General rules and advice for the student projects
All, ICS/SCADA, Honeypot, Malware, Intrusion detection, Forensics, IoT, Cars, Mobile, Anomaly detection, Privacy, Anonymization, Risk management, Machine Learning, Fairness, Economics, Targeted attacks, Network monitoring, SIEM, PKI, Software Security, Cryptography, Random Number Generation, Security Education
Topics: Intrusion detection, Honeypot, Targeted attacks
The scope of the project is to enhance the existing threat detection
capabilities of a real corporate internal network. It would focus on to
define, implement and integrate detection techniques such as sinkhole
network, honey net and/or deception. During the exercise the student(s)
would work together with Cyber Defence Experts (Attack Monitoring,
Incident Investigation, Incident Response) to come up with a practical
solution on this topic.
A projekt szorosan kapcsolódik ipari partnerünk, a MOL érdeklődési
területeihez, és lehetőséget biztosít a MOL kiberbiztonsági szakértőivel
történő együttműködésre.
Maximum number of students: 1 student
Contact: Levente Buttyán (CrySyS Lab), External supervisor (MOL)