SlideShare une entreprise Scribd logo
1  sur  40
CYBER SECURITY ANALYTICS
Dr. S KANNIMUTHU,
Professor / CSE Department,
Karpagam College of Engineering,
Coimbatore.
4/17/2021 1
CYBER SECURITYANALYTICS
CYBER SECURITY
• Practice of
– protecting systems
– networks
– and programs from digital attacks
• Cyberattacks are usually aimed at accessing,
changing, or destroying sensitive information;
extorting money from users; or interrupting
normal business processes.
4/17/2021 CYBER SECURITYANALYTICS 2
Why CS Important?
• In today’s connected world, everyone benefits from
advanced cyberdefense programs.
• At an individual level, a cybersecurity attack can
result in everything from identity theft, to extortion
attempts, to the loss of important data like family
photos.
• Everyone relies on critical infrastructure like power
plants, hospitals, and financial service companies.
• Securing these and other organizations is essential to
keeping our society functioning.
4/17/2021 CYBER SECURITYANALYTICS 3
Why CS Important? (Contd..,)
• Everyone also benefits from the work of cyberthreat
researchers, like the team of 250 threat researchers at
Talos, who investigate new and emerging threats and
cyber attack strategies.
• They reveal new vulnerabilities, educate the public on
the importance of cybersecurity, and strengthen open
source tools. Their work makes the Internet safer for
everyone.
4/17/2021 CYBER SECURITYANALYTICS 4
Types of CS Threats
• Ransomware
– is a type of malicious software.
– it is designed to extort money by blocking access to files or
the computer system until the ransom is paid.
– paying the ransom does not guarantee that the files will be
recovered or the system restored.
• Malware
– is a type of software designed to gain unauthorized access
or to cause damage to a computer.
4/17/2021 CYBER SECURITYANALYTICS 5
Types of CS Threats (Contd..,)
• Social engineering
– is a tactic that adversaries use to trick you into revealing
sensitive information.
– they can solicit a monetary payment or gain access to your
confidential data.
– can be combined with any of the threats mentioned earlier
to make you more likely to click on links, download
malware, or trust a malicious source.
4/17/2021 CYBER SECURITYANALYTICS 6
Types of CS Threats (Contd..,)
• Phishing
– is the practice of sending fraudulent emails that resemble
emails from reputable sources.
– The aim is to steal sensitive data like credit card numbers
and login information.
– It’s the most common type of cyber attack.
– You can help protect yourself through education or a
technology solution that filters malicious emails.
4/17/2021 CYBER SECURITYANALYTICS 7
When Required
• Cyberterrorism
– is the disruptive use of information technology by
terrorist groups to further their ideological or
political agenda.
– This takes the form of attacks on networks,
computer systems and telecommunication
infrastructures.
4/17/2021 CYBER SECURITYANALYTICS 8
When Required
• Cyberwarfare
– involves nation-states using information technology to
penetrate another nation’s networks to cause damage or
disruption.
– Cyberwarfare attacks are primarily executed by hackers who are
well-trained in exploiting the intricacies of computer networks,
and operate under the auspices and support of nation-states.
– Rather than “shutting down” a target’s key networks, a
cyberwarfare attack may intrude into networks to compromise
valuable data, degrade communications, impair such
infrastructural services as transportation and medical services,
or interrupt commerce.
4/17/2021 CYBER SECURITYANALYTICS 9
When Required
• Cyberespionage
– is the practice of using information technology to obtain
secret information without permission from its owners or
holders.
– Cyberespionage is most often used to gain strategic,
economic, political or military advantage, and is conducted
using cracking techniques and malware.
4/17/2021 CYBER SECURITYANALYTICS 10
DATA ANALYTICS
• Data analytics is the science of drawing insights from raw
information sources.
• Many of the techniques and processes of data analytics
have been automated into mechanical processes
and algorithms that work over raw data for human
consumption.
• Data analytics techniques can reveal trends and metrics
that would otherwise be lost in the mass of information.
This information can then be used to optimize processes to
increase the overall efficiency of a business or system.
4/17/2021 CYBER SECURITYANALYTICS 11
APPLICATION AREAS
4/17/2021 CYBER SECURITYANALYTICS 12
CSA PROBLEMS
4/17/2021 CYBER SECURITYANALYTICS 13
• SMS SPAM DETECTION
• CREDIT CARE FRAUD DETECTION
• INTRUSION DETECTION
SMS SPAM DETECTION
• The mobile phone market has experienced a
substantial growth over recent years.
• As the utilization of mobile phone devices
has become commonplace, Short
Message Service (SMS) has grown into a
multi-billion dollars commercial industry
4/17/2021 CYBER SECURITYANALYTICS 14
SMS SPAM DETECTION
