{"id":291,"date":"2025-09-01T19:07:09","date_gmt":"2025-09-01T19:07:09","guid":{"rendered":"https:\/\/resec-hub.chdtu.edu.ua\/?page_id=291"},"modified":"2025-09-30T22:26:55","modified_gmt":"2025-09-30T22:26:55","slug":"ai-ml-security-lab","status":"publish","type":"page","link":"https:\/\/resec-hub.cu.edu.ge\/en\/ai-ml-security-lab\/","title":{"rendered":"AI\/ML Security Lab"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"291\" class=\"elementor elementor-291\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f92fee1 e-con-full e-flex e-con e-parent\" data-id=\"f92fee1\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a85d37e e-flex e-con-boxed e-con e-child\" data-id=\"a85d37e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e08ba6b elementor-widget elementor-widget-heading\" data-id=\"e08ba6b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">AI\/ML Security Lab<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8796398 e-flex e-con-boxed e-con e-parent\" data-id=\"8796398\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ff4e885 e-con-full e-flex e-con e-child\" data-id=\"ff4e885\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba81ef9 elementor-widget elementor-widget-text-editor\" data-id=\"ba81ef9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Focus area:<\/strong>Virtual environment with powerful servers for AI\/ML-enabled security solutions.<\/p><p><strong>Activities:<\/strong>:<\/p><ul><li>Training on network protocols, attack techniques (ARP poisoning, CAM overflow, DHCP spoofing, etc.).<\/li><li>Research on threat detection via graph analysis, user behavior clustering, malware analysis, and automated threat intelligence.<\/li><li>Lab uses actual vendor hardware\/software (Cisco, Mikrotik, Juniper).<\/li><\/ul><p><strong>Access &amp; Collaboration:<\/strong>:<\/p><ul><li>Fully virtual, modular platform accessible via VPN.<\/li><li>Connected to other labs to integrate multi-domain scenarios in 5G+, quantum, and AI-driven security research.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"dce-visibility-event elementor-element elementor-element-2825377 elementor-widget elementor-widget-heading\" data-id=\"2825377\" data-element_type=\"widget\" data-settings=\"{&quot;enabled_visibility&quot;:&quot;yes&quot;,&quot;dce_visibility_selected&quot;:&quot;yes&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u10da\u10d0\u10d1\u10dd\u10e0\u10d0\u10e2\u10dd\u10e0\u10d8\u10d0\u10d6\u10d4 \u10ec\u10d5\u10d3\u10dd\u10db\u10d8\u10e1 \u10db\u10dd\u10d7\u10ee\u10dd\u10d5\u10dc\u10d8\u10e1\u10d7\u10d5\u10d8\u10e1, \u10d2\u10d7\u10ee\u10dd\u10d5\u10d7, \u10e8\u10d4\u10ee\u10d5\u10d8\u10d3\u10d4\u10d7 \u10e1\u10d8\u10e1\u10e2\u10d4\u10db\u10d0\u10e8\u10d8 \u10d0\u10dc \u10d3\u10d0\u10e0\u10d4\u10d2\u10d8\u10e1\u10e2\u10e0\u10d8\u10e0\u10d3\u10d4\u10d7<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<!