Cyber-threat detection and analyzer
Cyberthreats such as data breach, ransomware, Denial-of-Service (DoS)/Distributed-Denial-of-Service (DDoS) and many other types of attacks targeting everyone around the world is on the rise. The need of getting first hand information regarding those cyberthreats allows administrator or people to bec...
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/76932 |
_version_ | 1811681856180977664 |
---|---|
author | Lim, Gerald Jun Ji |
author2 | Lam Kwok Yan |
author_facet | Lam Kwok Yan Lim, Gerald Jun Ji |
author_sort | Lim, Gerald Jun Ji |
collection | NTU |
description | Cyberthreats such as data breach, ransomware, Denial-of-Service (DoS)/Distributed-Denial-of-Service (DDoS) and many other types of attacks targeting everyone around the world is on the rise. The need of getting first hand information regarding those cyberthreats allows administrator or people to become the next victim by applying necessary prevention to the credentials or systems.
In order to gather and organize that information from the internet and Deep Dark Web (DDW), a tool is developed to allow users to receive the latest information and eliminate duplicated information that gather from two or more source. With this tool, it will increase the efficiency of administrator to plan and prepare for cyberthreat with the gathered firsthand information and reduce the manhours to visit individual website to gather and cross-reference article creditability.
In this report, the architecture, development and implementation of the Cyber-Threat Detection and Analyzer tool for gathering and organizing is explained. |
first_indexed | 2024-10-01T03:47:35Z |
format | Final Year Project (FYP) |
id | ntu-10356/76932 |
institution | Nanyang Technological University |
language | English |
last_indexed | 2024-10-01T03:47:35Z |
publishDate | 2019 |
record_format | dspace |
spelling | ntu-10356/769322023-03-03T20:57:49Z Cyber-threat detection and analyzer Lim, Gerald Jun Ji Lam Kwok Yan School of Computer Science and Engineering BofA Securities DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer system implementation Cyberthreats such as data breach, ransomware, Denial-of-Service (DoS)/Distributed-Denial-of-Service (DDoS) and many other types of attacks targeting everyone around the world is on the rise. The need of getting first hand information regarding those cyberthreats allows administrator or people to become the next victim by applying necessary prevention to the credentials or systems. In order to gather and organize that information from the internet and Deep Dark Web (DDW), a tool is developed to allow users to receive the latest information and eliminate duplicated information that gather from two or more source. With this tool, it will increase the efficiency of administrator to plan and prepare for cyberthreat with the gathered firsthand information and reduce the manhours to visit individual website to gather and cross-reference article creditability. In this report, the architecture, development and implementation of the Cyber-Threat Detection and Analyzer tool for gathering and organizing is explained. Bachelor of Engineering (Computer Science) 2019-04-24T13:24:37Z 2019-04-24T13:24:37Z 2019 Final Year Project (FYP) http://hdl.handle.net/10356/76932 en Nanyang Technological University 48 p. application/pdf |
spellingShingle | DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer system implementation Lim, Gerald Jun Ji Cyber-threat detection and analyzer |
title | Cyber-threat detection and analyzer |
title_full | Cyber-threat detection and analyzer |
title_fullStr | Cyber-threat detection and analyzer |
title_full_unstemmed | Cyber-threat detection and analyzer |
title_short | Cyber-threat detection and analyzer |
title_sort | cyber threat detection and analyzer |
topic | DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer system implementation |
url | http://hdl.handle.net/10356/76932 |
work_keys_str_mv | AT limgeraldjunji cyberthreatdetectionandanalyzer |