• As the popularity of the platform has
increased, we have seen a surge in the
number of unsolicited commercial
advertisements sent to mobile phones using
text messaging
4/17/2021 CYBER SECURITYANALYTICS 15
SMS SPAM DETECTION
• SMS Spam is particularly more irritating than
email spams, since in some countries they
contribute to a cost for the receiver as well.
• These factors along with limited availability of
mobile phone spam-filtering software makes
spam detection for text messages an
interesting problem to look into.
4/17/2021 CYBER SECURITYANALYTICS 16
SMS SPAM DETECTION
• Hence, we are in a position to implement
models for classifying SMS spam and ham
messages based on message text.
4/17/2021 CYBER SECURITYANALYTICS 17
Data Collection
• SMS Spam Collection Data Set available in UCI
Repository
• https://archive.ics.uci.edu/ml/datasets/SMS+S
pam+Collection
4/17/2021 CYBER SECURITYANALYTICS 18
Screenshot
4/17/2021 CYBER SECURITYANALYTICS 19
Data Preprocessing
• Unstructured data is converted into structured
form using IF-IDF vectorization
4/17/2021 CYBER SECURITYANALYTICS 20
Machine Learning Approaches
• We can use
– Logistic Regression
– Support Vector Machines
4/17/2021 CYBER SECURITYANALYTICS 21
Credit Card Fraud Detection
• Credit card fraud has emerged as major
problem in the electronic payment sector.
• From the moment the payment systems
came to existence, there have always
been people who will find new ways to
access someone’s finances illegally.
4/17/2021 CYBER SECURITYANALYTICS 22
Credit Card Fraud Detection
• This has become a major problem in the
modern era, as all transactions can easily
be completed online by only entering your
credit card information.
• Even in the 2010s, many American retail
website users were the victims of online
transaction fraud right before two-step
verification was used for shopping online.
4/17/2021 CYBER SECURITYANALYTICS 23
Credit Card Fraud Detection
• Organizations, consumers, banks, and
merchants are put at risk when a data
breach leads to monetary theft and
ultimately the loss of customers’ loyalty
along with the company’s reputation.
4/17/2021 CYBER SECURITYANALYTICS 24
Credit Card Fraud Detection
• We are in a position to study data-driven
credit card fraud detection particularities and
several machine learning methods to address
each of its intricate challenges with the goal to
identify fraudulent transactions that have
been issued illegitimately on behalf of the
rightful card owner.
4/17/2021 CYBER SECURITYANALYTICS 25
Data Collection
• Credit Card Fraud Detection Data Set available
in UCI Repository
• https://archive.ics.uci.edu/ml/datasets/defaul
t+of+credit+card+clients
4/17/2021 CYBER SECURITYANALYTICS 26
Screenshot
4/17/2021 CYBER SECURITYANALYTICS 27
Attribute Information
4/17/2021 CYBER SECURITYANALYTICS 28
Data Preprocessing
• Selecting the Relevant Features
• Replace Missing Values
4/17/2021 CYBER SECURITYANALYTICS 29
Machine Learning Approaches
• We can use
– Logistic Regression
– Bayesian Classification
4/17/2021 CYBER SECURITYANALYTICS 30
Intrusion Detection
• The rapid advances in the internet and
communication fields have resulted in a
huge increase in the network size and the
corresponding data.
• As a result, many novel attacks are being
generated and have posed challenges for
network security to accurately detect
intrusions.
4/17/2021 CYBER SECURITYANALYTICS 31
Intrusion Detection
• Furthermore, the presence of the intruders
with the aim to launch various attacks
within the network cannot be ignored.
• An intrusion detection system (IDS) is one
such tool that prevents the network from
possible intrusions by inspecting the
network traffic, to ensure its confidentiality,
integrity, and availability.
4/17/2021 CYBER SECURITYANALYTICS 32
Intrusion Detection
• Despite enormous efforts by the
researchers, IDS still faces challenges in
improving detection accuracy while
reducing false alarm rates and in detecting
novel intrusions.
• Machine Learning can be used to detect
intruders in an effective way.
4/17/2021 CYBER SECURITYANALYTICS 33
Data Collection
• Intrusion Detection Data Set available in UCI
Repository
• http://kdd.ics.uci.edu/databases/kddcup99/kd
dcup99.html
4/17/2021 CYBER SECURITYANALYTICS 34
Screenshot
4/17/2021 CYBER SECURITYANALYTICS 35
Attribute Information
4/17/2021 CYBER SECURITYANALYTICS 36
Data Preprocessing
• Selecting the Relevant Features
• Replace Missing Values
4/17/2021 CYBER SECURITYANALYTICS 37
Machine Learning Approaches
• We can use
– Logistic Regression
– Bayesian Classification
4/17/2021 CYBER SECURITYANALYTICS 38
THANK YOU
4/17/2021 39
CYBER SECURITYANALYTICS
Dr. S Kannimuthu
(Department of CSE)
Karpagam College of Engineering
Email- kannimuthu.me@gmail.com
Blog: http://skannimuthu.blogspot.in
Publon
Profile:https://publons.com/researcher/1686169/kannimuth
u-subramanian/
Google Scholar Profile:
https://scholar.google.co.in/citations?user=eSdX5S0AAAAJ&hl=en
4/17/2021 40
CYBER SECURITYANALYTICS

Contenu connexe

Tendances

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?manoharparakh
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPTRajat Kumar
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesSlideTeam
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 

Tendances (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Application Security
Application SecurityApplication Security
Application Security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similaire à Cyber security analysis presentation

Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptx
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptxPHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptx
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptxRajiArun7
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityShiva Bissessar
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeUlf Mattsson
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Mandar Kharkar
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxJohn Donahue
 
Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsJohn ILIADIS
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...Prasanna Hegde
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 

Similaire à Cyber security analysis presentation (20)

Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptx
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptxPHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptx
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptx
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trends
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
188
188188
188
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 

Plus de Vaibhav R

Ics21 workshop decoupling compute from memory, storage & io with omi - ...
Ics21 workshop   decoupling compute from memory, storage & io with omi - ...Ics21 workshop   decoupling compute from memory, storage & io with omi - ...
Ics21 workshop decoupling compute from memory, storage & io with omi - ...Vaibhav R
 
Pratik ibm-open power-ppt
Pratik ibm-open power-pptPratik ibm-open power-ppt
Pratik ibm-open power-pptVaibhav R
 
Cineca 2021 open power
Cineca 2021   open powerCineca 2021   open power
Cineca 2021 open powerVaibhav R
 
Open source tools for logic synthesis and soc design an overview
Open source tools for logic synthesis and soc design  an overviewOpen source tools for logic synthesis and soc design  an overview
Open source tools for logic synthesis and soc design an overviewVaibhav R
 
Iit roorkee 2021
Iit roorkee 2021Iit roorkee 2021
Iit roorkee 2021Vaibhav R
 
Mayflower external overview
Mayflower external overviewMayflower external overview
Mayflower external overviewVaibhav R
 
Industry 4.0 scopes (1)
Industry 4.0 scopes (1)Industry 4.0 scopes (1)
Industry 4.0 scopes (1)Vaibhav R
 
Presentation1
Presentation1Presentation1
Presentation1Vaibhav R
 

Plus de Vaibhav R (8)

Ics21 workshop decoupling compute from memory, storage & io with omi - ...
Ics21 workshop   decoupling compute from memory, storage & io with omi - ...Ics21 workshop   decoupling compute from memory, storage & io with omi - ...
Ics21 workshop decoupling compute from memory, storage & io with omi - ...
 
Pratik ibm-open power-ppt
Pratik ibm-open power-pptPratik ibm-open power-ppt
Pratik ibm-open power-ppt
 
Cineca 2021 open power
Cineca 2021   open powerCineca 2021   open power
Cineca 2021 open power
 
Open source tools for logic synthesis and soc design an overview
Open source tools for logic synthesis and soc design  an overviewOpen source tools for logic synthesis and soc design  an overview
Open source tools for logic synthesis and soc design an overview
 
Iit roorkee 2021
Iit roorkee 2021Iit roorkee 2021
Iit roorkee 2021
 
Mayflower external overview
Mayflower external overviewMayflower external overview
Mayflower external overview
 
Industry 4.0 scopes (1)
Industry 4.0 scopes (1)Industry 4.0 scopes (1)
Industry 4.0 scopes (1)
 
Presentation1
Presentation1Presentation1
Presentation1
 

Dernier

Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxolyaivanovalion
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
ELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptxELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...amitlee9823
 

Dernier (20)

Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
ELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptxELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptx
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 

