project ideas -400 (11)

docx

School

CUNY Hunter College *

*We aren’t endorsed by this school

Course

400

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by Adrian.Gocaj25

Report
For the project , here are some general areas as starting points and you can find a specific niche, you’re interested in. (Web application security, smart home technology, machine learning in cybersecurity, and cryptocurrency/blockchain have been some recent interests.)  Below you will find some project ideas, but I would like you to be creative and come up with novel ideas in the area of cybersecurity by either preventing an attack or detecting vulnerabilities in certain systems. Remember the choices and the ideas are endless. Make sure to implement some of the attacks and the countermeasures we learned in class. 1.Network Vulnerability Assessment for Everyday Users in Information Gathering and Manipulation: Description: Evaluate the susceptibility of everyday users to potential cyber threats during information gathering and manipulation. Implementation: Develop a tool that simulates common attack scenarios (e.g., phishing emails, malicious links) and assesses how users respond. Utilize social engineering techniques to gauge the effectiveness of user awareness training. 2.DDoS Attack Mitigation: Protected vs. Unprotected Servers: Description: Investigate the effectiveness of DDoS attack mitigation strategies on both protected and unprotected servers. Implementation: Set up two server environments—one with robust DDoS protection measures and another without. Initiate controlled DDoS attacks and analyze the impact on each server. Evaluate the efficiency of various mitigation techniques. 3.Reverse TCP Attack: Description: Explore the vulnerabilities associated with reverse TCP attacks, where a target system initiates a connection to a malicious server. Implementation: Develop a controlled environment with a vulnerable system. Simulate reverse TCP attacks and study the potential exploits. Propose countermeasures and defensive strategies to mitigate the risks. 4.Multifactor Authentication Implementation: Description: Design and implement a robust multifactor authentication system to enhance user account security. Implementation: Integrate multiple authentication factors (e.g., password, biometrics, OTP) into a secure authentication process. Test the system against common attack vectors, ensuring a balance between usability and security. 5.Keylogger Detection using Wireshark: Description: Explore the use of Wireshark for detecting keyloggers and other malicious activities on a network.
Implementation: Develop a Wireshark plugin or script to analyze network traffic for patterns indicative of keyloggers. Create scenarios where keyloggers are active and test the detection capabilities of the tool. 6.Cross-Site Scripting (XSS) Attack on a Website: Description: Assess the vulnerability of a website to Cross-Site Scripting attacks. Implementation: Create a controlled environment with a vulnerable website. Perform a simulated XSS attack to inject malicious scripts. Propose mitigation techniques, such as input validation and output encoding, to prevent XSS vulnerabilities. 7.Phishing Attacks on Smartphones – Spam SMS Filter: Description: Develop a solution to filter spam SMS messages and mitigate phishing attacks on smartphones. Implementation: Design a machine learning-based spam filter for SMS messages. Train the model using a dataset of phishing and non-phishing messages. Implement the filter on smartphones to automatically identify and block suspicious messages. 8.Detecting Security Flaws in Smart Home Technologies (IoT): Description: Investigate potential security flaws in smart home technologies and propose preventive measures. Implementation: Conduct a comprehensive security assessment of smart home devices. Identify vulnerabilities such as insecure communication protocols or weak authentication. Develop guidelines for manufacturers to enhance the security of IoT devices. 9.Denial of Service (DoS) Attack: Description: Study the impact of Denial of Service attacks on a target system. Implementation: Set up a test environment with a target server. Simulate various DoS attacks (e.g., flood attacks, resource exhaustion) and analyze the server's response. Propose strategies to mitigate the impact of DoS attacks, such as rate limiting and traffic filtering.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help