project ideas -400 (11)
docx
keyboard_arrow_up
School
CUNY Hunter College *
*We aren’t endorsed by this school
Course
400
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by Adrian.Gocaj25
For the project
, here are some general areas as starting points and you can find a specific niche,
you’re interested in. (Web application security, smart home technology, machine learning in
cybersecurity, and cryptocurrency/blockchain have been some recent interests.)
Below you will find some project ideas, but I would like you to be creative and come up with
novel ideas in the area of cybersecurity by either preventing an attack or detecting vulnerabilities
in certain systems. Remember the choices and the ideas are endless. Make sure to implement
some of the attacks and the countermeasures we learned in class.
1.Network Vulnerability Assessment for Everyday Users in Information Gathering and
Manipulation:
Description: Evaluate the susceptibility of everyday users to potential cyber threats during
information gathering and manipulation.
Implementation: Develop a tool that simulates common attack scenarios (e.g., phishing emails,
malicious links) and assesses how users respond. Utilize social engineering techniques to gauge
the effectiveness of user awareness training.
2.DDoS Attack Mitigation: Protected vs. Unprotected Servers:
Description: Investigate the effectiveness of DDoS attack mitigation strategies on both protected
and unprotected servers.
Implementation: Set up two server environments—one with robust DDoS protection measures
and another without. Initiate controlled DDoS attacks and analyze the impact on each server.
Evaluate the efficiency of various mitigation techniques.
3.Reverse TCP Attack:
Description: Explore the vulnerabilities associated with reverse TCP attacks, where a target
system initiates a connection to a malicious server.
Implementation: Develop a controlled environment with a vulnerable system. Simulate reverse
TCP attacks and study the potential exploits. Propose countermeasures and defensive strategies
to mitigate the risks.
4.Multifactor Authentication Implementation:
Description: Design and implement a robust multifactor authentication system to enhance user
account security.
Implementation: Integrate multiple authentication factors (e.g., password, biometrics, OTP) into
a secure authentication process. Test the system against common attack vectors, ensuring a
balance between usability and security.
5.Keylogger Detection using Wireshark:
Description: Explore the use of Wireshark for detecting keyloggers and other malicious activities
on a network.
Implementation: Develop a Wireshark plugin or script to analyze network traffic for patterns
indicative of keyloggers. Create scenarios where keyloggers are active and test the detection
capabilities of the tool.
6.Cross-Site Scripting (XSS) Attack on a Website:
Description: Assess the vulnerability of a website to Cross-Site Scripting attacks.
Implementation: Create a controlled environment with a vulnerable website. Perform a simulated
XSS attack to inject malicious scripts. Propose mitigation techniques, such as input validation
and output encoding, to prevent XSS vulnerabilities.
7.Phishing Attacks on Smartphones – Spam SMS Filter:
Description: Develop a solution to filter spam SMS messages and mitigate phishing attacks on
smartphones.
Implementation: Design a machine learning-based spam filter for SMS messages. Train the
model using a dataset of phishing and non-phishing messages. Implement the filter on
smartphones to automatically identify and block suspicious messages.
8.Detecting Security Flaws in Smart Home Technologies (IoT):
Description: Investigate potential security flaws in smart home technologies and propose
preventive measures.
Implementation: Conduct a comprehensive security assessment of smart home devices. Identify
vulnerabilities such as insecure communication protocols or weak authentication. Develop
guidelines for manufacturers to enhance the security of IoT devices.
9.Denial of Service (DoS) Attack:
Description: Study the impact of Denial of Service attacks on a target system.
Implementation: Set up a test environment with a target server. Simulate various DoS attacks
(e.g., flood attacks, resource exhaustion) and analyze the server's response. Propose strategies to
mitigate the impact of DoS attacks, such as rate limiting and traffic filtering.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help