Cyber security analysis presentation

  • 1. CYBER SECURITY ANALYTICS Dr. S KANNIMUTHU, Professor / CSE Department, Karpagam College of Engineering, Coimbatore. 4/17/2021 1 CYBER SECURITYANALYTICS
  • 2. CYBER SECURITY • Practice of – protecting systems – networks – and programs from digital attacks • Cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. 4/17/2021 CYBER SECURITYANALYTICS 2
  • 3. Why CS Important? • In today’s connected world, everyone benefits from advanced cyberdefense programs. • At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. • Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. • Securing these and other organizations is essential to keeping our society functioning. 4/17/2021 CYBER SECURITYANALYTICS 3
  • 4. Why CS Important? (Contd..,) • Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat researchers at Talos, who investigate new and emerging threats and cyber attack strategies. • They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open source tools. Their work makes the Internet safer for everyone. 4/17/2021 CYBER SECURITYANALYTICS 4
  • 5. Types of CS Threats • Ransomware – is a type of malicious software. – it is designed to extort money by blocking access to files or the computer system until the ransom is paid. – paying the ransom does not guarantee that the files will be recovered or the system restored. • Malware – is a type of software designed to gain unauthorized access or to cause damage to a computer. 4/17/2021 CYBER SECURITYANALYTICS 5
  • 6. Types of CS Threats (Contd..,) • Social engineering – is a tactic that adversaries use to trick you into revealing sensitive information. – they can solicit a monetary payment or gain access to your confidential data. – can be combined with any of the threats mentioned earlier to make you more likely to click on links, download malware, or trust a malicious source. 4/17/2021 CYBER SECURITYANALYTICS 6
  • 7. Types of CS Threats (Contd..,) • Phishing – is the practice of sending fraudulent emails that resemble emails from reputable sources. – The aim is to steal sensitive data like credit card numbers and login information. – It’s the most common type of cyber attack. – You can help protect yourself through education or a technology solution that filters malicious emails. 4/17/2021 CYBER SECURITYANALYTICS 7
  • 8. When Required • Cyberterrorism – is the disruptive use of information technology by terrorist groups to further their ideological or political agenda. – This takes the form of attacks on networks, computer systems and telecommunication infrastructures. 4/17/2021 CYBER SECURITYANALYTICS 8
  • 9. When Required • Cyberwarfare – involves nation-states using information technology to penetrate another nation’s networks to cause damage or disruption. – Cyberwarfare attacks are primarily executed by hackers who are well-trained in exploiting the intricacies of computer networks, and operate under the auspices and support of nation-states. – Rather than “shutting down” a target’s key networks, a cyberwarfare attack may intrude into networks to compromise valuable data, degrade communications, impair such infrastructural services as transportation and medical services, or interrupt commerce. 4/17/2021 CYBER SECURITYANALYTICS 9
  • 10. When Required • Cyberespionage – is the practice of using information technology to obtain secret information without permission from its owners or holders. – Cyberespionage is most often used to gain strategic, economic, political or military advantage, and is conducted using cracking techniques and malware. 4/17/2021 CYBER SECURITYANALYTICS 10
  • 11. DATA ANALYTICS • Data analytics is the science of drawing insights from raw information sources. • Many of the techniques and processes of data analytics have been automated into mechanical processes and algorithms that work over raw data for human consumption. • Data analytics techniques can reveal trends and metrics that would otherwise be lost in the mass of information. This information can then be used to optimize processes to increase the overall efficiency of a business or system. 4/17/2021 CYBER SECURITYANALYTICS 11
  • 12. APPLICATION AREAS 4/17/2021 CYBER SECURITYANALYTICS 12
  • 13. CSA PROBLEMS 4/17/2021 CYBER SECURITYANALYTICS 13 • SMS SPAM DETECTION • CREDIT CARE FRAUD DETECTION • INTRUSION DETECTION
  • 14. SMS SPAM DETECTION • The mobile phone market has experienced a substantial growth over recent years. • As the utilization of mobile phone devices has become commonplace, Short Message Service (SMS) has grown into a multi-billion dollars commercial industry 4/17/2021 CYBER SECURITYANALYTICS 14
