В работе

Computer security project - attack, detection and mitigation

Below are some example projects. . For each project, we will be applying a real attack, then we will detect it, and we will demonstrate how to mitigate these attacks.

First, you will be proposing a team and a proposal paragraph on your project where you will be explaining which environment you are targeting, what kind of attacks you will be applying, how you are planning to detect and also mitigate them. I will be reviewing your submissions and accept or deny your proposals with some feedbacks. Upon successful acceptance, you can work on your project. At the end of the semester, you will be writing a full report and you will be uploading all your codes, examples, etc. with a detailed readme file.

1. PDF file scripting attack: In this project, the team will create malicious pdf files that will execute a malicious script when opened. The team will also demonstrate a defence mechanism against this attack.

2. Ransomware attack & protection: The team will be applying a ransomware attack scenario: The victim will download a malicious code and the ransomware will affect the system. Also, a defence mechanism needs to be demonstrated.

3. Buffer overflow attack: You will be applying a buffer overflow attack and demonstrate how it can give access to the attackers, how we can prevent, and defend our environment against such attacks.

4. Defense against Distributed Denial of Service (DDoS) Attacks: In this project, the team will show different techniques to detect and protect against DoS attacks. The team will create a DoS attack library with minimum 3 different types of attacks and demonstrate a defence algorithm.

5. Browser attacks: In this project, the team will create a malicious website that will infect a chosen web-browser (e.g., Firefox). A mitigation method will be also demonstrated.

6. ID management: Finding/implementing multiple different authentication mechanisms (username, password, 2-factor authentication, biometrics, and more), showing their pros and cons, combining them to create secure ID management.

7. Blockchain-based solutions: Implementing blockchain-based mechanism for storage, identity or computation, etc. along with the attack scenarios and possible mitigations.

Any other project ideas are more than welcomed but not guaranteed to be accepted.

DEADLINES:

The abstract will have three things: title, project team members, and one paragraph abstract explaining your approach for your project.

A small report will be provided showing what has been accomplished, what problems are solved, etc. This will be a report showing your current state and if you will be able to finish the project. This report will be at max half a page.

-

The final report will be submitted in PDF format showing your problem statement, your approach, your solution, your experiments, your results, and a summary/conclusion. This will be like a conference paper. You will be also uploading the system all your codes, files, examples with a readme file.

Навыки: Дизайн сайтов, Безопасность сети, Java, Python, Компьютерная безопасность

Показать больше: computer technician project, computer security bids, computer design project bid, computer security project, computer security project bids, project topics related computer security, sample project computer security java, java project attack detection, master project computer security, research project computer security, level project computer security, project proposal computer security, computer science project internet security, heart attack detection by heartbeat sensing project report, heart attack detection by heartbeat sensing project ppt, trapdoor attack in computer security, ddos attack detection and mitigation, ddos attack detection and mitigation using sdn: methods, practices, and solutions, sdn project detection and mitigation of ddos attacks in a software defined network

О работодателе:
( 0 отзыв(-а, -ов) ) Denton, United States

ID проекта: #29397771

Поручен:

annuc111

Hi, Hope everything is well with you. I have done exactly same kind of work in my Masters degree program(M.Tech-cyber security) for my thesis. I think I am able to execute your project and can provide more ideas. Plea Больше

₹600 INR за 1 день
(0 отзывов(-а))
0.0

4 фрилансеров(-а) готовы выполнить эту работу в среднем за ₹1013

maxpl

Hello Sir, Hope you are fine. I am an experienced web developer. I am working as a developer for last 8+ years. I have read all yo Больше

₹1200 INR за 7 дней(-я)
(36 отзывов(-а))
7.0
arnoldb

Hello, I hope you are doing well. I am a full stack developer from Poland with 8 years of experience in mobile app and web technologies. I have Больше

₹1200 INR за 7 дней(-я)
(9 отзывов(-а))
5.4
Pluton1

Hello There, Researching and developing technical paper highlighting security issues. Provide guidance and analytical services for accessing security threats.I assure you that I will do computer and web security as sam Больше

₹1050 INR за 7 дней(-я)
(9 отзывов(-а))
4.0