{"id":1302,"date":"2024-06-25T18:29:41","date_gmt":"2024-06-25T22:29:41","guid":{"rendered":"https:\/\/sites.mitre.org\/capstones\/?p=1302"},"modified":"2024-06-25T18:29:41","modified_gmt":"2024-06-25T22:29:41","slug":"ai-ml-driven-network-cyber-anomaly-prediction","status":"publish","type":"post","link":"https:\/\/sites.mitre.org\/capstones\/2024\/06\/ai-ml-driven-network-cyber-anomaly-prediction\/","title":{"rendered":"AI\/ML-driven network cyber anomaly prediction"},"content":{"rendered":"\n<p>Title: AI\/ML-driven network cyber anomaly prediction<br \/>\nProject ID: 0exq325<br \/>\nDomain(s): Machine Learning,Systems Engineering,Data Science,Artificial Intelligence,Cybersecurity<\/p>\n<p>Description:<\/p>\n<p>By leveraging machine learning algorithms, AI can learn from historical data, recognize patterns, and make accurate predictions about future anomalies. Potential goals: (a) Use AI\/ML to analyze network behavior and predict potential cyber security threats\/anomalies based on network activity, behavior, and system history. (b) Implement AI\/ML to automatically create recommendations for system configuration changes to mitigate cyber threats. (c) Employ AI\/ML to automatically categorize predicted cyber security threats\/anomalies (Data breach, compromised user account, system config change, etc.). It is entirely acceptable to adapt and repurpose existing codes found in open-source libraries or those that are available commercially. <\/p>\n<p>Desired Skills:<br \/>\nArtificial Intelligence (AI), Machine Learning, Cyber Security, Network Analysis, Computer Science, Data Science. <\/p>\n<h3>Clearance-<\/h3>\n<p>US Citizenship Required: No<br \/>\nActive Clearance or Background Investigation Required: No<br \/>\nLevel Needed: <\/p>\n<h3>Team Information-<\/h3>\n<p>Targeted Students: Grad<br \/>\nTeam Size: 2 to 4<br \/>\nDetails: <\/p>\n<h3>Specific Requirements-<\/h3>\n<p>Focus on Particular University: No<br \/>\nDetails: <\/p>\n<h3>Timeline-<\/h3>\n<p>Focus Timeline: Yes<br \/>\nDetails: Two semesters<\/p>\n<h3>Funding-<\/h3>\n<p>Potential Funding:No<br \/>\nNote: Availability of funds not guaranteed<\/p>\n<p><br \/>\n<a href=\"https:\/\/sites.mitre.org\/capstones\/interest?PT=AI\/ML-driven network cyber anomaly prediction&amp;PID=0exq325&amp;POC=ptaheri@mitre.org\" style=\"background-color:#07648d;color: white;font-weight: bold;padding: 14px 25px;text-align: center;float:right\">I&#8217;m Interested In this Project<\/a><\/p>\n<p><br \/>\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By leveraging machine learning algorithms, AI can learn from historical data, recognize patterns, and make accurate predictions about future anomalies. Potential goals: (a) Use AI\/ML to analyze network behavior and predict potential cyber security threats\/anomalies based on network activity, behavior, and system history. (b) Implement AI\/ML to automatically create recommendations for system configuration changes to mitigate cyber threats. (c) Employ AI\/ML to automatically categorize predicted cyber security threats\/anomalies (Data breach, compromised user account, system config change, etc.). It is entirely acceptable to adapt and repurpose existing codes found in open-source libraries or those that are available commercially. <\/p>\n","protected":false},"author":913,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[11],"tags":[32,24,25,33,27],"class_list":["post-1302","post","type-post","status-publish","format-standard","hentry","category-capstone","tag-artificial-intelligence","tag-cyber","tag-datascience","tag-and-machine-learning","tag-se"],"acf":[],"_links":{"self":[{"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/posts\/1302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/users\/913"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/comments?post=1302"}],"version-history":[{"count":1,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/posts\/1302\/revisions"}],"predecessor-version":[{"id":1305,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/posts\/1302\/revisions\/1305"}],"wp:attachment":[{"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/media?parent=1302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/categories?post=1302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/tags?post=1302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}