  • 15. SMS SPAM DETECTION • As the popularity of the platform has increased, we have seen a surge in the number of unsolicited commercial advertisements sent to mobile phones using text messaging 4/17/2021 CYBER SECURITYANALYTICS 15
  • 16. SMS SPAM DETECTION • SMS Spam is particularly more irritating than email spams, since in some countries they contribute to a cost for the receiver as well. • These factors along with limited availability of mobile phone spam-filtering software makes spam detection for text messages an interesting problem to look into. 4/17/2021 CYBER SECURITYANALYTICS 16
  • 17. SMS SPAM DETECTION • Hence, we are in a position to implement models for classifying SMS spam and ham messages based on message text. 4/17/2021 CYBER SECURITYANALYTICS 17
  • 18. Data Collection • SMS Spam Collection Data Set available in UCI Repository • https://archive.ics.uci.edu/ml/datasets/SMS+S pam+Collection 4/17/2021 CYBER SECURITYANALYTICS 18
  • 20. Data Preprocessing • Unstructured data is converted into structured form using IF-IDF vectorization 4/17/2021 CYBER SECURITYANALYTICS 20
  • 21. Machine Learning Approaches • We can use – Logistic Regression – Support Vector Machines 4/17/2021 CYBER SECURITYANALYTICS 21
  • 22. Credit Card Fraud Detection • Credit card fraud has emerged as major problem in the electronic payment sector. • From the moment the payment systems came to existence, there have always been people who will find new ways to access someone’s finances illegally. 4/17/2021 CYBER SECURITYANALYTICS 22
  • 23. Credit Card Fraud Detection • This has become a major problem in the modern era, as all transactions can easily be completed online by only entering your credit card information. • Even in the 2010s, many American retail website users were the victims of online transaction fraud right before two-step verification was used for shopping online. 4/17/2021 CYBER SECURITYANALYTICS 23
  • 24. Credit Card Fraud Detection • Organizations, consumers, banks, and merchants are put at risk when a data breach leads to monetary theft and ultimately the loss of customers’ loyalty along with the company’s reputation. 4/17/2021 CYBER SECURITYANALYTICS 24
  • 25. Credit Card Fraud Detection • We are in a position to study data-driven credit card fraud detection particularities and several machine learning methods to address each of its intricate challenges with the goal to identify fraudulent transactions that have been issued illegitimately on behalf of the rightful card owner. 4/17/2021 CYBER SECURITYANALYTICS 25
  • 26. Data Collection • Credit Card Fraud Detection Data Set available in UCI Repository • https://archive.ics.uci.edu/ml/datasets/defaul t+of+credit+card+clients 4/17/2021 CYBER SECURITYANALYTICS 26
  • 29. Data Preprocessing • Selecting the Relevant Features • Replace Missing Values 4/17/2021 CYBER SECURITYANALYTICS 29
  • 30. Machine Learning Approaches • We can use – Logistic Regression – Bayesian Classification 4/17/2021 CYBER SECURITYANALYTICS 30
  • 31. Intrusion Detection • The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. • As a result, many novel attacks are being generated and have posed challenges for network security to accurately detect intrusions. 4/17/2021 CYBER SECURITYANALYTICS 31
  • 32. Intrusion Detection • Furthermore, the presence of the intruders with the aim to launch various attacks within the network cannot be ignored. • An intrusion detection system (IDS) is one such tool that prevents the network from possible intrusions by inspecting the network traffic, to ensure its confidentiality, integrity, and availability. 4/17/2021 CYBER SECURITYANALYTICS 32
  • 33. Intrusion Detection • Despite enormous efforts by the researchers, IDS still faces challenges in improving detection accuracy while reducing false alarm rates and in detecting novel intrusions. • Machine Learning can be used to detect intruders in an effective way. 4/17/2021 CYBER SECURITYANALYTICS 33
  • 34. Data Collection • Intrusion Detection Data Set available in UCI Repository • http://kdd.ics.uci.edu/databases/kddcup99/kd dcup99.html 4/17/2021 CYBER SECURITYANALYTICS 34
  • 37. Data Preprocessing • Selecting the Relevant Features • Replace Missing Values 4/17/2021 CYBER SECURITYANALYTICS 37
  • 38. Machine Learning Approaches • We can use – Logistic Regression – Bayesian Classification 4/17/2021 CYBER SECURITYANALYTICS 38
  • 39. THANK YOU 4/17/2021 39 CYBER SECURITYANALYTICS
  • 40. Dr. S Kannimuthu (Department of CSE) Karpagam College of Engineering Email- kannimuthu.me@gmail.com Blog: http://skannimuthu.blogspot.in Publon Profile:https://publons.com/researcher/1686169/kannimuth u-subramanian/ Google Scholar Profile: https://scholar.google.co.in/citations?user=eSdX5S0AAAAJ&hl=en 4/17/2021 40 CYBER SECURITYANALYTICS