0% found this document useful (0 votes)
19 views3 pages

Cs Microproject

The document outlines group formations for a micro project in Cyber Security and Digital Forensics at N.G. Patel Polytechnic for the IT Department. Each group is assigned a specific project, including topics like anomaly detection systems, credit card fraud detection, digital forensics case studies, and network traffic analysis. The document lists student names along with their enrollment numbers and corresponding project topics.

Uploaded by

maitrikjoshi2007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views3 pages

Cs Microproject

The document outlines group formations for a micro project in Cyber Security and Digital Forensics at N.G. Patel Polytechnic for the IT Department. Each group is assigned a specific project, including topics like anomaly detection systems, credit card fraud detection, digital forensics case studies, and network traffic analysis. The document lists student names along with their enrollment numbers and corresponding project topics.

Uploaded by

maitrikjoshi2007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

N.G.

PATEL POLYTECHNIC
INFORMATION TECHNOLOGY DEPARTMENT
CLASS IT - 2022
GROUP FORMATION OF MICRO PROJECT
SUBJECT: Cyber Security and Digital Forensics(4361601)
Sr. ENROLLMENT NAME
GROUP MICROPROJECT
No No. (As Per Enrollment Register)

1 226370316001 ARYAN MITULKUMAR PATEL

Anomaly Detection System.Anomaly Detection System: Build an anomaly-based


DDoS detection system that establishes a baseline of normal network behaviour and
2 226370316002 BHUT BRIJ GROUP 1
identifies deviations from this baseline as potential attacks. This could involve
statistical analysis or machine learning techniques.

3 226370316004 DHIRAJ PATIL

4 226370316005 DHYEY BORSE


Credit Card Fraud Detection System: Develop an intelligent credit card fraud
detection system that combines various techniques and technologies to identify and
5 226370316006 DOSHI JAINIL GURUSHARAN GROUP 2 prevent fraudulent credit card transactions in real-time. The system should be able
to distinguish between legitimate transactions and unauthorized or fraudulent
activities.
6 226370316007 FALDU VANSH PRAVINBHAI

7 226370316008 GAJJAR NEHAL DHARMESHBHAI

Create a Case Study:Ask students to analyze a genuine or hypothetical legal case


8 226370316009 GANDHI JASH DEVANSHUKUMAR GROUP 3 that involves digital evidence and require them to create a comprehensive report or
presentation focusing on the various aspects of digital forensics within the case.

9 226370316010 GOSWAMI ADITI PANKAJKUMAR

10 226370316011 HARSH PATEL

Network traffic logs analysis:Provide network traffic logs for analysis by students to
11 226370316012 HET SHAILESHBHAI RATHOD GROUP 4 detect any potentially suspicious or malicious activities, including unauthorized
access or data exfiltration.

12 226370316013 JAIN DHRUVIT RAJENDRABHAI

13 226370316014 JOSHI ANAY GAURANGBHAI

Basic mobile forensic analysis: Students should be guided to perform a mobile


14 226370316015 JOSHI MAHARSHI AMITBHAI GROUP 5 forensic analysis, which involves extracting deleted text messages, phone records,
and other digital evidence.

15 226370316016 JOSHI MAITRIK

16 226370316017 KAKADIYA TIRTHKUMAR PRAKASHBHAI

Network Scanning & Vulnerability Assessment: Prepare report and suggest ways to
17 226370316018 KHER DIVYARAJSINH KISHORSINH GROUP 6
secure local area network or WLAN of institute

18 226370316019 LAD HETVI SHASHIKANTBHAI


19 226370316020 MAHAJAN VAIDIP DILIP

Identify web application is vulnerable to something like SQL injection or XSS and
20 226370316021 MAISURIA NEEL DVIJESH GROUP 7
suggest ways to protect it.

21 226370316022 MAKVANA KEVAL SHAILESHBHAI

22 226370316023 MISTRY JEEL ALPESHBHAI

23 226370316024 MISTRY KRISH SANJAYKUMAR GROUP 8 Use ethical hacking to break passwords.

