Now showing items 1-5 of 5

    • Building Security Operations Center (SOC) using open source technologies SIEM for industries 

      Rabby, Zahidul Haque (Brac University, 2022-09)
      In this day of rapidly expanding technology, large industries, enterprises, and star tups must safeguard sensitive information about their clients, employees, internal processes, and more. However, with the growth of ...
    • Dynamic authentication protocols for advanced security in federated metaverse systems 

      Hasan, Md Fuad; Ashfaq, F. M.; Chowdhury, Ahmed Awsaf; Hamim, Shoeb Islam; Rahmani, Mustafiza (Brac University, 2024-01)
      Metaverse is a dynamic virtual reality-based environment that is rapidly revolutionizing digital engagement. The Metaverse is propelled by the integration of technologies like blockchain, augmented reality, virtual ...
    • A performance comparison between machine learning models on zero-day attack detection 

      Awon, Ahmed Musa; Odree, Afid; Islam, Samia; Yeasmin, Afia; Biva, Bivasha Bashir (Brac University, 2021-01)
      Traditional IDS has been shielding against cyber threats for many years but it falls short on detecting zero-day attacks. These are the attacks that are unique with unknown attack patterns and mutating attack signatures ...
    • Real-time DDoS detection in software-defined networks using machine learning 

      Hasan, Kadir; Hossain, Kaji Sajjad; Apurbo, GM Mohaiminuzzaman; Islam, MD Zubairul; Alam, Md Shakibul (Brac University, 2024-05)
      As the landscape of the digital world keeps changing and getting more advanced, so do the sophistication and complexities of cyber threats. Distributed Denial of Service (DDoS) attacks have become a major threat to network ...
    • Systematic analysis on peer-to-peer botnet attack detection 

      Binte istiaq, Faiza; E Mohammad, Rubaiyat; Tasnia, Moriom; Hassan, Kazi Moinul; Tabassum, Tanjim (Brac University, 2022-09)
      "Botnet” refers to a network of compromised machines that the bot master remotely controls to prosecute innumerable malicious activities through a CC server and mis cellaneous slave machines. It is possible to categorize ...