-- dce invisible element ee8d53d -->\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>AI\/ML Security Lab \u10e4\u10dd\u10d9\u10e3\u10e1 \u10d0\u10e0\u10d4\u10d0\u10da\u10d8: \u10d5\u10d8\u10e0\u10e2\u10e3\u10d0\u10da\u10e3\u10e0\u10d8 \u10d2\u10d0\u10e0\u10d4\u10db\u10dd \u10eb\u10da\u10d8\u10d4\u10e0\u10d8 \u10e1\u10d4\u10e0\u10d5\u10d4\u10e0\u10d4\u10d1\u10d8\u10d7 AI\/ML \u10e1\u10d8\u10e1\u10e2\u10d4\u10db\u10d8\u10d7 \u10d0\u10e6\u10ed\u10e3\u10e0\u10d5\u10d8\u10da\u10d8 \u10e3\u10e1\u10d0\u10e4\u10e0\u10d7\u10ee\u10dd\u10d4\u10d1\u10d8\u10e1 \u10d2\u10d0\u10d3\u10d0\u10ec\u10e7\u10d5\u10d4\u10e2\u10d8\u10da\u10d4\u10d1\u10d4\u10d1\u10d8\u10e1\u10d7\u10d5\u10d8\u10e1. \u10d0\u10e5\u10e2\u10d8\u10d5\u10dd\u10d1\u10d4\u10d1\u10d8: \u10e5\u10e1\u10d4\u10da\u10e3\u10e0\u10d8 \u10de\u10e0\u10dd\u10e2\u10dd\u10d9\u10dd\u10da\u10d4\u10d1\u10d8\u10e1, \u10e8\u10d4\u10e2\u10d4\u10d5\u10d8\u10e1 \u10e2\u10d4\u10e5\u10dc\u10d8\u10d9\u10d8\u10e1 (ARP-\u10d8\u10e1 \u10db\u10dd\u10ec\u10d0\u10db\u10d5\u10da\u10d0, CAM-\u10d8\u10e1 \u10d2\u10d0\u10d3\u10d0\u10e4\u10d0\u10e0\u10d5\u10d0, DHCP-\u10d8\u10e1 \u10d2\u10d0\u10e4\u10e3\u10ed\u10d4\u10d1\u10d0 \u10d3\u10d0 \u10d0.\u10e8.) \u10e2\u10e0\u10d4\u10dc\u10d8\u10dc\u10d2\u10d8. \u10d2\u10e0\u10d0\u10e4\u10d4\u10d1\u10d8\u10e1 \u10d0\u10dc\u10d0\u10da\u10d8\u10d6\u10d8\u10e1, \u10db\u10dd\u10db\u10ee\u10db\u10d0\u10e0\u10d4\u10d1\u10da\u10d8\u10e1 \u10e5\u10ea\u10d4\u10d5\u10d8\u10e1 \u10d9\u10da\u10d0\u10e1\u10e2\u10d4\u10e0\u10d8\u10d6\u10d0\u10ea\u10d8\u10d8\u10e1, \u10db\u10d0\u10d5\u10dc\u10d4 \u10de\u10e0\u10dd\u10d2\u10e0\u10d0\u10db\u10d4\u10d1\u10d8\u10e1 \u10d0\u10dc\u10d0\u10da\u10d8\u10d6\u10d8\u10e1\u10d0 \u10d3\u10d0 \u10d0\u10d5\u10e2\u10dd\u10db\u10d0\u10e2\u10d8\u10d6\u10d8\u10e0\u10d4\u10d1\u10e3\u10da\u10d8 \u10e1\u10d0\u10e4\u10e0\u10d7\u10ee\u10d4\u10d4\u10d1\u10d8\u10e1 \u10d8\u10dc\u10e2\u10d4\u10da\u10d4\u10e5\u10e2\u10d8\u10e1 \u10db\u10d4\u10e8\u10d5\u10d4\u10dd\u10d1\u10d8\u10d7 \u10e1\u10d0\u10e4\u10e0\u10d7\u10ee\u10d8\u10e1 \u10d0\u10e6\u10db\u10dd\u10e9\u10d4\u10dc\u10d8\u10e1 \u10d9\u10d5\u10da\u10d4\u10d5\u10d0. \u10da\u10d0\u10d1\u10dd\u10e0\u10d0\u10e2\u10dd\u10e0\u10d8\u10d0 \u10d8\u10e7\u10d4\u10dc\u10d4\u10d1\u10e1 \u10e0\u10d4\u10d0\u10da\u10e3\u10e0\u10d8 \u10db\u10dd\u10db\u10ec\u10dd\u10d3\u10d4\u10d1\u10da\u10d8\u10e1 \u10d0\u10de\u10d0\u10e0\u10d0\u10e2\u10e3\u10e0\u10d0\u10e1\/\u10de\u10e0\u10dd\u10d2\u10e0\u10d0\u10db\u10e3\u10da \u10e3\u10d6\u10e0\u10e3\u10dc\u10d5\u10d4\u10da\u10e7\u10dd\u10e4\u10d0\u10e1 (Cisco, Mikrotik, Juniper). \u10ec\u10d5\u10d3\u10dd\u10db\u10d0 \u10d3\u10d0 [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-291","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/resec-hub.cu.edu.ge\/en\/wp-json\/wp\/v2\/pages\/291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/resec-hub.cu.edu.ge\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/resec-hub.cu.edu.ge\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/resec-hub.cu.edu.ge\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/resec-hub.cu.edu.ge\/en\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":22,"href":"https:\/\/resec-hub.cu.edu.ge\/en\/wp-json\/wp\/v2\/pages\/291\/revisions"}],"predecessor-version":[{"id":779,"href":"https:\/\/resec-hub.cu.edu.ge\/en\/wp-json\/wp\/v2\/pages\/291\/revisions\/779"}],"wp:attachment":[{"href":"https:\/\/resec-hub.cu.edu.ge\/en\/wp-json\/wp\/v2\/media?parent=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}