Thesis topic:

Artificial Intelligence to Secure Intelligent Infrastructure Systems

  • Supervisor: Raimundas Matulevičius
    • contact:
  • Security refers to protecting valuables of anyone's belongings, by the same analogy cybersecurity is the protection of data and devices on the internet infrastructure. The integration of devices and the internet have posed a serious threat to hardware devices, software and data against possible malicious attacks. It is essential to secure internet infrastructure to prevent cybercrimes, scams and reduce organizations loss incurred due to data breach. Machine learning is the part of AI which analyzes patterns and learns from them over the time period. Therefore, to prevent cyber attacks, Machine learning/AI can help cybersecurity teams understand the pattern of attacks within hours which generally takes days with hardcoded algorithms. Also, machine learning algorithms benefit from its ability to learn and improve its capability based on experience and results. With time, reliance on machine learning for cybersecurity and its integration on the system architecture has increased considerably due to the fact that it improves fraudulent analysis and allows us to take necessary steps to prevent forthcoming attacks in near future. There remains a vast research field wide open to pursue and study Artificial Intelligence for CyberSecurity. Some of the possible research directions in this domain could be (students are free to propose other research ideas relevant to the topic):
    • Machine learning for network protection
    • Machine learning for intrusion detection
    • Network traffic anomaly detection
    • Enhancing cloud security by artificial intelligence
    • Application security using machine learning for malware and spam detection

The goal of this project is to perform a systematic literature review of the AI methods used to Secure Intelligent Infrastructure Systems. The expected result is a reference framework which would illustrate the current trends and would suggest guidelines both for the researchers and practitioner

<< back