Dr. Janaki Sivakumar Associate Professor Programme Leader BSc (Hons) Computer Security and Forensics BSc (Hons) Computer Science(with AI Pathway)
Dr. Janaki Sivakumar Education Background Ph.D. in Computer Science ( Specialization in AI Image Processing) Associate Fellow in Higher Education Academy(AFHEA ),UK Master of Philosophy in Computer Science Master of Computer Applications (specialization in software engineering )
Dr. Janaki Sivakumar Research Interest Computer Forensics Data Science Cryptography AI Utilized Teaching and Learning Business Intelligence
RoadMap Research Artificial Intelligence Security & Forensics
Research Your Thoughts
If you steal from one author, it’s plagiarism; if you steal from many, it’s research.” Wilson Mizner
Research
The Landscape of Cybersecurity Cybersecurity involves protecting devices, networks, data, services, and applications connected with the internet against malicious cyber attacks that cybercriminals employ to steal data and money and cause harm. In simple words, cybersecurity involves the practice of protecting networks, devices, and information against unauthorized access. 10
The Landscape of Cybersecurity Today every organization and individual relying on IT resources need robust security protection to safeguard their data and systems from growing threats like viruses, malware, DDoS attacks, ransomware, etc. 11
The Landscape of Cybersecurity The intent of cyberattacks against networks can be anything, such as: Stealing money Threats Competing with a business and hurting its network Stealing business information and damaging the reputation of a company. AI in CyberSecurity 12
The Landscape of Cybersecurity Now, you need a much more evolved, advanced, and efficient cybersecurity approach than before. This is why several research works and innovations for cyber security development are on the rise. 13
The Landscape of Cybersecurity There is rise of cyber threats, complex attack vectors, need for advanced solutions. There is information overload, fatigue, inability to detect zero-day threats. Power to analyze vast data, identify patterns, learn and adapt is not contained by most individuals and organization AI in CyberSecurity 14
Artificial Intelligence Make Effective Presentations Using Awesome Backgrounds Engage your Audience Capture Audience Attention
AI Applications in Cybersecurity Improved Threat Detection and Prevention AI-powered systems can analyze vast amounts of data from various sources, such as network traffic, logs, and user behavior, to identify anomalies and potential threats that may go unnoticed by traditional cybersecurity measures.
AI Applications in Cybersecurity Improved Threat Detection AI-powered systems can analyze vast amounts of data from various sources, such as network traffic, logs, and user behavior, to identify anomalies and potential threats that may go unnoticed by traditional cybersecurity measures.
Benefits of AI in Cybersecurity Faster Response Times AI-powered systems can automatically respond to threats by isolating infected devices or blocking malicious traffic, reducing response times significantly compared to traditional cybersecurity measures that require manual intervention.
Benefits of AI in Cybersecurity Scalability AI- powered systems can handle large volumes of data and scale up or down as needed, making them more flexible. Traditional cyber security becomes overwhelmed by large volumes of data or requires significant resources to scale up or down.
AI Applications in Cybersecurity Improved Threat Detection and Prevention Anomaly Detection: Identifying suspicious activity based on behavioral patterns. Malware and Phishing Detection: Analyzing network traffic and content for malicious signatures. Vulnerability Management: Automating vulnerability scanning and prioritizing critical patches.
AI Applications in Cybersecurity Incident Response and Investigation : Streamlining Alert Analysis: Reducing false positives and prioritizing real threats. Automating Incident Response: Orchestrating containment, cleanup, and recovery procedures. Threat Hunting: Proactively searching for hidden threats and advanced persistent threats.
AI Applications in Cybersecurity User and Endpoint Security: Behavioral Analytics: Detecting unauthorized access and anomalous user activity. Data Loss Prevention (DLP): Monitoring and controlling sensitive data movement. Endpoint Security Automation: Automating endpoint threat detection and response.
AI Tools Darktrace CrowdStrike Vectra Hybrid cybersecurity with AI and ML Spark Cognition SentinelOne ThreatCloud AI Acronis Cyber Protect Deep Instinct LogRhythm NDR Cybereason AI in CyberSecurity 23
Research into and study of materials and sources to establish facts and reach new conclusions Domain-specific contexts is a Systematic investigation Scientific Method Knowledge Results
Research Methods Research methods refer to the strategies, tools, and techniques used to gather and analyze data in a structured way to answer a research question or investigate a hypothesis (Hammond & Wellington, 2020).