24 226370316025 MUNDKE MOHIL AASHUTOSH

25 226370316026 NADPARA JEET ASHVINBHAI

Anomaly Detection System.Anomaly Detection System: Build an anomaly-based


DDoS detection system that establishes a baseline of normal network behaviour and
26 226370316027 NAYAK MAYANK KEDAR GROUP 9
identifies deviations from this baseline as potential attacks. This could involve
statistical analysis or machine learning techniques.

27 226370316028 NAYKA PRIYA VINODBHAI

28 226370316029 NEEL LANGALIYA


Credit Card Fraud Detection System: Develop an intelligent credit card fraud
detection system that combines various techniques and technologies to identify and
29 226370316032 PATEL HARSHKUMAR NARESHBHAI GROUP 10 prevent fraudulent credit card transactions in real-time. The system should be able
to distinguish between legitimate transactions and unauthorized or fraudulent
activities.
30 226370316033 PATEL KAVYA BHARATBHAI

31 226370316034 PATEL MAKKUMAR JITENDRAKUMAR

Create a Case Study:Ask students to analyze a genuine or hypothetical legal case


32 226370316035 PATEL MEGHKUMAR NAITIKBHAI GROUP 11 that involves digital evidence and require them to create a comprehensive report or
presentation focusing on the various aspects of digital forensics within the case.

33 226370316036 PATEL NEHAJKUMAR JIGNESHKUMAR

34 226370316037 PATEL NIL DIPAKKUMAR

Network traffic logs analysis:Provide network traffic logs for analysis by students to
35 226370316038 PATEL NIYATIBEN VIJAYBHAI GROUP 12 detect any potentially suspicious or malicious activities, including unauthorized
access or data exfiltration.

36 226370316040 PATEL SHUBH DILIPKUMAR

37 226370316042 PATEL TANVIBEN NARESHBHAI

Basic mobile forensic analysis: Students should be guided to perform a mobile


38 226370316043 PATEL TANVIKUMARI JAYANTIBHAI GROUP 13 forensic analysis, which involves extracting deleted text messages, phone records,
and other digital evidence.

39 226370316045 PATIL TUSHAR PURUSHOTTAM


40 226370316046 PAWAR DHRUV PRAFULKUMAR

Network Scanning & Vulnerability Assessment: Prepare report and suggest ways to
41 226370316047 PIMPALE VIVEKKUMAR BHARAT GROUP 14
secure local area network or WLAN of institute

42 226370316048 POLARA RAJ SHIVABHAI

43 226370316051 RANA SHREYA DHARMESH

Identify web application is vulnerable to something like SQL injection or XSS and
44 226370316052 RATHOD NIVIDKUMAR ASHOKBHAI GROUP 15
suggest ways to protect it.

45 226370316053 SATOTE VAIBHAV CHHAGANBHAI

46 226370316054 SHAH RONAK SAJJANRAJ

47 226370316055 SHAIKH MOHAMAD UMAR MO.SHAFI GROUP 16 Use ethical hacking to break passwords.

48 226370316057 SHEKHAT KRISHKUMAR VINODBHAI

49 226370316059 SONI MEETKUMAR VIMALKUMAR

Anomaly Detection System.Anomaly Detection System: Build an anomaly-based


DDoS detection system that establishes a baseline of normal network behaviour and
50 226370316060 SONVANE MOHIT VIJAY GROUP 17
identifies deviations from this baseline as potential attacks. This could involve
statistical analysis or machine learning techniques.

51 226370316061 SUKHADIYA DEVKUMAR PARESHBHAI

Credit Card Fraud Detection System: Develop an intelligent credit card fraud
52 226370316062 THAKUR TILAK GHANSHYAMBHAI
detection system that combines various techniques and technologies to identify and
GROUP 18 prevent fraudulent credit card transactions in real-time. The system should be able
to distinguish between legitimate transactions and unauthorized or fraudulent
54 226370316064 VISHWAKARMA ISHWAR NARAYAN activities.

You might also like