ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY

International Teaching ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY

Back

0622700094
DEPARTMENT OF INFORMATION AND ELECTRICAL ENGINEERING AND APPLIED MATHEMATICS
EQF7
COMPUTER ENGINEERING
2025/2026



YEAR OF COURSE 2
YEAR OF DIDACTIC SYSTEM 2022
SPRING SEMESTER
CFUHOURSACTIVITY
324LESSONS
216EXERCISES
18LAB
Objectives
THE GOAL OF THE COURSE IS TO PROVIDE THE STUDENT WITH ABILITY TO DESIGN AND IMPLEMENT SECURITY APPLICATIONS BASED ON THE USE OF ARTIFICIAL INTELLIGENCE TECHNIQUES, ATTACK TECHNIQUES BASED ON ADVERSARIAL MACHINE LEARNING AND RELATED COUNTERMEASURES.


KNOWLEDGE AND UNDERSTANDING
ADVERSARIAL MACHINE LEARNING: ATTACK TECHNIQUES AND DEFENSE TECHNIQUES FOR AI SYSTEMS USED TO ANALYZE IMAGES AND TEXT.
CYBERSECURITY APPLICATIONS: INTRUSION DETECTION IN COMPUTER NETWORKS, AUTOMATIC MALWARE DETECTION, NETWORK TRAFFIC ANOMALY DETECTION, STATIC CODE ANALYSIS.

APPYING KNOWLEDGE AND UNDERSTANDING
ABILITY TO DESIGN AND IMPLEMENT SOFTWARE SOLUTIONS BASED ON ARTIFICIAL INTELLIGENCE IN THE AREAS OF CYBERSECURITY. DESIGN AND IMPLEMENT SIMPLE ATTACK SIMULATIONS TO VERIFY THE DEGREE OF VULNERABILITY OF A SYSTEM
Prerequisites
IN ORDER TO ACHIEVE THE GOALS OF THE COURSE, THE KNOWLEDGE OF MACHINE LEARNING AND THE C AND PYTHON PROGRAMMING LANGUAGE IS REQUIRED.
Contents
DIDACTIC UNIT 1 - ADVERSARIAL MACHINE LEARNING
(LECTURE/PRACTICE/LABORATORY HOURS 15/13/0)

1 (5 ORE LECTURE): INTRODUCTION TO ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY
2 (5 ORE LECTURE): ADVERSARIAL MACHINE LEARNING
3 (5 ORE PRACTICE): ADVERSARIAL ATTACKS IN PRACTICE
4 (5 ORE PRACTICE): ADVERSARIAL DEFENSES IN PRACTICE
5 (3 ORE PRACTICE): FACE RECOGNITION ROBUSTNESS EVALUATION
6 (2 ORE LECTURE): LLM FOUNDATIONS FOR ADVERSARIAL AI
7 (3 ORE LECTURE): ADVERSARIAL ATTACKS WITH PROMPTS

KNOWLEDGE AND UNDERSTANDING: UNDERSTANDING THE CONCEPTS OF ADVERSARIAL MACHINE LEARNING, ADVERSARIAL ATTACKS AND ADVERSARIAL DEFENSE APPLIED ON IMAGE AND TEXT ANALYSIS AND GENERATION SYSTEMS
APPLYING KNOWLEDGE AND UNDERSTANDING: CAPABILITY TO DESIGN AND GENERATE ATTACKS AND DEFENSES, AS WELL AS EVALUATING THEIR ROBUSTNESS, FOR IMAGE AND TEXT ANALYSIS AND GENERATION SYSTEMS.

DIDACTIC UNIT 2 - CYBERSECURITY APPLICATIONS
(LECTURE/PRACTICE/LABORATORY HOURS 10/7/0)

8 (5 ORE LECTURE): MALWARE ANALYSIS AND MALWARE OBFUSCATION
9 (5 ORE PRACTICE): MALWARE ANALYSIS AND OBFUSCATION IN PRACTICE
10 (5 ORE LECTURE): NETWORK ANOMALY DETECTION AND STATIC CODE ANALYSIS
11 (2 ORE PRACTICE): NETWORK ANOMALY DETECTION AND STATIC CODE ANALYSIS IN PRACTICE

KNOWLEDGE AND UNDERSTANDING:
UNDERSTANDING OF THE MAIN CHALLENGES RELATED TO THE ANALYSIS OF BINARY FILES TO DETECT MALWARE, ANOMALIES AND CODE VULNERABILITIES AND MACHINE LEARNING AND DEEP LEARNING METHODOLOGIES TO BE USED TO DETECT THEM.

