Week -4 How Deep-learning methods better than existing cyber-security techniques?



The existing cybersecurity methods are signature-based and mostly rely on the predefined behavior of cyber threats. They fail when cyber threats change their behavior. They also fail when there is a large amount of data. But in deep-learning technology works like the human brain, they process the data and can easily predict the malicious activities which can be missed by the existing methods.

Moreover, existing methods just generate alarms when threats are identified. then it requires human experts to analyze the situation and take action. Sometimes, humans might miss vulnerabilities. Many of the times, the traditional methods generate false alarms. It makes the process tedious for the security team. On the other hand, cyber-security methods do not generate false alarms that are more accurate and are capable of taking decisions on their own.

NAME
DRASHTI RATHOD (11677786)
PROJECT TITLE
DEEP LEARNING IN CYBER-SECURITY
WEEK NUMBER
4
DATE
28/03/2020

PLANNING                           
MILESTONE
PLANNED
ACTUAL
COMMENT


To create the research methodology and start the project plan.








To identify the research methodology to be used and start to develop the work break down structure.

Identified the research methodology and developed the work breakdown structure

The milestone for this week was completed.
ISSUES No major issues

DESCRIPTION
DATE
ACTION/RESULT
FINISHED(Y/N)
N/A
N/A
N/A
N/A



Comments

Popular posts from this blog

WEEK-11 Proposed methodology