Module Database Search
MODULE DESCRIPTOR | |||
---|---|---|---|
Module Title | |||
Machine Learning for Cyber Security | |||
Reference | CMM541 | Version | 2 |
Created | April 2022 | SCQF Level | SCQF 11 |
Approved | May 2019 | SCQF Points | 15 |
Amended | July 2022 | ECTS Points | 7.5 |
Aims of Module | |||
---|---|---|---|
To provide students with the ability to evaluate and apply the methods, tools and techniques used in machine learning for cyber security. |
Learning Outcomes for Module | |
---|---|
On completion of this module, students are expected to be able to: | |
1 | Demonstrate a critical understanding of data science process lifecycle. |
2 | Critically evaluate the different machine learning algorithms used in cyber security. |
3 | Critically analyse and appraise the security of machine learning products. |
4 | Design and implement machine learning solutions for defensive and offensive security. |
Indicative Module Content |
---|
The case for Machine Learning (ML) in security. Data sets and Data types in security (e.g. structured vs unstructured, labelled vs unlabelled, overfitting vs underfitting, class imbalance, biased). ML product development lifecycle (e.g. TDSP or CRISP-DM). ML types (e.g. supervised, unsupervised, reinforcement). ML tasks (e.g. classification, clustering, regression, dimension reduction, density estimation, deep learning). Popular ML algorithms (e.g. LDA, CART, SVM, Naive bayesian, KNN, K-means, Random forests, Genetic algorithms, ANNs, Autoencoder). ML security applications: cracking CAPTCHA, detecting malicious URLs, detecting malware/ransomware, detecting phishing/spam emails, detecting network traffic anomalies and DOS attacks, detecting credit card fraud, Programming in Python and using relevant tools and libraries. Challenges/limitations of ML in security. Guidelines for applying ML to security. Introduction to adversarial ML. Security of ML products. |
Module Delivery |
---|
Key concepts are introduced and illustrated through lectures. The necessary practical skills are developed through a series of laboratory exercises. |
Indicative Student Workload | Full Time | Part Time |
---|---|---|
Contact Hours | 30 | 30 |
Non-Contact Hours | 120 | 120 |
Placement/Work-Based Learning Experience [Notional] Hours | N/A | N/A |
TOTAL | 150 | 150 |
Actual Placement hours for professional, statutory or regulatory body |   |   |
ASSESSMENT PLAN | |||||
---|---|---|---|---|---|
If a major/minor model is used and box is ticked, % weightings below are indicative only. | |||||
Component 1 | |||||
Type: | Coursework | Weighting: | 100% | Outcomes Assessed: | 1, 2, 3, 4 |
Description: | Students will design and implement a Machine Learning solution to a given defensive/offensive security problem, and critically evaluate the vulnerabilities of Machine Learning (ML) algorithms. |
MODULE PERFORMANCE DESCRIPTOR | |
---|---|
Explanatory Text | |
The calculation of the overall grade for this module is based on 100% weighting of C1. An overall minimum grade of D is required to pass this module. | |
Module Grade | Minimum Requirements to achieve Module Grade: |
A | The student needs to achieve an A in C1. |
B | The student needs to achieve a B in C1. |
C | The student needs to achieve a C in C1. |
D | The student needs to achieve a D in C1. |
E | The student needs to achieve an E in C1. |
F | The student needs to achieve an F in C1. |
NS | Non-submission of work by published deadline or non-attendance for examination |
Module Requirements | |
---|---|
Prerequisites for Module | None. |
Corequisites for module | None. |
Precluded Modules | None. |
INDICATIVE BIBLIOGRAPHY | |
---|---|
1 | HALDER, S. and OZDEMIR, S., 2018. Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem. Birmingham, UK: Packt Publishing. |
2 | PALOMARES CARRASCOSA, I., Kalutarage, H.K and Huang, Y., eds., 2017. Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications. Springer. |
3 | STAMP, M., 2017. Introduction to machine learning with applications in information security. Chapman and Hall/CRC. |
4 | CHIO, C. and FREEMAN, D., 2018. Machine Learning and Security: Protecting Systems with Data and Algorithms. O'Reilly. |