APPLYING KNOWLEDGE AND UNDERSTANDING:
KNOWLEDGE AND UNDESTANDING OF COMMON TOOLS TO ANALYZE BINARY FILES, TRAFFIC NETWORK AND CODE AND USING THEM TOGETHER WITH MACHINE LEARNING AND DEEP LEARNING METHODOLOGIES TO REALIZE ROBUST DETECTION SYSTEMS.


DIDACTIC UNIT 3 - FINAL PROJECT
(LECTURE/PRACTICE/LABORATORY HOURS 0/0/3)

12 (3 ORE LABORATORIO): PROJECT WORK

KNOWLEDGE AND UNDERSTANDING: UNDERSTANDING THE REQUIREMENTS OF THE FINAL PROJECT
APPLYING KNOWLEDGE AND UNDERSTANDING: CAPABILITY TO DESIGN AND REALIZE IN GROUP A SYSTEM ROBUST TO MALICIOUS ATTACKS

TOTAL LECTURE/PRACTICE/LABORATORY HOURS 25/20/3
Teaching Methods
THE COURSE CONTAINS THEORETICAL LECTURES, IN-CLASS EXERCITATIONS AND PRACTICAL LABORATORY EXERCITATIONS. DURING THE IN-CLASS EXERCITATIONS THE STUDENTS ARE DIVIDED INTO TEAMS AND ARE ASSIGNED SOME PROJECT-WORKS TO BE DEVELOPED ALONG THE DURATION OF THE COURSE. THE EXERCISES INCLUDE ALL THE CONTENTS OF THE COURSE AND IS ESSENTIAL BOTH FOR THE ACQUISITION OF THE RELATIVE ABILITIES AND COMPETENCES, AND FOR DEVELOPING AND REINFORCING THE ABILITY TO WORK IN A TEAM. IN THE LABORATORY EXERCITATIONS THE STUDENTS IMPLEMENT THE ASSIGNED PROJECTS USING STATE OF THE ART TECHNOLOGIES.

IN ORDER TO PARTICIPATE TO THE FINAL ASSESSMENT AND TO GAIN THE CREDITS
CORRESPONDING TO THE COURSE, THE STUDENT MUST HAVE ATTENDED AT LEAST 70% OF THE HOURS OF ASSISTED TEACHING ACTIVITIES.
Verification of learning
THE ACHIEVEMENT OF THE TEACHING OBJECTIVES IS CERTIFIED BY PASSING AN EXAM WITH AN EVALUATION OUT OF THIRTY. THE EXAM INCLUDES THE DISCUSSION OF A PROJECT CARRIED OUT IN GROUPS (WITH GROUPS OF 3-4 PEOPLE) AND AN INDIVIDUAL ORAL INTERVIEW.
THE REALIZATION OF THE PROJECT IS AIMED AT DEMONSTRATING THE ABILITY TO APPLY ARTIFICIAL INTELLIGENCE TECHNIQUES TO REAL CYBERSECURITY PROBLEMS (ADVERSARIAL MACHINE LEARNING, MALWARE ANALYSIS, INTRUSION DETECTION SYSTEMS). THE DISCUSSION OF THE PROJECT INCLUDES A PRACTICAL DEMONSTRATION OF THE REALIZED SYSTEM AND THE DEFENSE OF THE DESIGN CHOICES DESCRIBED IN THE PROJECT REPORT.
THE ORAL INTERVIEW AIMS TO VERIFY THE LEVEL OF KNOWLEDGE AND UNDERSTANDING OF THE TOPICS COVERED IN THE COURSE, AS WELL AS THE STUDENT'S PRESENTATION ABILITY.
Texts
LECTURE NOTES PROVIDED BY THE INSTRUCTOR

THE TEACHING MATERIAL IS AVAILABLE ON THE UNIVERSITY E-LEARNING PLATFORM (HTTP://ELEARNING.UNISA.IT) ACCESSIBLE TO STUDENTS USING THEIR OWN UNIVERSITY CREDENTIALS.
More Information
THE COURSE IS HELD IN ENGLISH
  BETA VERSION Data source ESSE3