Skip to content

Latest commit

 

History

History
138 lines (123 loc) · 6.29 KB

requirements.md

File metadata and controls

138 lines (123 loc) · 6.29 KB
title layout menuItem menuPosition
Course Work and Grading
page
Course Work and Grading
2

Grading will be based on 2 major components: Weekly quizzes and Bi-weekly assignments.

Grading Breakdown

The course grading will be based on a total of 100 points:

💻 Assignments
80 points
These assignments will be released tri-weekly, and will be 20 points each.
📑 Quizzes
20 points
There will be about 8-12 quizzes in all. We will drop your two lowest quizzes. Each quiz will be worth equal points, and based on the lectures of the past week.

Assignments

The four assignments for this course will be based on state-of-the-art techniques to track cyber-crimes. A brief description of them is as follows:

Assignment I: Network & Deep Web Forensic Analysis (20 points)

The first part of this assignment will be based on getting familiar with "packet sniffing" and analyzing data network characteristics using the network packet trace This assignment will be based on getting familiar with network and deep web forensics. There are six parts to this homework. The first three parts will be based on “packet sniffing” and analyzing data network characteristics using the network packet trace (or pcap), and understanding to identify different network threats and vulnerabilities. The last three parts with be based on getting familiar with the dark web by analyzing the characteristics of the Tor circuit, crawling and modeling topics around the dark web, and finally getting familiar with the Tor hidden services. The six parts are briefly described below:

Part 1: Wireshark Warm-up In this part, you will manually analyze the network packet trace for BitTorrent traffic using Wireshark.
Part 2: Exploring Network Threats & Vulnerabilities In this part you will examine the network packet trace for specific vulnerabilities using Wireshark.
Part 3: Identifying SYN-ners In this part, you will automate the process of packet sniffing by writing a program to analyze a pcap file to detect “port-scanning”.
Part 4: Tor Circuit Analysis In this part, you will use your knowledge of the Tor circuits to formulate a problem, plan a solution/analysis, collect data, and analyze the data to characterize the Tor circuit.
Part 5: Crawling the Dark Web In this part, you will crawl the dark web to identify suspicious activity.
Part 6: Using Tor Hidden Services Finally, you will create a site on the dark web using Tor Hidden services, and populate it with your solution from previous parts for us to grade.

Assignment II: AI, Text & Social Media Forensics (20 points)

In this assignment, you will apply your understanding of artificial intelligence to build knowledge and rules for forensic applications, and then use your knowledge of machine learning to engineer features, and build models for social media forensics. This assignment has 4 parts which are as follows:

Part 1: Building a COVID-net In this part, you will create a semantic network to create knowledge representation for a problem related to COVID-19.
Part 2: Intrusion Detection Using Rules and Exceptions In this part, you will extract decision rules to classify types of intrusion from network data using the algorithms taught in the class.
Part 3: Conducting A Forensic Background Check In this part, you will conduct a forensic background check of a person using social media and text forensic tools, and create a detailed report.
Part 4: COVID-19 Twitter Misinformation Analysis In this problem you will engineer features and create models that distinguish real information from misinformation about COVID-19 on Twitter.

Assignment III: Machine Learning, Voice Forensics, and Image Forensics (20 points)

This assignment will be based on machine learning, audio/voice, and image forensics. There are three parts to this homework

Part 1: Analyzing Audios for COVID-19 signatures In this part, you will collect and analyze audios (using PRAAT) to identify features to detect COVID-19 signatures in voice.
Part 2: Automatic Speaker Age Estimation In this part, you will use machine learning algorithms to build and optimize models for estimating age of people from their voice recordings.
Part 3: Identifying Image Rescaling In this part, you will explore how to detect if an image has been tampered computationally using correlation analysis.

Assignment IV: DeepFakes (20 points)

DeepFake is the process of swapping the face of a source identity with a target identity in a given video/image using deep learning techniques. The name originates from "deep learning" and "fake". There are many technologies that can used to generate fakes but ones that use deep learning are called DeepFakes and tend to be the most photo-realistic. This assignment is to familiarize you with “DeepFakes”. There are two parts to this assignment which are as follows:

Part 1: Generating DeepFakes In this part, you will generate your own DeepFake using DeepFaceLab.
Part 2: Detecting DeepFakes In this part, you will create a neural network based model to detect DeepFakes.

Grading

There's a maximum score: 100 points.

  • A+ 100% to 94.0%
  • A < 94.0% to 90.0%
  • A- < 90.0% to 87.0%
  • B+ < 87.0% to 84.0%
  • B < 84.0% to 80.0%
  • B- < 80.0% to 77.0%
  • C+ < 77.0% to 74.0%
  • C < 74.0% to 70.0%
  • C- < 70.0% to 67.0%
  • D+ < 67.0% to 64.0%
  • D < 64.0% to 61.0%
  • F < 61.0% to 0.0%