60 likes | 74 Views
Explore the use of genetic algorithms in optimizing intrusion detection systems for improved security against cyber attacks.
E N D
CAP6135: Malware and Software Vulnerability AnalysisExamples of Term Projects Cliff ZouSpring 2011
CAP6135, Spring 2010 • Web Application Vulnerabilities • Spam Filtering Techniques • Survey of P2P applications and inherent security risks • Building KnightBot: a covert self recovering botNet library • Rootkit • A Study of IDS/IPS • Spam Detection • Zombies in the Clouds
Survey of Defensive Techniques for Preventing Cross Site Scripting Attacks • Computer Security/Forensic Tool Validation • Exploring Steganography: Seeing the Unseen • Improper Use of Secure Socket Layers and Transport Layer Security • Methods of Preventing SQL Injection • Threats and Vulnerabilities in Content Delivery Networks • ACME: Anglophonic Confidential Messaging without Encryption
OPTIMIZING INTRUSION DETECTION SYSTEMS USING GENETIC ALGORITHMS • CAPTCHA Effectivity Survey • Trojan Horses • User Security in Distributed Applications
Some Suggested Hot Topics • Cloud computing security • Encrypted data search • Virtual machine isolation • Law and policy on cloud location and storage • Monitoring and log • Location-based service privacy for mobile system • Social network privacy
Some Interesting Topics • Add expiration date to personal data in the Internet