AI and ML Techniques For Cyber Security
AI and ML Techniques For Cyber Security
AI and ML Techniques For Cyber Security
Course No(s)
Credit Units 5
Version 1.0
Course Objectives
CO1 Apply advanced machine learning and artificial intelligence techniques to address complex
cybersecurity challenges, including intrusion detection, malware classification, and
anomaly detection.
CO3 Evaluate the performance and robustness of AI-ML based cybersecurity systems using
appropriate metrics and testing methodologies.
CO4 Critically assess the strengths, limitations, and potential vulnerabilities of AI-ML
techniques in cybersecurity applications, and propose strategies to enhance their
effectiveness and resilience against evolving threats.
CO5 Design and implement comprehensive cybersecurity solutions that integrate multiple AI
and ML techniques to detect, classify, and mitigate a range of cyber threats across different
domains.
Text Book(s)
T1 Data Mining and Machine Learning in Cybersecurity, Sumeet Dua and Xian Du, CRC
Press, 2011
T2 Artificial Intelligence & Cybersecurity For Dummies®, IBM Limited Edition, 2018
by John Wiley & Sons, Inc
T4 Hands-On Machine Learning for Cybersecurity, Soma Halder and Sinan Ozdemir,
Packt publishing
Content Structure
1. Introduction to Cyber Security ( 2 hrs)
1.1. Introduction to cyber security, cyber security challenges, types of attacks
1.2. Techniques for addressing the challenges, Block chain, Cryptographic
techniques, Access control techniques, Mathematical approach, Soft
computing techniques, AI and ML techniques.
1.3. Review of Cybersecurity Solutions
1.4. Objective of course AI-ML techniques for cyber security.
No Learning Outcomes
LO1
LO2
LO3
Course No
Lead Instructor
Session Study / HW
No. Topic Title Resource
Reference
8 Review of Sessions 1 to 7
Books, Slide deck
11 Intrusion detection
o Machine Learning in Hybrid Intrusion Detection Systems
o Anomaly–Misuse Sequence Detection System using
T1: Ch5
Association rules
o Misuse–Anomaly Sequence Detection System using
Random forest
12 Intrusion detection
o AdaBoost-Based Machine Learning for Network Intrusion
T1: Ch5
Detection
o Deep learning techniques for Intrusion Detection Systems
Module
Lab No. Lab Objective Lab Sheet Access URL
Reference
2 Misuse/Signature Detection 4
3 Spam Classification -
4 Anomaly Detection 5
5 Malware detection 6
6 Malware classification 6
Evaluation Scheme:
Legend: EC = Evaluation Component; AN = After Noon Session; FN = Fore Noon Session
Note:
Syllabus for Mid-Semester Test (Closed Book): Topics in Session Nos. 1 to 8
Syllabus for Comprehensive Exam (Open Book): All topics (Session Nos. 1 to 16)
Important links and information:
It shall be the responsibility of the individual student to be regular in maintaining the self-
study schedule as given in the course hand-out, attend the online lectures, and take all the
prescribed evaluation components such as Assignment/Quiz, Mid-Semester Test and
Comprehensive Exam according to the evaluation scheme provided in the hand-out.