0% found this document useful (0 votes)
16 views2 pages

Capstone Project Proposal

Uploaded by

Vanshika Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

Capstone Project Proposal

Uploaded by

Vanshika Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Capstone Project Proposal Report

(Individual Report)
Instructions:

This form is to be completed by each student doing Project registration to fulfill their senior design or
capstone requirement. It must be completed and submitted to your Guide. Each student must complete
this form individually.

This report is to be completed during the starting of the semester, while the project description report will
be completed during the end of the semester.

Guide Approval (initials/date):

CAP4001– Capstone Project Proposal Report


Student Name Bhavik Shah
Student Register Number 17BCN7006
Programme Computer Science Spec. In Networks and Security
Semester/Year 7th Semester
Guide(s) Prof. Sibi Chakkaravarthy
Study of phishing attacks over Internet and Detection using Machine
Project Title
Learning

Reg. No Name Major Specialization


17BCN7006 Bhavik Shah Computer Science Networks and Security

Project and Task Description: Provide a brief (one or two page) technical description of the design
project and your specific tasks, as outlined below: (use a separate sheet)

(a) Provide a summary of the project, including a description of the project and its requirements, the
purpose, specifications, and a summary of the approach. If this is a continuing project, you may use
and/or edit the same project description.

(b) Describe the specific role and tasks that you individually will be completing as part of the design of
the project. What specific deliverables will you produce?

(c) Discuss in detail the specific approach that will be used to complete your portion of the design.

(d) Describe the phases of the design process that will be incorporated and what work will be
accomplished during those phases. (you may attach a Gantt Chart)

Outcome Matrix: Describe your plan to demonstrate each of the outcomes below.

Outcomes: Plan for demonstrating outcome:


a) an ability to apply
knowledge of
The following will be achieved by performing analysis of data and by designing
mathematics, science,
and using proper algorithms to achieve the final result of the project.
and engineering

b) an ability to design a The following will be achieved via the entire project as the entire project
system, component, or focuses on a real-world problem which takes into consideration all the real-
process to meet world constraints which an attacker and defender would face in the industry.
desired needs within
realistic constraints
such as economic,
environmental, social,
political, ethical,
health and safety,
manufacturability, and
sustainability
During the entire project, this outcome will be achieved as research requires
c) an ability to
communicating with users over the Internet as well as personally;
communicate
communication with the guide for resolving issues and getting guidance; and
effectively
for presenting the final outcome of the project.
d) an ability to use the
techniques, skills, and Machine learning and social engineering are a modern-day attacker’s toolkit
modern engineering which will be used extensively throughout the project for research and
tools necessary for implementation purposes.
engineering practice

Realistic Constraints:

Phishing attacks are all user-dependent attacks and taking that into consideration, whatever
research performed will be on live users, with their permission. Any detection algorithm to be
performed will also be performed on live datasets or on logs available where phishing attack
actually took place to have authenticity in the results.

Engineering Standards:

The engineering standards expected to be followed during the course of the project is NIST
Cybersecurity Framework. The NIST Cybersecurity Framework (NIST CSF) "provides a high
level taxonomy of cybersecurity outcomes and a methodology to assess and manage those
outcomes." It is intended to help private sector organizations that provide critical infrastructure
with guidance on how to protect it, along with relevant protections for privacy and civil liberties. It
provides advice on IT security, guide for applying risk management in industries, digital identity
guidelines. This framework is followed worldwide by governments and industries.

You might also like