IT file
IT file
on
Submitted to:
Submitted by: Karan Solanki
Dr.Gagandeep Kaur
University Roll No: 23EBUCS033 Assistant Professor
Industrial Training Practical File Session 2024-25 Department of CSE
DECLARTION
I, Karan Solanki, hereby declare that the Industrial Training report titled
“ARTIFICIAL INTELLIGENCE & MACHINE LEARNING” is an
authentic record of the work undertaken by me as part of the Industrial
Training. This report has been submitted in the partial fulfilment of the
requirements for the award of the Bachelor of Technology (Computer
Science and Engineering) degree. The information provided here is true
to the best of my knowledge.
Karan Solanki
Signature
Date:7-2-2025
ACKNOWLEDGEMENT
➢ i Abstract
➢ ii Introduction of AI & ML
➢ vi What is Phishing?
➢ vii Reference
ABSTRACT
• This report presents an overview of the industrial training
undertaken at Bikaner Technical University focusing on
applications of artificial intelligence (AI) & machine
learning (ML) in practical environments. The primary
purpose of the training was to gain hands-on experience
in the field of AI & ML, with a specific focus on machine
learning, deep learning, and data analytics.
INTRODUCTION OF AI & ML
2. Unsupervised Learning:
3. Reinforcement Learning:
2. Computer Vision:
3. Recommendation Systems:
Platforms like Netflix and Amazon use ML to analyse user behaviour and
recommend relevant content or products.
4. Predictive Analytics:
Automation:
ML enables systems to perform repetitive tasks without manual
intervention.
Scalability:
AI systems powered by ML can handle vast amounts of data and scale
easily for large applications.
Personalization:
ML allows AI to deliver personalized experiences by learning user
preferences.
Adaptability:
ML models adapt to new data, improving accuracy and relevance
over time.
Efficiency:
Automating processes with AI and ML reduces operational costs and
improves efficiency.
➢ Challenges of AI and ML:
➢ Training objective:
➢ INTRODUCTION OF AR & VR
1. Malware:
Malware refers to various forms of harmful software, such as viruses
and ransomware. Once it is in your computer, it can wreak all sorts of
havoc, from taking control of your machine, to monitoring your actions
and keystrokes, to silently sending all sorts of confidential data from
your computer or network to the attacker's home base.
Attackers will use a variety of methods to get malware into your
computer, but at some stage it often requires the user to take an action
to install the malware. This can include clicking a link to download a file
or opening an email attachment that may look harmless (like a
document or PDF) but contains a hidden malware installer.
2. Ransomware:
Ransomware is a form of malware that encrypts data on infected IT
systems. It demands a ransom in exchange for a code that will –
hopefully – decrypt the infected system. The ransom payment usually
goes to an anonymous address using Bitcoin.
3. Adware:
Adware is a type of malware that displays unwanted ads on end-user
devices to generate revenue from advertisers. It often will be installed
on user devices after tricking people into clicking a link. Adware then
displays the ads and simulates user clicks to defraud advertisers into
thinking that legitimate users are interacting with their ads. They then
pay the cybercriminals for these clicks.
4. Crypto-Jacking:
Crypto jacking is a type of malware that uses the resources of the
infected IT systems to “mine” for cryptocurrencies. This steals the
attacked system's computing resources by running at a high load to
generate income for the remote attackers. They’ll then make money
from the sale of the cryptocurrencies generated on the infected
system.
5. Phishing:
In a phishing attack, an attacker may send you an email that appears to
be from someone you trust, like your boss or a company you do
business with. The email will seem legitimate, and it will have some
urgency to it (e.g. fraudulent activity has been detected on your
account). In the email, there may be an attachment to open or a link to
click.
Upon opening the malicious attachment, you'll unknowingly install
malware in your computer. If you click the link, it may send you to a
legitimate-looking website that asks you to log in to access an
important file – except the website is a trap used to capture your
credentials.
6. Spear Phishing:
Spear Phishing is a highly targeted variant of phishing that uses a fake
email or message from a supposedly important individual to trick a
person within the same organization or a partner organization. Spear
phishing attempts hope to use the extra authenticity – albeit imposter
authenticity – of the sender to trick people into providing information
they shouldn't.
10.Denial-of-Service (DoS):
Denial-of-Service (DoS) flood a website with more traffic than it’s built
to handle, thereby overloading the site’s server and making it near-
impossible to serve content to visitors. It’s possible for a denial-of-
service to occur for non-malicious reasons. For example, if a massive
news story breaks and a news organization’s site is overloaded with
traffic from people trying to learn more about the story.
12.Session Hijacking:
Session hijacking occurs when an attacker hijacks a session by
capturing the unique – and private – session ID and poses as the
computer making a request, allowing them to log in as an unsuspecting
user and gain access to unauthorized information on the web server. If
everything goes as it should during any internet session, web servers
should respond to your various requests by giving you the information
you're attempting to access.
13.Credential Reuse:
Credential reuse occurs when someone uses the same credentials on
multiple websites. It can make life easier in the moment but can come
back to haunt that user later. Even though security best practices
universally recommend unique passwords for all applications and
websites, many people still reuse their passwords. This is a fact
attackers will readily exploit, thereby turning those reused passwords
into compromised credentials.
14.Insider Threats:
Not all cyber threats originate from external sources. Data and other
sensitive information like login credentials can leak from inside
organizations. This can occur via malicious staff activity or – more
frequently – due to an unintended action. An example of such a
mistake could be sending an email containing an unencrypted
attachment to the wrong recipient.
➢ PHISHING:
• Password
• Credit card details
• Social security numbers
• Date of birth
Below is a list of references used during the AI training and chatbot project
development. These references include books, online documentation, and
tutorials that provided foundational knowledge, methodologies, and tools
relevant to artificial intelligence and natural language processing: