Cybersecurity Projects
A showcase of my technical projects in cybersecurity, featuring research, implementations, and ongoing initiatives.
Security Operations Centre Implementation
Orchestrated the establishment of a cutting-edge SOC center leveraging modern technologies for robust security monitoring and threat intelligence.
Technologies Used
Key Achievements
- Integrated Wazuh and Graylog as SIEM tools for robust log ingestion
- Built data pipeline for processing security events
- Implemented dynamic visualization using Kibana and Grafana
- Working on OpenCTI and MISP integration for threat intelligence sharing
- Enhanced EDR capabilities through Wazuh integration
Web Server Log Analysis
Comprehensive analysis of web server logs using advanced SIEM tools to detect and investigate security incidents.
Technologies Used
Key Achievements
- Analyzed over 50,000 web server logs using Kibana dashboards
- Extracted technical insights through advanced data visualization
- Detected SQL injection attempts targeting internal executable files
- Tracked 10 IP addresses compromised by a botnet
- Developed protection strategies based on pattern analysis
Intrusion Detection & Prevention System
Implementation of comprehensive IDS/IPS solution to protect against various cyber threats and unauthorized access.
Technologies Used
Key Achievements
- Investigated web application, SQL injection, and port scan alerts
- Analyzed attacks against DMZ network to identify vulnerabilities
- Engineered custom alerts and rules using bash scripting
- Implemented proactive traffic filtering to prevent unauthorized access
- Enhanced overall network infrastructure security
Enhancing Insider Threat Detection
Innovative approach combining Moral Foundations Theory with NLP for advanced insider threat detection.
Technologies Used
Key Achievements
- Achieved 88% accuracy on CMU Insider Threat Dataset
- Reached 80% accuracy on Enron Email Dataset
- Developed novel NLP framework using Moral Foundations Dictionary
- Enhanced behavioral analysis for threat detection
- Created scalable solution for enterprise deployment
Privacy for Shared Smart Assistants
Published research at USENIX SOUPS'24 focusing on privacy preferences and controls for smart personal assistants.
Technologies Used
Key Achievements
- Conducted comprehensive research on privacy preferences
- Surveyed both voice assistant users and non-users
- Identified effective fine-grained privacy controls
- Published findings at prestigious USENIX SOUPS'24 conference
- Contributed to improving smart device privacy
Windows Server Environment Management
Comprehensive implementation and management of Windows Server environment with focus on security and policy enforcement.
Technologies Used
Key Achievements
- Set up and managed Windows servers with multiple roles
- Implemented Active Directory infrastructure
- Configured DHCP and DNS services
- Deployed and managed group policies
- Enhanced overall network security through proper configuration
NetFlow Analysis
Advanced network traffic analysis using specialized tools to detect and investigate malicious activities.
Technologies Used
Key Achievements
- Analyzed network traffic patterns using Argus and SiLK
- Utilized UNIX commands for detailed traffic investigation
- Uncovered evidence of malicious activities
- Developed traffic analysis methodologies
- Created comprehensive network visibility
Firewall Rule Optimization
Strategic optimization of firewall rules to enhance network security while maintaining performance.
Technologies Used
Key Achievements
- Crafted and optimized 10 firewall rulesets
- Protected against unauthorized access and threats
- Developed robust network security architecture
- Balanced security with network performance
- Implemented best practices in firewall configuration
Voice Cloning Privacy Research
In-depth analysis of privacy implications in voice cloning AI/ML models.
Technologies Used
Key Achievements
- Conducted comprehensive privacy policy analysis
- Reviewed use cases and implications
- Provided solutions for privacy concerns
- Raised awareness about privacy issues
- Contributed to privacy-conscious AI development
Cryptocurrency Forecasting
Advanced machine learning application for cryptocurrency price prediction and analysis.
Technologies Used
Key Achievements
- Developed short-term return forecasting models
- Analyzed fourteen different cryptocurrencies
- Implemented multiple ML algorithms
- Created time-series analysis framework
- Produced actionable trading insights