0% found this document useful (0 votes)
44 views3 pages

Brown University Olawale Akanji SOP

Uploaded by

sitijacharya786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views3 pages

Brown University Olawale Akanji SOP

Uploaded by

sitijacharya786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

STATEMENT OF PURPOSE FOR Ph.D.

IN COMPUTER SCIENCE FALL 2023

Today's world faces a significant challenge in ensuring data and user security and privacy while
connecting to the internet, particularly with resource-constrained technology such as IoT devices.
IoT devices are increasing by the minute, with billions of devices connected with one
another, sharing and creating enormous amounts of data. These resource-constrained systems are
vulnerable to attacks, and integrating complex security measures directly into their components is
nearly difficult. Intrusion detection system was designed to aid in the early identification of
intrusions using recognized signatures. However, attacks are taking on new dimensions, and
traditional intrusion detection systems are struggling to keep up with the IoT ecosystem's ever-
changing threat landscape.

To detect these attacks early, researchers used machine learning (ML) and artificial intelligence
(AI), which seek for deviations from a system's or network's behavioral pattern. Although research
into AI-based intrusion detection systems is still in its early stages, results have shown that if well
improved upon by using solid algorithms, sufficient and related datasets for training, and
knowledgeable expertise for finetuning and improving the model, AI-based Intrusion Detection
Systems can help identify early signs of possible network intrusion or attacks. As a result, my goal
is to make significant contributions to the development of novel AI models through high-quality
research to serve as cyber security solutions in ensuring security and privacy of users while using
resource-constrained devices. To achieve this aim and further my academic studies, I intend to
pursue graduate studies at this prestigious university in order to obtain a Ph.D. in Computer
Engineering.

I am a final-year student with a First-Class grade point average of 4.99 on a 5.0 scale. Throughout
my undergraduate studies, I gained several skills and knowledge of cyber security technicalities
by taking courses in Algorithm and complexity analysis, Data Structure, System Security, Fault
Tolerant computing, Cryptographic Algorithm, Linear algebra, Artificial Intelligence (AI),
Modelling and simulation, System and Network Administration, Digital Forensics, System
Analysis and Design, Computer architecture, and various Programming languages. While these
courses provide both depth and breadth in this field, they emphasize the importance and relevance

OLAWALE AMOS AKANJI SOP 1


of cyber security and the application of its fundamentals to real-world situations, as well as the
need to develop long-term cybersecurity tools and solutions to help keep the cyberspace secure.

I had a very successful internship with a Tier 3 National Shared Service Data Center, where I
worked as a Network security analyst managing client firewalls using several AI-based
technologies like as Palo Alto and Huawei Anti-DDos, and Firehunter. This experience gave me
more knowledge about the cybersecurity field. I also closely worked with the research team, which
gave me the opportunity to work on larger-scale projects involving high-level software and
technologies including AI-based intrusion detection systems and sophisticated endpoint security
software.

During my time with the research team, I became interested in projects involving artificial
intelligence after discovering that artificial intelligence and its subdomains can be used to provide
various solutions for protecting devices from cyber-attacks, which formed the basis of my
undergraduate research. My undergraduate research focused on "Deep learning technique for
Intrusion detection system in Internet of Things devices," where I created a novel hybrid model
that employs a deep learning algorithm for feature engineering and another deep learning algorithm
for classification on a set of IoT's most recent datasets. It overcomes certain current research gaps,
such as researchers evaluating the performance of IoT device models using outdated datasets that
do not incorporate new IoT traffic. This interdisciplinary research that spans cybersecurity, the
Internet of Things, and artificial intelligence exposed me to the knowledge and numerous benefits
of artificial intelligence, and deep learning techniques application in cybersecurity, it aided in the
development of my python programming skills and motivated me to want to offer solutions to
other challenges of AI-based intrusion detection systems in the future.

I was unable to delve deeper into the applications of artificial intelligence in detecting anomalous
behavior in IoT networks due to resource and time constraints; however, I would like to explore
this research option in my graduate studies as I look to address some current challenges, which
include but are not limited to inconsistent implementation architectures that can make the use of
AI-based intrusion detection systems difficult, and problems with insufficient datasets, building
AI-based models that can consistently and accurately work in any type of network environment,
As a result, I decided to pursue a graduate degree in computer science with a focus on cybersecurity
in order to broaden my research area and learn the skills needed to build unique AI models and

OLAWALE AMOS AKANJI SOP 2


technologies that would aid in the protection of devices from attacks. My graduate studies study
will revolve around Cybersecurity, IoT, and Artificial intelligence and its subdomains (AI for
Cybersecurity, and also AI for Cybersecurity).

Coming from a disadvantaged home, I struggled and worked twice as hard to achieve my set goal
of successfully getting a bachelor's degree. I was able to graduate because I got the NNPC/TOTAL
National Merit Scholarship Award, which was used to fund my undergraduate education. As a
First-Generation African student from an underrepresented community in the field of Artificial
Intelligence and Cyber security, I hope to advance my career in the Nigerian Air Force from a non-
commissioned officer to a commissioned officer at the end of my graduate studies, This degree
will enable me to serve at the Air Force Research and Development Centre, where I will be able
to contribute my own quota of experience to securing the Air Force Internet of Battle of Things,
such as Unmanned Combat Aerial Vehicles (UCAV's), as well as the development of novel models
for malware analysis and detection of state-sponsored attacks. While also serving as a source of
inspiration for other non-commissioned officers who, like myself, joined the service with a
secondary school diploma but, through dedication and hard work, became one of the 0.005 percent
who graduated from a Ph.D. program while still serving as a non-commissioned officer. My Long-
term ambitions include establishing a cybersecurity academy to provide students with hands-on
experience and to assist anybody interested in a career in cybersecurity, including military
personnel transitioning to civilian life, among others.

Brown University Department of Computer Science boasts of highly qualified faculties and
cutting-edge research facilities. Research in the department are geared towards solving challenges
in society, and the department also places high value on excellence in teaching and mentoring,
graduate students work closely with faculty and one another while being supported with grants
and fellowship all these are what I needed to excel in graduate school, while I contribute through
high-quality research by developing unique models, publishing award-winning papers, teamwork,
and dedication. I believe that the Brown University Ph.D. in Computer Science program is a good
fit for me as I look to work with several faculty whose interests cut across artificial intelligence
and security and privacy. I am confident that I will graduate from this program with skills and
knowledge based not only on abstract knowledge but also on a genuine understanding of how to
apply theoretical knowledge in a real-life setting.

OLAWALE AMOS AKANJI SOP 3

You might also like