Skip to content

infosciassoc/From-Defense-to-Offense-Leveraging-AI-and-ML-in-Cybersecurity

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

From Defense to Offense: Leveraging AI and ML in Cybersecurity - Seminar Tasks

Overview

In this session, you will work on one of two tasks focused on detecting threats using machine learning. Your goal is to analyze data and build a predictive model.

🛠 Choose Your Task

You can select one of the following:

🔹 Task 1: Predicting Malicious Executable Files

🎯 Objective

What is Malware?

Malware (malicious software) is any program or file designed to harm, exploit, or otherwise compromise a computer system, network, or user data. It includes viruses, worms, Trojans, ransomware, and spyware, often spreading through malicious downloads, email attachments, or software vulnerabilities.

Attackers use malware to steal sensitive information, disrupt operations, or gain unauthorized access to systems. Detecting malware is crucial for cybersecurity, as it helps prevent data breaches, financial losses, and system damage.

image

If you feel extra, you can create a web interface where users can upload a .exe file to check whether it is malicious or safe.

Develop a model to determine whether a .exe file is malicious or safe based on its characteristics.

🔍 What You’ll Do

  • Extract features from executable files.
  • Train a machine learning model to classify them.
  • Evaluate your model’s accuracy and performance.

🏁 Expected Output

A trained model that, when given a new .exe file, predicts if it is malicious or legitimate.


🔹 Task 2: Detecting Phishing URLs

🎯 Objective

What is Phishing?

Phishing is a form of cyber fraud where attackers impersonate trusted companies or individuals to steal sensitive information, such as login credentials or account details. This is often done through emails or other communication channels.

Attackers widely use phishing because it is easier to trick someone into clicking a malicious link that looks legitimate than to bypass a computer’s security defenses.

image

The main goal is to build a system that identifies whether a given URL is a legit or fake website created to perform fraud. If you feel extra, you can create a web interface to allow users to input a URL and receive a real-time prediction on whether it is phishing or legitimate.

This interface can enhance usability by providing an intuitive way for users to test URLs without needing to run code manually. You can implement it using frameworks like Flask or Streamlit for a simple and interactive experience.

🔍 What You’ll Do

  • Analyze URL structures and extract key attributes.
  • Train a classification model to detect phishing attempts.
  • Test and evaluate your model’s effectiveness.

🏁 Expected Output

A model that classifies URLs as phishing or safe based on extracted features.


🚀 How to Get Started

  1. Clone this repository.
  2. Choose one of the two tasks.
  3. Follow the provided dataset and guidelines.
  4. Build and evaluate your model.

For those interested in a more advanced challenge, consider integrating both tasks—malware detection and phishing URL prediction—into a single platform for comprehensive cybersecurity analysis.

💡 This session is hands-on—feel free to collaborate, ask questions, and experiment!


👨‍💻 Happy coding & good luck!

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors