Adil Khan 9 months ago
AdiKhanOfficial #FYP Ideas

M.C.T.I.S

Utilizing artificial intelligence and machine learning to apply threat and data intelligence strengthens an enterprise?s security by empowering stakeholders with evidential information on what and how cyber threats are relevant to their business. Adopting AI/ML to predict and stop data breaches requ

Project Title

M.C.T.I.S

Project Area of Specialization

Cyber Security

Project Summary

Utilizing artificial intelligence and machine learning to apply threat and data intelligence strengthens an enterprise’s security by empowering stakeholders with evidential information on what and how cyber threats are relevant to their business. Adopting AI/ML to predict and stop data breaches requires a holistic, organization-wide threat intelligence strategy that is fully-integrated in the organizational security management framework. This makes it possible to find the needle in the haystack before it pricks you.

Project Objectives

To design a machine learning model for threat intelligence which can dynamically adopt environment to automate data collection and processing, integrate with your existing solutions, take in unstructured data from disparate sources, and then connect the dots by providing context on indicators of compromise (IoCs) and the tactics, techniques, and procedures (TTPs) of threat actors. Utilizing artificial intelligence and machine learning to apply threat and data intelligence strengthens an enterprise’s security by empowering stakeholders with evidential information on what and how cyber threats are relevant to their business. Adopting AI/ML to predict and stop data breaches requires a holistic, organization-wide threat intelligence strategy that is fully-integrated in the organizational security management framework. This makes it possible to find the needle in the haystack before it pricks you.

Project Implementation Method

Overview of Method The threat modelling method proposed in this guide comprises broadly the following 4 steps: i Step 1 – Scope Definition, which involves gathering information and demarcating perimeter boundary; ii Step 2 – System Decomposition, which involves identifying system components, drawing how data flows, and dividing out trust boundaries; iii Step 3 – Threat Identification, which involves identifying threat vectors and listing threat events; and iv Step 4 – Attack Modelling, which involves mapping sequence of attack, describing tactics, techniques and procedures

Benefits of the Project

Main motivation for adopting AI/ML for cybersecurity is an increasing complexity of IT threats. Before, businesses had to face “typical threats” like Zeus trojans, but as we learned to handle those, new species emerged. Recently, we faced Ryuk ransomware, smart botnets, and an evolved trojan, Trickbot. In medium and large organizations where hundreds of systems operating simultaneously which also generates catastrophic level of cyber threats, the problem(scale of data) of concept drift is exacerbated, and a static ML model might fail in a dynamic environment. The inability to account for a dynamic and adversarial nature creates a new class of ML risks.

Technical Details of Final Deliverable

We proposed model which can enhance the cyber security of organization so it is software based.

Final Deliverable of the Project

Software System

Core Industry

IT

Other Industries

Finance , Media , Security , Telecommunication

Core Technology

Artificial Intelligence(AI)

Other Technologies

Sustainable Development Goals

Partnerships to achieve the Goal

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
intel i7-7700k Equipment13500035000
Nvidia GTX 1050 TI Equipment13500035000
16 GB ram Miscellaneous 11000010000
Total in (Rs) 80000
If you need this project, please contact me on contact@adikhanofficial.com
video

How to Save or Download WhatsApp Status

AdiKhanOfficial
Adil Khan
6 years ago
Modelling and control of electrical vehicle through wireless charging...

            Unlike wired system, the pro...

1675638330.png
Adil Khan
9 months ago
Biometric Time management of University of WAH

The Biometric system referred to automatic identification and verification of employees ba...

1675638330.png
Adil Khan
9 months ago
Health Care HUB

We are developing a website for appointment of doctor in different hospitals. We providing...

1675638330.png
Adil Khan
9 months ago
An Editor to Autocomplete sentences in Urdu using Natural Language Pro...

Natural language processing (NLP) is the intersection of computer science, linguistics and...

1675638330.png
Adil Khan
9 months ago