1 / 6

Enhancing Intrusion Detection Systems through Genetic Algorithms

Explore the use of genetic algorithms in optimizing intrusion detection systems for improved security against cyber attacks.

surber
Télécharger la présentation

Enhancing Intrusion Detection Systems through Genetic Algorithms

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CAP6135: Malware and Software Vulnerability AnalysisExamples of Term Projects Cliff ZouSpring 2011

  2. CAP6135, Spring 2010 • Web Application Vulnerabilities • Spam Filtering Techniques • Survey of P2P applications and inherent security risks • Building KnightBot: a covert self recovering botNet library • Rootkit • A Study of IDS/IPS • Spam Detection • Zombies in the Clouds

  3. Survey of Defensive Techniques for Preventing Cross Site Scripting Attacks • Computer Security/Forensic Tool Validation • Exploring Steganography: Seeing the Unseen • Improper Use of Secure Socket Layers and Transport Layer Security • Methods of Preventing SQL Injection • Threats and Vulnerabilities in Content Delivery Networks • ACME: Anglophonic Confidential Messaging without Encryption

  4. OPTIMIZING INTRUSION DETECTION SYSTEMS USING GENETIC ALGORITHMS • CAPTCHA Effectivity Survey • Trojan Horses • User Security in Distributed Applications

  5. Some Suggested Hot Topics • Cloud computing security • Encrypted data search • Virtual machine isolation • Law and policy on cloud location and storage • Monitoring and log • Location-based service privacy for mobile system • Social network privacy

  6. Some Interesting Topics • Add expiration date to personal data in the Internet

More Related