To find the research project topic of my interest and creating the blog.







To search various peer-reviewed research papers and study them to select the topic for my project.

I read different research paper and successfully selected topic and
I also created blog.

I searched for research paper on google scholar and CSU library and was able to finalize my topic.
ISSUES: There were no major issues.


DESCRIPTION
DATE
ACTION/RESULT
FINISHED(Y/N)
N/A
N/A
N/A
N/A




NAME
Drashti Rathod (11677786)
PROJECT TITLE
Deep-learning in cyber-security
WEEK NUMBER
2
DATE
10/3/2020

PLANNING                           
MILESTONE
PLANNED
ACTUAL
COMMENT


Prepare the abstract and create a post on the blog.






To read various searched research papers and create the abstract. Also, to make the first post on the blog.

I read a different research paper and successfully selected topic and completed abstract.
I also posted it on my blog.

I searched for a research paper on google scholar and CSU library and was able to find enough number of journal papers for my research.
ISSUES: There were no major issues.

DESCRIPTION
DATE
ACTION/RESULT
FINISHED(Y/N)
N/A
N/A
N/A
N/A


Comments

Post a Comment

Popular posts from this blog

WEEK-11 Proposed methodology