PROJECT TITLE | TECHNOLOGIES | STUDENT(S) |
Analyzing the effectiveness of deep packet inspection (DPI) techniques in detecting and mitigating DNS tunnelling attacks | pfSense, Snort IDS, GNS3, Wireshark, SecurityOnion | Mosopefoluwa Adefuye |
A comparative study of DLP strategies in email systems and their impact on SOC efficiency | Email content filtering and contextual analysis, Data Discovery and classification, Artificial Intelligence and Machine Learning, Email policy enforcement, SIEM | Edet Bassey |
Mitigating OWASP T10 Risks for Kubernetes with a Cloud-Native Response Engine | Kubernetes, Falco, Falco Talon | Nigel Douglas |
Investigating the Cybersecurity Posture of Higher Education Institutions in Ireland. An IT Professional Stakeholder Perspective | NIST CSF, Cybersecurity professional interviews | John Dunne |
Implementing Geolocation Mapping of an attacker's PC using IP address and logs in SIEM Solutions: A Comparative Study between Azure Sentinel and Splunk. | SIEM, Azure Sentinel and Splunk | Bhupal Gurung |
Children and Cybersecurity - Cyber Threats and Data Hacking in Smart Toys and Online Games | Network Forensics, Network Sandboxing | Etsuko Michelle Hegarty |
The Danger of AI Virtual Assistants on Data Protection and Privacy in Today's Work Environment | Python, Matplotlib, ChatGPT and GPT Store | Yasdeo Jugessur |
How to implement Threat Hunting in small to medium-sized enterprises | Open-source SOC tools (Wazuh, Velociraptor) | Rizo Jusufovic |
Blockchain-based Attestation System for Secure and Efficient Document Authentication in the Academic Sector | Node.js, Next.js, TypeScript, Web3, Ethereum, MetaMask, EAS-SD, GraphQL, Vercel | Daniel Lazarczyk |
Enhancing Compliance and Security in Agile Environments: A Tool Assisted DevSecOps Approach | Python, Wazuh, MISP, Suricata, Zeek | Jane Mac Donald |
A multi-dimensional approach to cybersecurity vulnerabilities | Python, Matplotlib,R, Jupyter Notebooks | Benie Mambouana |
The Human Element of Cybersecurity, investigating the impact of Social Media on Employee Security Awareness Training | O365 tools Viva Engage / Teams and Google Training Tools | Michael Mitchell |
The Strategic Impact of Generative AI on Privacy and Trust in the Public Sector | Python, pandas, analytics tools, graphing libraries, databases, LLMs and AI | Dewaspati Shibnauth |
Towards a reusable framework for converged IT and OT converged security operations centres | Azure, Security Onion, pfSense Firewall, Snort IDS, Modbus, DNP3, OPC | Shane Sweeney |
Assessing the ease of implementing security features by software engineers in frequently used web frameworks | Python, Java, NodeJS (Typescript), ReactJS, NextJS, Angular. | Jakub Zurakowski |