Qualitative research in cybersecurity focuses on understanding human behaviors, experiences, and cultural phenomena related to security practices, threats, and responses. This type of research helps uncover the reasons behind certain behaviors and attitudes toward cybersecurity Qualitative Research
Quantitative research in cybersecurity focuses on measuring and analyzing numerical data to identify patterns, correlations, and causal relationships. This type of research helps to quantify risks, evaluate the effectiveness of security measures, and make data-driven decisions. Quantitative Research
Abstract A brief summary of a research paper, usually about 150-250 words, that highlights the main objectives, methods, results, and conclusions of the study. It helps readers quickly determine the paper's relevance.
Ethics Principles and guidelines that govern the conduct of research to ensure integrity, quality, and respect for participants. It includes obtaining informed consent, ensuring confidentiality, and avoiding plagiarism.
Importance of CyberSecurity Research The ever-evolving landscape of digital threats helps to protect individuals, organizations, and nations from cyber attacks.
Financial Impacts Direct Financial Losses Cost of Recovery Business Interruption Fines and Penalties
Operational Impacts Disruption of Services Loss of Data Damage to Infrastructure
Loss of Trust: Breaches can erode trust among customers, partners, and investors, damaging an organization's reputation and brand value. Negative Publicity: Media coverage of cyber incidents can lead to negative publicity and long-term damage to a company's public image. Customer Attrition: Customers may choose to take their business elsewhere if they perceive an organization as unable to protect their data adequately. Reputational Impacts
Data Integrity: Cyber attacks can compromise data integrity, leading to incorrect or corrupted information being used in decision-making processes. System Downtime: Attacks can cause significant downtime, affecting the targeted organization and interconnected systems and services. Erosion of Technological Confidence: Frequent cyber attacks can erode confidence in digital technologies and hinder the adoption of innovations. Technological Impacts
Distributed Denial of Service (DDoS) Attacks: Overwhelming a network with traffic to disrupt services. Man-in-the-Middle (MitM) Attacks: Intercepting and altering communications between two parties. Eavesdropping Attacks: Listening in on unencrypted communications. Network Attacks
Distributed Denial of Service (DDoS) Attacks: Where: Public-facing websites, online services, gaming servers. How: Attackers use a botnet (network of compromised devices) to flood a target with traffic, overwhelming the server or network and rendering it unusable. Network Attacks
Man-in-the-Middle (MitM) Attacks Where: Public Wi-Fi networks, unsecured communication channels. How: Attackers intercept communications between two parties, eavesdropping or injecting malicious data. This can happen through rogue access points or DNS spoofing. Network Attacks
Eavesdropping Attacks Where: Unencrypted communication channels, public Wi-Fi How: Attackers passively listen to network traffic to capture sensitive information such as login credentials or confidential data. Network Attacks
Malware: Infecting devices with viruses, worms, ransomware, spyware, or trojans. Phishing: Trick users into providing sensitive information or installing malware through deceptive emails or websites. Drive-by Downloads: Automatically downloading malicious software when visiting compromised websites. Endpoint Attacks
Malware: Where: Personal computers, mobile devices, enterprise networks. How: Malware can be delivered via email attachments, malicious websites, or software downloads. Once installed, it can steal data, monitor activity, or damage the system. Endpoint Attacks
Phishing Where: Email inboxes, social media, fake websites. How: Attackers send deceptive messages that appear legitimate, tricking users into clicking on malicious links or providing sensitive information. Endpoint Attacks
Drive-by Downloads Where: Compromised websites, malicious advertisements. How: Simply visiting a compromised website can trigger an automatic download of malicious software onto the user's device. Endpoint Attacks
SQL Injection: Inserting malicious SQL code into a query to manipulate the database. Cross-Site Scripting (XSS): Injecting malicious scripts into web pages viewed by other users. Cross-Site Request Forgery (CSRF): Forcing a user to execute unwanted actions on a web application where they are authenticated. Application Attacks
SQL Injection Where: Websites and web applications with poor input validation. How: Attackers insert malicious SQL queries into input fields, manipulating the database to reveal or alter data. Application Attacks
Cross-Site Scripting (XSS): Where: Web applications that reflect user input back to the browser without validation. How: Attackers inject malicious scripts into web pages viewed by other users. These scripts can steal cookies, session tokens, or other sensitive information. Application Attacks
