Home CV Projects About

Projects

Cybersecurity | Ethical Hacking | IT Infrastructure

Projects

Brute-force Attack

This project investigates the effectiveness of various password protection mechanisms in mitigating brute-force attacks through a series of controlled experiments in a secure lab environment. The attacks were executed from a Kali Linux machine against login pages hosted on a dedicated web server. The evaluated security measures included no protection, session-based restrictions, database-level protections, and IP-based blocking. Additionally, the security of hashed passwords was tested using Hashcat.

The results showed that unprotected login pages were highly vulnerable, allowing tools like Hydra to test thousands of passwords in a short time. While session-based and IP-based restrictions slowed the attacks, attackers could bypass these measures using new sessions or IP hopping. Database-level restrictions proved to be the most effective, preventing all brute-force attempts but introducing potential accessibility issues, as legitimate users could be locked out after repeated failed login attempts.

This study highlights the importance of combining strong passwords with robust security mechanisms such as database-level protections, multi-factor authentication (MFA), and CAPTCHA to enhance security without compromising user accessibility. The findings also connect to the CIA triad (Confidentiality, Integrity, and Availability), emphasizing how weak security measures can expose organizations to severe operational and reputational risks. From a financial sustainability perspective, companies failing to implement adequate security measures risk significant economic losses due to compromised accounts, brand damage, and business disruptions.

Download Full Report (docx)

Network Anomaly Detection Using ML

This project focuses on enhancing anomaly detection through an optimized machine learning pipeline. The core approach involves using Principal Component Analysis (PCA) for dimensionality reduction and a Support Vector Machine (SVM) classifier with an RBF kernel to identify anomalies in the data. Initially, the dataset undergoes rigorous data cleaning, where missing values in the target "ANOMALY" column are removed, and irrelevant columns are excluded. The remaining numerical features are standardized to ensure that the PCA and SVM models perform effectively.

To tackle the challenge of class imbalance, the project implements SMOTE (Synthetic Minority Over-sampling Technique), which synthetically generates additional samples for the underrepresented class, thereby improving the model’s ability to correctly identify anomalies. The original SVM model achieved an overall accuracy of 88.1%, with particularly high performance for the anomaly class. However, the model showed some difficulty correctly classifying normal data points.

To further improve the detection performance, various enhancements were explored. Adjusting SMOTE parameters—specifically increasing the number of neighbors—and increasing the number of PCA components from three to five significantly boosted the model's accuracy and F1-scores. Additionally, alternative algorithms such as Random Forest and XGBoost were evaluated. The Random Forest model, in particular, demonstrated outstanding performance, achieving 100% accuracy in our tests.

Overall, this project demonstrates the effectiveness of combining advanced data preprocessing, dimensionality reduction, and robust classification techniques to build a highly accurate anomaly detection system. The improvements highlighted in this work are particularly relevant for applications in cybersecurity, system monitoring, and any field where the accurate detection of anomalies is critical.

Download Full Report (docx)

Kryptografi och Steganografi

This project implements a secure system that combines RSA encryption with steganography to protect sensitive information. The system encrypts files using RSA by breaking them into smaller chunks, ensuring that the file's content remains confidential through the use of a public key. To further enhance security, the private RSA key needed for decryption is concealed within an image using the Least Significant Bit (LSB) steganographic method. This dual-layer approach not only secures the file content but also hides the decryption key, making unauthorized access significantly more challenging.

Additionally, the project includes clear, step-by-step instructions for installing the necessary modules, running the Python script, extracting the hidden key from the image, and finally decrypting the file. This practical solution is designed to safeguard data in both personal and professional settings, ensuring secure digital communication and storage.

Download Full Report & instructions(zip)

CCNA Project

This project involves designing and implementing a comprehensive network solution for a company with operations across two sites. As a group, we developed an integrated network architecture using Packet Tracer and later demonstrated the solution on physical equipment, including rack servers. Our project covers a wide range of network design and configuration tasks that reflect real-world enterprise networking challenges.

Key Components of Our Solution

  • VLAN Design: We determined the necessary VLANs to segment network traffic and enhance security across both sites.
  • IP Addressing Scheme: A structured IP addressing plan was developed and implemented, ensuring proper allocation of IP addresses to routers, switches, servers, and hosts.
  • GRE Tunnels: To enable secure communication between the two sites, we configured GRE tunnels, facilitating seamless inter-site connectivity.
  • Routing Configuration: Both static and dynamic routing protocols were configured to manage traffic within and between sites, ensuring optimal path selection and network resiliency.
  • Default Gateway Redundancy: Redundancy was implemented for default gateways to enhance network reliability and maintain continuous connectivity in the event of a failure.
  • Link Aggregation: We configured link aggregation to combine multiple network links, increasing bandwidth and providing redundancy.
  • Layer 2 Topology and STP: Desired Layer 2 topologies were determined, and Spanning Tree Protocol (STP) was configured to prevent loops and ensure a robust network structure.
  • Access Control Lists (ACLs): Security requirements were met by creating and applying ACLs on appropriate interfaces to control traffic flow and protect sensitive resources.
  • NAT/PAT Configuration: A suitable variant of NAT/PAT was enabled to manage external connectivity and provide additional security for the network.

Overall, this project demonstrates our ability to integrate theoretical knowledge with practical skills in designing, configuring, and managing complex network environments. The hands-on experience with both simulation and physical hardware highlights our preparedness to tackle real-world networking challenges.

Download Full Report (PDF)

IoT Security Testing

Assessing the security vulnerabilities of IoT devices through penetration testing.

Download Full Report (PDF)