0% found this document useful (0 votes)
11 views4 pages

AICS Assignments Unit-3

The document outlines a series of assignments for the TE (AI&ML) class at ISBM College of Engineering, Pune, focusing on topics related to AI and cybersecurity. Key subjects include anomaly detection, botnets, their types and attacks, and the application of these concepts in various fields such as healthcare and finance. Each assignment poses specific questions aimed at deepening students' understanding of these critical areas in technology.

Uploaded by

anilsuma19061985
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views4 pages

AICS Assignments Unit-3

The document outlines a series of assignments for the TE (AI&ML) class at ISBM College of Engineering, Pune, focusing on topics related to AI and cybersecurity. Key subjects include anomaly detection, botnets, their types and attacks, and the application of these concepts in various fields such as healthcare and finance. Each assignment poses specific questions aimed at deepening students' understanding of these critical areas in technology.

Uploaded by

anilsuma19061985
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Peoples Empowerment Group’s

ISBM COLLEGE OF ENGINEERING, PUNE


Department of Artificial Intelligence and Machine Learning

Unit 3
ASSIGNMENT-1
Class: TE (AI&ML)
Subject: AI and Cybersecurity

1. What is anomaly detection?


2. Explain anomaly detection with an example?
3. What is botnet?
4. Explain different botnet attacks?
5. Explain different types of anomalies

Prof.Kusuma Varanasi
Subject Teacher
Peoples Empowerment Group’s
ISBM COLLEGE OF ENGINEERING, PUNE
Department of Artificial Intelligence and Machine Learning

Unit 2
ASSIGNMENT-2
Class: TE (AI&ML)
Subject: AI&Cybersecurity

1. What are the different types of botnet topologies?


2. What is the difference between supervised, unsupervised, and semi-
supervised anomaly detection?
3. What are some use cases of anomaly detection in fraud detection?
4. What is a hybrid botnet topology?
5. What are the major challenges in anomaly detection?
6.

Prof.Kusuma Varanasi
Subject Teacher
Peoples Empowerment Group’s
ISBM COLLEGE OF ENGINEERING, PUNE
Department of Artificial Intelligence and Machine Learning

Unit 2
ASSIGNMENT-3.
1. What are common applications in healthcare (e.g., disease outbreak
prediction, patient monitoring)?
2. What is a centralized botnet topology?
3. What role does encryption play in botnet communication?
4. How do machine learning techniques help in anomaly detection?
5. What are the best practices for improving anomaly detection accuracy?

Prof.Kusuma Varanasi
Subject Teacher
Peoples Empowerment Group’s
ISBM COLLEGE OF ENGINEERING, PUNE
Department of Artificial Intelligence and Machine Learning

Unit 2
ASSIGNMENT-4
Class: TE (AI&ML)
Subject: AI&Cybersecurity

1. Why is anomaly detection important in cybersecurity, finance, and


healthcare?
2. What metrics are used to evaluate anomaly detection models?
3. How is anomaly detection applied in industrial IoT and predictive
maintenance?
4. How does a botmaster control bots in different topologies?
5. How do botnets avoid detection based on their topology?

Prof.Kusuma Varanasi
Subject Teacher

You might also like