- Adoptive behavioral changing of exploits against security controls to bypass the endpoint detection. Framework for endpoint evasion, required behavior changing of exploits against every endpoint security controls.
In Reverse engineering.
- Reversing exploits autonomously using some machine learning and detecting the infected code.
Dear Nipuna Sankalpa , I feel like this your question is not precise enough.
Cybersecurity is a vast field. Asking for a phd research topic in cybersecurity without further details is not ideal.
What you need to know is that the research project that feats you the most depends on your background, on the expertise of your phd advisor on the topic or he willingness to work on the topic, and also on the environment in which you study. So I recommend you write down a list of potential advisors, contact each supervisor with a description of yourself and your background, and with a summary of what you would like to work on with him. So you somehow choose the eventual topics to work on depending on the expertise of the potential advisors you are going to contact, then depending on wether they are interested in your profile or in the topic you suggested, they will accept, suggest another topic or reject your request.
Notice that in general, people do not post project that believe can be easily solved, if not they would solve them themselves. Some May do, but then I believe they are very few. So take care to not choose something that may be unsolvable.
Finally, my advice: choose a specific branch of cybersecurity which feats your background, read about it, identify some reachable potential advisors actively working in that branch, read some of their works, contact them saying you have read their work, asking some questions you may have, and telling them your are currently looking for a phd position or topic …, they will probably respond to you.
It can be different detection techniques (dark web threats (look my card), malicious behavior/traffic/URL, scam, social media bots, etc.) using deep learning or generative adversarial network (GAN). Classical ML models are already less interesting for a research study.
If you are currently looking for a PhD position, my department is now opened a call for PHDs (including cybersecurity). Deadline is 3rd of June. https://www.findaphd.com/phds/project/20-fully-funded-phd-studentships-in-the-department-of-informatics-king-s-college-london/?p144341
You can contact Franklin TCHAKOUNTE, Associate Professor of Computer Science at the University of Ngaoundéré with strong expertise in cyber security and data science.
Also, privacy is very hot these days. You can explore research work related to privacy risks in different systems or social media. An example is our work on discovering privacy leaks on Venmo which has been trending on media:
For your dissertation on cybersecurity issues, I propose the following important, developing and topical research topic: Improving anti-spam applications installed in email inboxes to increase the level of cybersecurity by automatically rejecting emails containing hidden spyware, malware, cyber Trojans, background programs that record everything that is typed, phishing emails, etc. This is an important topic because a significant proportion of cyber theft of money from bank accounts is carried out through online and mobile banking using phishing emails, which contain links redirecting to fake websites built by cyber criminals graphically almost identical to their prototypes previously created by banks, public institutions, companies and businesses. Clicking on such a link takes the user to a fake website. Subsequently, if the user enters his or her login data on such a website, e.g. for an online banking profile, this data is intercepted by cyber criminals and unauthorised access to the online banking profile is gained and funds are stolen. In addition to this, particularly dangerous viruses have been hidden in emails sent out by cybercriminals for several years, causing access to data on disks to be blocked and encrypted. Consequently, one of the most important issues currently determining the level of cyber-security on the Internet, the secure transfer of data, the security of funds held in electronic bank branch accounts, etc., is to improve the security of e-mail boxes.