BCA Cybersecurity analyst with 3 year learning experience in the field of computer systems ,in protecting and securing computer networks.Eager to Commit job with a history of meeting company needs with consistent and organized practices. Skilled in working under pressure and adapting to new situations and challenges to best enhance the organizational brand.
Completed a comprehensive internship at District Crime Record Bureau [DCRB] Calicut , kerala which is headed by an Assistant Police Commissioner.
Engaged in insightful discussions and consultations with esteemed officers in Cyber Dome , Cyber Police station , NIA , Cyber cell
1. FAKE NEWS DETECTION SYSTEM
Developed a machine learning model to detect fake news by distinguishing genuine from misleading articles. This involved collecting labeled news data, feature extraction (e.g., language patterns), and training models like logistic regression and neural networks. The model was validated for accuracy and deployed for real-time detection, enhancing media trust. Future improvements aim to integrate multimedia analysis, enable continual learning, and foster collaborative dataset development for more effective detection capabilities.
2. AN INTELLIGENCE APPROACH TO DETECT PROBE ATTACK
Authored a comprehensive research report outlining an innovative approach for detecting probe attacks.WLANs face interception risks due to unencrypted beacon and probe messages, allowing sniffers to access data. Attackers exploit this by using valid MAC addresses for clandestine network access. Timely detection is vital, with WIDS pivotal, especially against MAC spoofing.
UNDERSTANDING LOCAL FILE INCLUSION
In 2023, TechMart faced a data breach caused by an LFI vulnerability in its image upload feature, allowing attackers to access sensitive system files and customer data. This resulted in loss of trust, legal troubles, and financial damage. The incident highlights crucial security lessons: enforce input validation, follow the principle of least privilege, conduct regular security audits, ensure timely patch management, and train developers on security. This breach underscores the necessity of robust defenses to safeguard sensitive information.