Are you looking for a master thesis or an internship? Here are some ideas...
Intrusion and Advanced Persistent Threat detection systems analyze daily enormous amounts of data. The evidences produced by such systems need to be presented in a clear and understandable way to an analyst so he/she can easily filter out important suspicious behavior and what is just regular network traffic. To do this an intuitive and readable visualization of the data must be present for the expert.
In some circumstances (military operation, but also cultural event like a music festival), one may need to have a WiFi network that’s quickly and easily deployed, and the same time secured and easy to monitor.
During the creation of cyber exercises or large datasets for evaluation and validation, a large amount of background data needs to be generated for the obfuscation of the malicious traffic. One option is to use automation scripts, which will handle NPC machines for the generation of the background data. The GHOST framework developed by Carnegie Mellon University offers a powerful solution for the automation and management of a number of NPC machines.
Open-source intelligence (OSINT) plays an important role in cyber-security by enabling analysts to find and analyze publicly available information to discover potential threats, vulnerabilities and cybercriminal activities. From tracking threat actors on social media to identifying weaknesses in publicly accessible systems, OSINT is an indispensable tool for cyber professionals.