Project Portfolio
Throughout my academic career I have worked on various projects, some of which are focused on cybersecurity, while others focus on information systems and development. Below, I have categorized these projects for clarity.
Cybersecurity Projects
- Advanced Password Strength Checker - Developed a robust password strength checker that evaluates password length, character variety, sequential patterns, and commonality using the rockyou.txt file, which contains over 14 million passwords. Integrated the Have I Been Pwned API to cross-check passwords against known data breaches, enhancing security by detecting compromised credentials. Integrated the API to cross-check passwords against known data breaches, using SHA-1 hashing to protect user credentials during the breach check process. Utilized the rockyou.txt file containing over 14 million common passwords to identify and flag vulnerable passwords, preventing the use of easily guessable credentials. Provided comprehensive feedback on password strength, offering users detailed analysis of detected patterns and an overall strength assessment to promote stronger password creation.
- Automated Disaster Recovery on AWS - Minimized downtime and data loss for critical applications, including EC2 instances and Amazon databases, by creating a comprehensive DR plan on AWS. Established automated backups to S3 for EC2 instances and configured continuous data replication for Amazon databases, ensuring fast recovery in case of outages and 99.9% data availability. Documented failover procedures for swift restoration of EC2 instances and Amazon databases, minimizing disruption to business operations.
- Benchmarking Cryptographic Algorithms for Performance and Memory Usage - Benchmarked AES (Advanced Encryption Standard) with a 32-byte key, RSA (Rivest-Shamir-Adleman) with key sizes up to 16384 bits, and ECC (Elliptic Curve Cryptography) with the P-521 curve. Developed custom scripts using the PyCryptodome library to measure encryption/decryption times, key generation times, and memory usage, saving benchmark results for further analysis.
- Cloud Migration for Enterprise Application - Designed and implemented a cloud migration project leveraging AWS with tasks focusing on architecture design, infrastructure assessment, cost optimization, and security. Reduced infrastructure costs by optimizing resource allocation and incorporated enhanced security controls.
- Firewall Rule Configuration and Network Segmentation with pfSense - Configured pfSense firewall rules to enforce strict traffic control, allowing essential services while blocking unauthorized access across segmented network interfaces. Customized aliases for different VMs, including Kali and Metasploitable, to simplify rule application. Set up access control for key services (DNS, NTP, and Squid Proxy) and enforced strict rules for private IP access and outbound HTTPS. Additionally, created DHCP reservations for the Kali VM.
- Hydra Password Cracking - Utilized Hydra, a powerful login cracker, to perform brute-force attacks on remote services such as FTP, SSH, and HTTP, simulating real-world cybersecurity threats. Configured wordlists and targeted various protocols to demonstrate different attack vectors and evaluate their resilience against brute-force attacks. Analyzed the effectiveness of password policies and identified vulnerabilities in default configurations, recommending mitigation strategies to enhance system security. Compiled results and proposed solutions for securing services against brute-force attacks by enforcing account lockout policies and using multi-factor authentication.
- Multi-AS Network Simulation in Cisco Packet Tracer - Designed and implemented a complex enterprise network topology with multiple Autonomous Systems (AS), including routing protocols EIGRP, RIP, and BGP, to ensure efficient and secure communication between diverse network segments.
- Nmap Scans using Kali VM on Metasploitable 2 & 3 - Conducted extensive Nmap scans on Metasploitable 2 and 3 VMs using Kali Linux, identifying vulnerable services and open ports for security exploitation. Analyzed the scan results to understand various services like FTP, SSH, HTTP, and SMB, and determined potential attack vectors. Utilized Nmap’s advanced features like OS detection, version scanning, and scripting engine to uncover deeper vulnerabilities within the Metasploitable machines. Documented the findings in a comprehensive report, providing actionable insights into network weaknesses for further testing.
- Implementing OpenVAS for Comprehensive Vulnerability Assessment - The project involved setting up OpenVAS as a standalone VM, configured with sufficient resources and necessary firewall rules for proper operation. OpenVAS was used to scan the Kali VM, Metasploitable 2 and 3 VMs, Security Onion VM, and pfSense VM for vulnerabilities. Configuration included network adjustments to ensure OpenVAS has access to all target VMs and defining scanning profiles to identify misconfigurations, missing patches, and open services, with results exported for analysis.
- Public/Private Key Pair Creation and SSH Configuration - Successfully created a Public/Private RSA key pair using PuTTYgen, configuring SSH access for the Security Onion and firewall VMs. Edited the public key for compatibility with Linux systems and stored SSH profiles in mRemoteNG for seamless access. Removed password authentication for enhanced security and verified SSH connections across all configured VMs.
- Security Onion VM Setup and PCAP Analysis - Imported the Security Onion virtual machine (VM) into VirtualBox. Configured network settings for a bridged adapter to access the home network and an internal network for LAN traffic. Imported a specified PCAP file for analysis and accessed the Security Onion web interface to navigate to the Kibana dashboard to capture critical metrics on logs, modules, and log counts by node.
- Secure Remote Access Infrastructure on AWS - Implemented a multi-factor authentication (MFA) solution for remote access, requiring users to verify their identity through additional factors beyond a password, significantly reducing the risk of unauthorized access. Created a logically isolated environment within the AWS cloud using a VPC. Further secured the network by utilizing Security Groups to control traffic flow and IAM to enforce least privilege access for remote users, minimizing the potential impact of security breaches. Enabled continuous monitoring and threat detection by integrating AWS CloudTrail for logging API calls and AWS GuardDuty for identifying potential security threats within the AWS environment.
