Projects

researchRepository

AI-Driven Threat Detection

I designed and benchmarked a multi-model defense pipeline combining FFNNs, GNNs, and transformers across malware triage, intrusion alerting, and tactic attribution. It highlights model behavior under noisy data and practical deployment trade-offs for SOC workflows.

Open to view full write-up and README details

MLPyTorchBERTGNNanomaly detectionmalware detectionintrusion detection

Repository preview

AI-Driven Threat Detection repository preview
researchRepository

ARIA - Forensics Agent

I built an investigation workflow where AI-generated output must pass evidence-grounded checks before acceptance. The project emphasizes hallucination resistance, adversarial prompt robustness, and reproducible validation logic for forensic tasks.

Open to view full write-up and README details

AIforensicsadversarialgamehallucination defenseevidence validation

Repository preview

ARIA - Forensics Agent repository preview
researchRepository

SSH Attack Analysis

I processed 230k SSH honeypot sessions with NLP and sequence models to classify attacker intent and map behavior to ATT&CK techniques. The pipeline is built for analyst readability and downstream threat-intel use.

Open to view full write-up and README details

MLNLPhoneypotMITRE ATT&CKthreat intelligencesequence modeling

Repository preview

SSH Attack Analysis repository preview
courseworkRepository

SoftEther VPN Lab

I designed and compared IPSec and TLS VPN lab topologies in SoftEther, then inspected traffic with Wireshark to validate handshake and tunnel behavior. The final analysis documents security and performance trade-offs.

Open to view full write-up and README details

VPNnetworkingWiresharkIPSecTLSnetwork forensics

Repository preview

SoftEther VPN Lab repository preview