Notice
As part of Phase 3 of our return to campus plan, most units will now run tutorials, seminars and other small group activities on campus, and most will keep an online version available to those students unable to return or those who choose to continue their studies online.
To check the availability of face-to-face and online activities for your unit, please go to timetable viewer. To check detailed information on unit assessments visit your unit's iLearn space or consult your unit convenor.
Unit convenor and teaching staff |
Unit convenor and teaching staff
Convenor, Lecturer
Muhammad Ikram
Contact via +61 02 9850 8439
Room 286 BD Building, 4 Research Park Drive, Macquarie Park, NSW 2109
Lecturer
Xuyun Zhang
Contact via +61 02 9850 8229
Room 287 BD Building, 4 Research Park Drive, Macquarie Park, NSW 2109
|
---|---|
Credit points |
Credit points
10
|
Prerequisites |
Prerequisites
(COMP6320 or ITEC653) or admission to MInfoTechCyberSec
|
Corequisites |
Corequisites
|
Co-badged status |
Co-badged status
|
Unit description |
Unit description
This unit deals with the applications of Artificial Intelligence in the field of Cyber Security. Topics covered include machine learning-based intrusion detection systems, malware detection, AI as a service, digital forensics, incident response leveraging SIEM data. Special attention will be given to the concept of adversarial machine learning.
|
Information about important academic dates including deadlines for withdrawing from units are available at https://www.mq.edu.au/study/calendar-of-dates
On successful completion of this unit, you will be able to:
No extensions will be granted without an approved application for Special Consideration. There will be a deduction of 10% of the total available marks made from the total awarded mark for each 24 hour period or part thereof that the submission is late. For example, 25 hours late in submission for an assignment worth 10 marks – 20% penalty or 2 marks deducted from the total.
No submission will be accepted after solutions have been posted.
If you receive special consideration for the final exam, a supplementary exam will be scheduled after the normal exam period, following the release of marks. By making a special consideration application for the final exam you are declaring yourself available for a resit during the supplementary examination period and will not be eligible for a second special consideration approval based on pre-existing commitments. Please ensure you are familiar with the policy prior to submitting an application. Approved applicants will receive an individual notification one week prior to the exam with the exact date and time of their supplementary examination.
Name | Weighting | Hurdle | Due |
---|---|---|---|
Class participation | 10% | No | Weekly |
Assignment | 25% | No | Week7 |
Group project and presentation | 20% | No | Week 12 |
Final examination | 45% | No | Exam Week |
Assessment Type 1: Participatory task
Indicative Time on Task 2: 0 hours
Due: Weekly
Weighting: 10%
Each week, a mark will be awarded based on the level of participation shown by students in the discussion during the lectures.
Assessment Type 1: Project
Indicative Time on Task 2: 30 hours
Due: Week7
Weighting: 25%
In this assignment, the student will be given a series of datasets and will be asked to develop an analysis of this data and provide a report. The aim of this task is to be able to identify unusual patterns and abnormal activity using data.
Assessment Type 1: Project
Indicative Time on Task 2: 30 hours
Due: Week 12
Weighting: 20%
In this assessment task, students as a group will be required to research and evaluate a tool leveraging AI for cyber security purposes. The task also involves a presentation of the findings.
Assessment Type 1: Examination
Indicative Time on Task 2: 15 hours
Due: Exam Week
Weighting: 45%
A three hour examination in the exam period.
1 If you need help with your assignment, please contact:
2 Indicative time-on-task is an estimate of the time required for completion of the assessment task and is subject to individual variation
There will be one two-hour lecture each week and one one-hour workshop, you can find the time and location information can be found via MQ Timetables. You are expected to attend both classes as they provide complimentary learning activities each week. In practical classes you will write code and do experiments, and in lectures we will mainly discuss the theories, principles and methods.
We do not have a single specific textbook, but will refer to the following texts for your reference during the semester:
You will be given readings from these and other sources each week
We will make use of Python 3 for the analysis of cyber security related datasets, including a range of modules such as scikit-learn, pandas, numpy, tensorflow, etc. that provide additional features. These can all be installed via the Anaconda Python distribution. We will discuss this environment and the installation process in the first week of classes.
A major part of the assessment in this unit is based on a project that you will complete in group. This will allow you to explore the techniques you are learning from classes in a real-world exercise of applying machine learning in cybersecurity.
The indicative list of topics is shown here, this is subject to change based on feedback from the class.
Week | Topic | Lecturer |
1 | Course overview; Python basics | MI + XZ |
2 | Machine learning basics | XZ |
3 | Overview of ML application in cyber security | XZ |
4 | Anomaly detection | XZ |
5 | Data privacy issues | XZ |
6 | Adversary machine learning | XZ |
7 | Guest lecture | TBD |
8 | Behaviour metrics attacks | MI |
9 | Vulnerability and malware analysis | MI |
10 | Botnets, DDoS attacks, and network traffic analysis | MI |
11 | Spam emails and phishing URLs | MI |
12 | Digital forensics and incident response | MI |
13 | Revision | MI + XZ |
Macquarie University policies and procedures are accessible from Policy Central (https://policies.mq.edu.au). Students should be aware of the following policies in particular with regard to Learning and Teaching:
Students seeking more policy resources can visit Student Policies (https://students.mq.edu.au/support/study/policies). It is your one-stop-shop for the key policies you need to know about throughout your undergraduate student journey.
To find other policies relating to Teaching and Learning, visit Policy Central (https://policies.mq.edu.au) and use the search tool.
Macquarie University students have a responsibility to be familiar with the Student Code of Conduct: https://students.mq.edu.au/admin/other-resources/student-conduct
Results published on platform other than eStudent, (eg. iLearn, Coursera etc.) or released directly by your Unit Convenor, are not confirmed as they are subject to final approval by the University. Once approved, final results will be sent to your student email address and will be made available in eStudent. For more information visit ask.mq.edu.au or if you are a Global MBA student contact globalmba.support@mq.edu.au
Macquarie University provides a range of support services for students. For details, visit http://students.mq.edu.au/support/
Learning Skills (mq.edu.au/learningskills) provides academic writing resources and study strategies to help you improve your marks and take control of your study.
The Library provides online and face to face support to help you find and use relevant information resources.
Students with a disability are encouraged to contact the Disability Service who can provide appropriate help with any issues that arise during their studies.
For all student enquiries, visit Student Connect at ask.mq.edu.au
If you are a Global MBA student contact globalmba.support@mq.edu.au
For help with University computer systems and technology, visit http://www.mq.edu.au/about_us/offices_and_units/information_technology/help/.
When using the University's IT, you must adhere to the Acceptable Use of IT Resources Policy. The policy applies to all who connect to the MQ network including students.
Unit information based on version 2021.02 of the Handbook