Week-1 Introduction to deep learning in cyber-security
INTRODUCTION TO DEEP LEARNING IN CYBER-SECURITY
Cyber-security is a very crucial issue in today's fast-growing digital world. Almost everything we do rely on the internet. There are numerous attacks that have been very common threats in a cyber society. Some of these are ransomware, DOS (Denial-of-service) attack, malware, viruses, etc. The existing methods used for cyber-security are largely signature oriented and it becomes difficult to identify and stop these attacks if they change their behaviors. I order to prevent these attacks it is also essential to detect them on a real-time basis. Due to such reasons identify malicious malware is becoming a challenging task. To solve this problem effectively, we use deep learning technology to identify attacks on real data.
Deep learning is an AI (Artificial intelligence) methodology. It is a subset of machine learning. Deep learning makes the use of Artificial Neural Networks (ANNs). It has been proposed to use the methodology and the connectors used by the human brain to process the data and information. DL framework can be used for intrusion detection, phishing attacks, malware, and many major security threats. Deep learning methodology would not use predefined steps. It is designed to use the best options by themselves.
Drashti Rathod (11677786)
|
|||
PROJECT TITLE
|
Deep-learning in
cyber-security
|
||
WEEK NUMBER
|
1
|
DATE
|
4/3/2020
|
|
|||
PLANNING
|
|||
MILESTONE
|
PLANNED
|
ACTUAL
|
COMMENT
|
To find the
research project topic of my interest and creating the blog.
|
To search various
peer-reviewed research papers and study them to select the topic for my
project.
|
I read different
research paper and successfully selected topic and
I also created
blog.
|
I searched for
research paper on google scholar and CSU library and was able to finalize my
topic.
|
ISSUES: There were no major
issues.
|
|||
DESCRIPTION
|
DATE
|
ACTION/RESULT
|
FINISHED(Y/N)
|
N/A
|
N/A
|
N/A
|
N/A
|
NAME
|
Drashti
Rathod (11677786)
|
||
PROJECT
TITLE
|
Deep-learning
in cyber-security
|
||
WEEK
NUMBER
|
2
|
DATE
|
10/3/2020
|
PLANNING
|
|||
MILESTONE
|
PLANNED
|
ACTUAL
|
COMMENT
|
Prepare the abstract and create a post on the blog.
|
To read various searched research papers and create
the abstract. Also, to make the first post on the blog.
|
I read a different research paper and successfully selected
topic and completed abstract.
I also posted it on my blog.
|
I searched for a research paper on google scholar and CSU
library and was able to find enough number of journal papers for my research.
|
ISSUES:
There were no major issues.
|
|||
DESCRIPTION
|
DATE
|
ACTION/RESULT
|
FINISHED(Y/N)
|
N/A
|
N/A
|
N/A
|
N/A
|
Very Informative...
ReplyDelete