Peoples Empowerment Group’s
ISBM COLLEGE OF ENGINEERING, PUNE
Department of Artificial Intelligence and Machine Learning
Unit 3
ASSIGNMENT-1
Class: TE (AI&ML)
Subject: AI and Cybersecurity
1. What is anomaly detection?
2. Explain anomaly detection with an example?
3. What is botnet?
4. Explain different botnet attacks?
5. Explain different types of anomalies
[Link] Varanasi
Subject Teacher
Peoples Empowerment Group’s
ISBM COLLEGE OF ENGINEERING, PUNE
Department of Artificial Intelligence and Machine Learning
Unit 2
ASSIGNMENT-2
Class: TE (AI&ML)
Subject: AI&Cybersecurity
1. What are the different types of botnet topologies?
2. What is the difference between supervised, unsupervised, and semi-
supervised anomaly detection?
3. What are some use cases of anomaly detection in fraud detection?
4. What is a hybrid botnet topology?
5. What are the major challenges in anomaly detection?
6.
[Link] Varanasi
Subject Teacher
Peoples Empowerment Group’s
ISBM COLLEGE OF ENGINEERING, PUNE
Department of Artificial Intelligence and Machine Learning
Unit 2
ASSIGNMENT-3.
1. What are common applications in healthcare (e.g., disease outbreak
prediction, patient monitoring)?
2. What is a centralized botnet topology?
3. What role does encryption play in botnet communication?
4. How do machine learning techniques help in anomaly detection?
5. What are the best practices for improving anomaly detection accuracy?
[Link] Varanasi
Subject Teacher
Peoples Empowerment Group’s
ISBM COLLEGE OF ENGINEERING, PUNE
Department of Artificial Intelligence and Machine Learning
Unit 2
ASSIGNMENT-4
Class: TE (AI&ML)
Subject: AI&Cybersecurity
1. Why is anomaly detection important in cybersecurity, finance, and
healthcare?
2. What metrics are used to evaluate anomaly detection models?
3. How is anomaly detection applied in industrial IoT and predictive
maintenance?
4. How does a botmaster control bots in different topologies?
5. How do botnets avoid detection based on their topology?
[Link] Varanasi
Subject Teacher