- Secure Network Enviornment with VirtualBox and pfSense - Utilized VirtualBox software and created a dedicated pfSense firewall appliance, configuring a host-only network and customized interface names. Set administrative credentials, added an anti-lockout rule, and disabled the default lockout. Configured pfSense with custom IPs, DNS, and segmented network interfaces, aligning with network security requirements.
- Traffic Analysis using Wireshark - Captured and analyzed network traffic using Wireshark to study communication patterns and identify suspicious packets in sandboxed environments. Performed detailed analysis of TCP/IP communication, identifying issues such as packet loss, latency, and potential attacks like ARP spoofing or DNS hijacking. Focused on DNS packet tracing and TCP behavior to understand request-response flows and potential misconfigurations within network infrastructure. Compiled the results into a detailed report, outlining the key observations and highlighting areas of potential security improvements.
- Web 3.0 InfoSec Threats and Use Cases Research - For this project, we analyzed the underlying threats that Web 3.0 presents to how we view and access data. We started by examining Distributed Ledger Technologies (DLTs) and the solutions they offer, such as decentralized identity, secure and low-cost payment solutions, publicly verifiable logs of data with native consensus timestamps, and the sustainability aspect of Web 3.0. We then compared layer 1 and layer 2 blockchains like Ethereum, Polygon, Hedera, and Binance, considering their capabilities such as TPS (Transactions per second), scalability, security, governance model, consensus mechanism, regulatory compliance, developer tools and community support, and adoption of the ecosystem.
Other Projects
- Cloud Computing Presentation and Research - Throughout this project, we focused on the information security aspect within Cloud Computing and compared the advantages to the disadvantages. Furthermore, we conducted research on cloud infrastructure, software, and services through AWS Cloud and Microsoft Azure, as well as their respective competitors. Lastly, we examined how these solutions can provide businesses of any size with advantages when working with cloud computing and storage, compared to on-premises IT infrastructure.
- Customer Age and Income Analysis - Analyzed the relationship between customer age and income using Python, leveraging statistical methods to derive actionable insights for targeted marketing strategies. Conducted data preprocessing tasks such as handling missing values and scaling features to ensure the accuracy and reliability of age and income analysis.
- Exploring Deep Learning for Image Classification: A Project in Handwritten Digit Recognition - Developed and trained a neural network for handwritten Arabic numeral recognition, offering classic and convolutional architectures with user-customizable parameters. Achieved 71% accuracy on the MNIST dataset, demonstrating proficiency in applying deep learning techniques for image classification.
- E-Commerce Customer with AWS - Implemented data transformation and aggregation using AWS Glue and Amazon Athena to preprocess raw data from Amazon S3, facilitating efficient querying and analysis of customer behavior patterns. Employed Amazon Kinesis Data Streams to capture real-time customer interactions, stored data securely in Amazon S3, and utilized Amazon QuickSight for advanced analytics and visualization, enabling data-driven business decisions and targeted marketing strategies. Designed and automated scheduled reports and dashboards in Amazon QuickSight to provide stakeholders with timely insights into customer segmentation, purchasing trends, and campaign effectiveness, supporting strategic decision-making and business growth initiatives.
- Prompt Engineering of GPT-Based Large Language Models - Comprehensive research paper on prompt engineering methodologies for optimizing human-AI interactions, with a specific focus on ChatGPT. The paper explores diverse techniques, including prompting with examples, System 1 and System 2 questions, emotion-driven prompts, prompt programming, and prompt patterns. The evaluation results highlight the strengths and considerations of each methodology, emphasizing their impact on precision, adaptability, versatility, and user engagement.
- Railway Database Management System - Our railway database system has been designed to provide real-time data, enabling effective decision-making processes and delivering a seamless experience for our customers. The database will contain data reflecting real-world scenarios, focusing on maintaining passenger records, transactions, reservations, tickets, and more. We will be able to retrieve information, including reports, that provide specific reservation status and ticket data. By analyzing historical data, such as the number of transactions, reservations, passengers, and performance reports, we can predict future trends and track productivity. Our database will create a competitive advantage by minimizing data redundancies, increasing data security, improving efficiency, reducing data storage and retrieval costs, ensuring data integrity, and improving data access. Immediate access to data supporting understanding and analyzing business performance will provide a long-term competitive edge.
- Sales Performance Analysis and Forecasting - Leveraged Python libraries such as Pandas, NumPy, and Matplotlib to analyze historical sales data, identify trends, and develop predictive models for forecasting future sales. Created interactive visualizations and dashboards to provide insights into sales performance and support data-driven decision-making processes. Applied time-series forecasting techniques, including ARIMA and exponential smoothing, to predict sales trends, contributing to improved strategic planning and inventory management.
- Vending Machine Project using Java - Developed a vending machine simulation program using Java, incorporating object-oriented principles such as encapsulation, inheritance, and polymorphism. The vending machine allowed users to select and purchase items, with options for managing balance, change, and inventory. Designed the user interface using Java Swing, providing a user-friendly and interactive experience. Integrated data persistence for tracking inventory levels, sales transactions, and user balances, enabling seamless operation and real-time updates.
- Web Development Project, Random Reviews - Created a dynamic web-based application for publishing and sharing reviews of products and services. The site allowed users to contribute reviews, rate others’ reviews, and engage with the broader community. Developed user authentication and access control mechanisms to ensure a secure environment for contributors. Implemented features for sorting and filtering reviews based on user preferences and rating scores, providing a personalized experience. Integrated responsive design principles to ensure the site was accessible and visually appealing across various devices and screen sizes, improving user engagement and satisfaction.