Back close

Course Detail

Course Name Data Mining and Machine Learning in Cyber Security
Course Code 24CY731
Program M. Tech. in Cyber Security
Credits 3
Campus Coimbatore

Syllabus

Syllabus

Introduction to Data Mining and Machine Learning, Classical Machine learning paradigms for Data Mining, Fundamentals of Supervised and Unsupervised Machine Learning algorithms, Feature Selection – Methods. Machine learning for anomaly detection using Probabilistic Learning, Unsupervised learning, Combination learners, Evaluation methods, Hybrid detection. Machine learning for network scan detection and Network traffic profiling, Deep Learning – Optimization Techniques – Deep Feedforward Networks, Convolution Networks, Sequence Modeling – Recurrent and Recursive Nets, LSTM, Autoencoders, Deep Reinforcement learning. Representation Learning, Structured Probabilistic Models for Deep Learning, Deep Generative Models – Generative adversarial network and its variants, Applications in malware analysis and anomaly detection- Behavioral Analysis of Advances Malware such as Ransomwares. Applications of Natural language processing(NLP) in Cyber Security, Attacks on Large Language Models(LLM)- Deep fake technology, Generative AI- Uses, Threat, Simulation and Detection. 

Objectives and Outcomes

Prerequisites

Statistics and Probability 

 

Course Outcome
 

Course Outcome  

Bloom’s Taxonomy Level  

CO 1  

Understanding various Machine Learning and Data Mining Techniques. 

L2  

CO 2  

Apply different Machine Learning Techniques for Cyber Security Problems like IDS. 

L3  

CO 3  

Analyze various Feature extraction and reduction techniques 

L4  

CO 4  

Evaluate the performance of various ML/NLP/LLM models in Real time network environments. 

L5  

CO 5  

Understand and apply Deep Learning techniques for Network security. 

L3  

 

CO-PO Mapping

CO-PO Mapping  

CO/PO  

PO 1 

PO 2 

PO 3 

PO 4 

PO 5 

PO 6 

PO 7 

PO 8 

PO 9 

PO 10 

PSO1 

PSO2 

PSO3 

CO 1 

– 

– 

– 

CO 2 

– 

– 

– 

CO 3 

– 

– 

– 

CO 4 

– 

– 

– 

CO 5 

– 

– 

– 

Text Books / References

  1. Tom M Mitchell, Machine Learning , McGraw Hill, 1997. 
  2. Jiawei Han, Micheline Kamber, Jian Pei, Data Mining: Concepts and Techniques , 3rd edition, 2011. 
  3. D. K. Bhattacharyya and J. K. Kalita, Network Anomaly Detection: A Machine Learning Perspective , 1st Edition, Chapman and Hall/CRC, 2013. 
  4. T. Dunning and E. Friedman, Practical Machine Learning – A New Look at Anomaly Detection , O’Reilly, 1st edition, 2014. 
  5. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning , MIT Press, 2016. 

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now