Scope: This problem involves creating a framework to crawl and collect cyber incident data from various platforms (e.g., news sites, forums, social media) and analyze it to provide real-time feeds for monitoring and response.
Expected Outcome: A working prototype of a cyber incident crawler that collects data, analyzes it for trends, and provides a real-time feed or dashboard with actionable insights.
What to Do:
Scope: This problem focuses on designing a digital forensics tool that automates evidence collection, analysis, and reporting, using AI/ML for anomaly detection and pattern recognition in forensic data.
Expected Outcome: A functional digital forensics tool that can collect evidence (e.g., logs, files), analyze it using AI/ML, and generate a report with detected anomalies or patterns.
What to Do:
Scope: This problem involves developing techniques to recover deleted data and metadata from XFS and Btrfs filesystems, ensuring the integrity of the recovered data for forensic investigations.
Expected Outcome: A tool or script that can recover deleted files and metadata from XFS and Btrfs filesystems, with a report on the integrity of the recovered data.
What to Do:
Scope: This problem focuses on building an agent-less vulnerability and network scanner for Windows and Linux systems to identify security weaknesses without requiring software installation on target systems.
Expected Outcome: A working scanner that can identify vulnerabilities and network issues on Windows/Linux systems without installing agents, with a report of findings.
What to Do:
Scope: This problem involves developing a browser extension for phishing and vulnerability detection to protect users from malicious websites and attacks.
Expected Outcome: A functional browser extension that can detect phishing attempts and vulnerabilities in websites, alerting users to potential threats.
What to Do:
Scope: This problem focuses on creating a tool for bug hunting and building an API to automate the process of identifying and reporting vulnerabilities in applications.
Expected Outcome: A tool that can identify bugs in a given application and an API that allows users to query and report vulnerabilities programmatically.
What to Do:
Scope: This problem involves designing an Intrusion Detection System (IDS) specifically for IoT devices to detect and mitigate security threats in IoT environments.
Expected Outcome: A working IDS prototype for IoT devices that can detect common threats (e.g., unauthorized access, DDoS) and alert users.
What to Do:
Scope: This problem focuses on building an API to simulate and detect DNS spoofing and Man-in-the-Middle (MITM) attacks for educational and defensive purposes.
Expected Outcome: A functional API that can simulate DNS spoofing and MITM attacks and provide detection mechanisms, with a demo of its capabilities.
What to Do:
Scope: This problem involves developing a local file encryption and sharing system that demonstrates encryption processes and securely shares files between users.
Expected Outcome: A working prototype of a file encryption and sharing system that encrypts files, shares them locally, and displays the encryption process to users.
What to Do:
Scope: This problem focuses on creating a system that monitors the dark web for leaked databases, passwords, illegal threats, etc., and provides a summary dashboard for cyber intelligence (e.g., for law enforcement).
Expected Outcome: A functional dark web monitoring system that collects data and presents it in a dashboard with summaries of threats, leaks, and other illegal activities.
What to Do:
Scope: This problem involves developing an AI-powered system for real-time DDoS threat detection and automated defense to protect networks from distributed denial-of-service attacks.
Expected Outcome: A working prototype of an AI-powered DDoS protection system that can detect attacks in real-time and implement automated defense mechanisms.
What to Do:
Scope: This problem involves designing a chatbot (CopBotChatbox) to bridge the gap between citizens and police, facilitating communication, reporting, and assistance in a user-friendly manner.
Expected Outcome: A working chatbot prototype that allows citizens to report incidents, ask questions, or seek assistance from the police, with basic natural language processing capabilities.
What to Do:
Scope: This problem involves simulating quantum machine learning techniques to perform simple classification tasks, exploring the potential of quantum computing in ML.
Expected Outcome: A working simulation of a quantum machine learning model that can perform a simple classification task (e.g., binary classification) using a quantum framework.
What to Do:
Scope: This problem focuses on implementing a basic quantum error detection mechanism to identify and correct errors in quantum computations, addressing the challenges of noise and decoherence in quantum systems.
Expected Outcome: A working prototype or simulation of a quantum error detection system that can identify and correct at least one type of quantum error (e.g., bit-flip or phase-flip errors) using a quantum programming framework like Qiskit or Cirq.
What to Do:
Scope: This problem involves developing a system for quantum key distribution (QKD) or quantum error correction to enhance the security and reliability of quantum communications, focusing on practical implementation challenges.
Expected Outcome: A functional QKD system (e.g., BB84 protocol) or an error correction system implemented in a quantum programming framework, with a demonstration of secure key exchange or error correction.
What to Do:
Scope: This problem involves creating a blockchain-based course platform where students can earn tokens by completing courses or challenges, incorporating a play-to-earn reward system to incentivize learning.
Expected Outcome: A working prototype of a blockchain-based course platform with a token reward system, where students can earn tokens by completing courses or participating in gamified challenges.
What to Do:
Scope: This problem focuses on developing a blockchain-based system for insurance claims, ensuring transparency, security, and efficiency in the claiming process using smart contracts.
Expected Outcome: A functional prototype of a blockchain-based insurance claiming system where users can submit claims, and the system processes them automatically using smart contracts.
What to Do: