Cybersecurity Projects

A showcase of my technical projects in cybersecurity, featuring research, implementations, and ongoing initiatives.

Security Operations Centre Implementation

Orchestrated the establishment of a cutting-edge SOC center leveraging modern technologies for robust security monitoring and threat intelligence.

Technologies Used

DockerWazuhGraylogSIEMKibanaGrafanaOpenCTIMISPEDR

Key Achievements

  • Integrated Wazuh and Graylog as SIEM tools for robust log ingestion
  • Built data pipeline for processing security events
  • Implemented dynamic visualization using Kibana and Grafana
  • Working on OpenCTI and MISP integration for threat intelligence sharing
  • Enhanced EDR capabilities through Wazuh integration

Web Server Log Analysis

Comprehensive analysis of web server logs using advanced SIEM tools to detect and investigate security incidents.

Technologies Used

KibanaSplunkSQLData Visualization

Key Achievements

  • Analyzed over 50,000 web server logs using Kibana dashboards
  • Extracted technical insights through advanced data visualization
  • Detected SQL injection attempts targeting internal executable files
  • Tracked 10 IP addresses compromised by a botnet
  • Developed protection strategies based on pattern analysis

Intrusion Detection & Prevention System

Implementation of comprehensive IDS/IPS solution to protect against various cyber threats and unauthorized access.

Technologies Used

SnorbySuricataBash ScriptingNetwork Security

Key Achievements

  • Investigated web application, SQL injection, and port scan alerts
  • Analyzed attacks against DMZ network to identify vulnerabilities
  • Engineered custom alerts and rules using bash scripting
  • Implemented proactive traffic filtering to prevent unauthorized access
  • Enhanced overall network infrastructure security

Enhancing Insider Threat Detection

Innovative approach combining Moral Foundations Theory with NLP for advanced insider threat detection.

Technologies Used

NLPMachine LearningPythonMoral Foundations Theory

Key Achievements

  • Achieved 88% accuracy on CMU Insider Threat Dataset
  • Reached 80% accuracy on Enron Email Dataset
  • Developed novel NLP framework using Moral Foundations Dictionary
  • Enhanced behavioral analysis for threat detection
  • Created scalable solution for enterprise deployment

Privacy for Shared Smart Assistants

Published research at USENIX SOUPS'24 focusing on privacy preferences and controls for smart personal assistants.

Technologies Used

Privacy ResearchUser StudiesData Analysis

Key Achievements

  • Conducted comprehensive research on privacy preferences
  • Surveyed both voice assistant users and non-users
  • Identified effective fine-grained privacy controls
  • Published findings at prestigious USENIX SOUPS'24 conference
  • Contributed to improving smart device privacy

Windows Server Environment Management

Comprehensive implementation and management of Windows Server environment with focus on security and policy enforcement.

Technologies Used

Windows ServerActive DirectoryDHCPDNSGroup Policy

Key Achievements

  • Set up and managed Windows servers with multiple roles
  • Implemented Active Directory infrastructure
  • Configured DHCP and DNS services
  • Deployed and managed group policies
  • Enhanced overall network security through proper configuration

NetFlow Analysis

Advanced network traffic analysis using specialized tools to detect and investigate malicious activities.

Technologies Used

ArgusSiLKUNIXNetwork Analysis

Key Achievements

  • Analyzed network traffic patterns using Argus and SiLK
  • Utilized UNIX commands for detailed traffic investigation
  • Uncovered evidence of malicious activities
  • Developed traffic analysis methodologies
  • Created comprehensive network visibility

Firewall Rule Optimization

Strategic optimization of firewall rules to enhance network security while maintaining performance.

Technologies Used

pfSenseEndianNetwork SecurityFirewall Management

Key Achievements

  • Crafted and optimized 10 firewall rulesets
  • Protected against unauthorized access and threats
  • Developed robust network security architecture
  • Balanced security with network performance
  • Implemented best practices in firewall configuration

Voice Cloning Privacy Research

In-depth analysis of privacy implications in voice cloning AI/ML models.

Technologies Used

Privacy AnalysisAI/MLRVCEleven Labs

Key Achievements

  • Conducted comprehensive privacy policy analysis
  • Reviewed use cases and implications
  • Provided solutions for privacy concerns
  • Raised awareness about privacy issues
  • Contributed to privacy-conscious AI development

Cryptocurrency Forecasting

Advanced machine learning application for cryptocurrency price prediction and analysis.

Technologies Used

XGBoostLGBMKNNRidgeLassoPython

Key Achievements

  • Developed short-term return forecasting models
  • Analyzed fourteen different cryptocurrencies
  • Implemented multiple ML algorithms
  • Created time-series analysis framework
  • Produced actionable trading insights