Cross-Site Request Forgery (CSRF): Where: Web applications that do not verify the origin of requests. How: Attackers trick authenticated users into making unintended requests, potentially altering data or performing actions on their behalf. Application Attacks
Brute Force Attacks: Attempting to gain access by systematically trying all possible passwords. Zero-Day Exploits: Exploiting unknown vulnerabilities before they are patched. Credential Stuffing: Using stolen credentials to gain unauthorized access. Server Attacks
Brute Force Attacks Where: Login pages, remote access services (e.g., SSH, RDP). How: Attackers use automated tools to try many combinations of usernames and passwords until they find the correct one. Server Attacks
Zero-Day Exploits Where: Software and systems with unknown vulnerabilities. How: Attackers exploit vulnerabilities that have not yet been patched by the vendor, gaining unauthorized access or control. Server Attacks
Credential Stuffing Where: Websites and online services. How: Attackers use lists of stolen usernames and passwords from previous breaches, trying them on different services in hopes of finding matches. Server Attacks
Data Breaches: Unauthorized access to sensitive data. Ransomware: Encrypting data and demanding payment for the decryption key. Insider Threats: Employees or insiders leaking or exploiting confidential data. Data Attacks
Data Breaches: Where: Databases, cloud storage, file servers. How: Attackers gain unauthorized access to systems to steal sensitive data, often through vulnerabilities or social engineering. Data Attacks
Ransomware: Where: Enterprise networks, personal computers. How: Ransomware is typically delivered via phishing emails or exploit kits. It encrypts the victim's data, demanding payment for the decryption key. Data Attacks
Insider Threats: Where: Within organizations. How: Employees or contractors with legitimate access misuse their privileges to steal or compromise data. Data Attacks
Botnets: Compromising IoT devices to create a network of bots for launching attacks. Firmware Exploits: Exploiting vulnerabilities in IoT device firmware. Physical Attacks: Gaining physical access to devices to tamper with them. IoT (Internet of Things) Attacks
Pretexting: Creating a fabricated scenario to steal information. Baiting: Using false promises to lure victims into providing information or access. Quid Pro Quo: Offering a service or benefit in exchange for information. Social Engineering Attacks
Qualitative Research Artificial Intelligence (AI) and Machine Learning (ML) algorithms can significantly enhance qualitative analysis in research by automating and improving the accuracy of data processing and interpretation
Natural Language Processing (NLP) Algorithms Sentiment Analysis Social Media Monitoring: Tools like Brandwatch and Hootsuite use sentiment analysis to monitor and analyze public sentiment about brands, products, or services on platforms like Twitter, Facebook, and Instagram. Customer Feedback: Companies like Amazon and Yelp use sentiment analysis to understand customer reviews and improve their products and services.
Natural Language Processing (NLP) Algorithms Sentiment Analysis Threat Intelligence: Analyzes social media and forum posts to gauge sentiment and detect potential threats or emerging cyber threats. Incident Response: Evaluate the sentiment in communication logs to understand user reactions and potential insider threats.
Natural Language Processing (NLP) Algorithms Topic Modeling Content Recommendation: News aggregators like Google News use topic modeling to categorize and recommend articles based on user interests. Academic Research: Tools like Leximancer and NVivo use topic modeling to help researchers identify themes and trends in large sets of qualitative data.
Natural Language Processing (NLP) Algorithms Topic Modeling Security Reports: Analyzes security reports and threat bulletins to identify common themes and emerging threats. Dark Web Monitoring: Extracts topics from discussions on dark web forums to detect planned cyber attacks.
Natural Language Processing (NLP) Algorithms Named Entity Recognition (NER): Information Extraction: Search engines like Google use NER to identify and extract key entities from web pages to enhance search results and snippets. Document Management: Legal and financial firms use NER to automatically identify and categorize entities in large document repositories.
Natural Language Processing (NLP) Algorithms Named Entity Recognition (NER) Threat Identification: Automatically identifies entities like IP addresses, domain names, and malware names in threat reports and logs. Incident Analysis: Helps in identifying key entities involved in security incidents from logs and communications.
Text Classification Algorithms Named Entity Recognition (NER) Threat Identification: Automatically identifies entities like IP addresses, domain names, and malware names in threat reports and logs. Incident Analysis: Helps in identifying key entities involved in security incidents from logs and communications.