Cybersecurity Research • Adversarial ML • Network Defense
I break ML-based security systems to make them unbreakable. 4 first-author papers. DoD-funded. NCAE champion.
MS Data Science (Thesis Track) • UMass Dartmouth • Graduating May 2026
I'm completing my MS in Data Science (thesis track) at the University of Massachusetts Dartmouth, working as a Graduate Research Assistant under Dr. Gokhan Kul on Department of Defense-funded cybersecurity research in collaboration with the U.S. Military Academy at West Point.
My thesis research falls under the DoD-funded project "Resilience Engineering of ML-enabled Open World Recognition for Network Intrusion Detection Systems" (Grant W911NF-22-2-0160). My work centers on two core contributions: MITRE ATT&CK-based attack chain prediction using hybrid LSTM-Markov models, and Adversarial Risk Analysis (ARA-OSID), a decision-theoretic framework with ATT&CK-derived utility functions for defender-attacker scenarios in NIDS. My earlier research addressed what I call the False Champion Problem: ML-based intrusion detection systems that achieve high aggregate accuracy while failing catastrophically on critical attack classes. I've authored four first-author papers across these areas (1 accepted at DSN, 3 under review).
Before graduate school, I spent 3+ years as a Data Scientist and Software Engineer building production ML pipelines, time series models, and cloud-native services on AWS. I'm seeking research scientist, ML engineer, and cybersecurity engineer roles where I can apply both research depth and engineering skills. STEM OPT eligible with 3 years of U.S. work authorization.
DoD-Funded Project (Grant W911NF-22-2-0160) in collaboration with U.S. Military Academy at West Point
Ordered chronologically — Papers 3 & 4 (marked "Thesis Core") represent the primary thesis contributions
Designed and evaluated adversarial robustness framework for ML-based NIDS, achieving 93.97% baseline accuracy on 1.2M+ packet ACI-IoT-2023 dataset. Demonstrated up to 77% model performance degradation under FGSM/PGD attacks using CLEVER score analysis.
Developed novel synthetic IoT network packet generator combining statistical learning and genetic algorithms, validated through dual anomaly detection achieving <1.2% anomaly rate. Enables privacy-preserving dataset generation for cybersecurity research.
Engineered hybrid LSTM-Markov models for MITRE ATT&CK-based attack chain prediction with integrated probabilistic risk scoring framework. Enables proactive threat intelligence and security posture assessment.
Developed a formal Adversarial Risk Analysis framework with ATT&CK-derived utility functions for network intrusion detection, integrating EPSS/KEV vulnerability data with game-theoretic decision models for defender-attacker scenarios.
Contributing to the academic community through peer review
Peer reviewer for IEEE Military Communications Conference 2025, evaluating submissions in cybersecurity, machine learning, and network security domains.
August 2025Technical Program Committee member for the Workshop on "Dependable and Secure Autonomous Systems: Space and Drone Technologies in the Age of AI", co-located with the 56th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2026), Charlotte, USA, June 2026.
June 2026Dartmouth, MA
Department of Defense-Funded Project (Grant W911NF-22-2-0160) | Advisor: Dr. Gokhan Kul
Dartmouth, MA
Dartmouth, MA
Stokesbury Lab
Dartmouth, MA
Bengaluru, India
Bengaluru, India
Bengaluru, India
Won 1st place in the 2026 NCAE Cyber Games (Northeast 2 Region) as a UMass Dartmouth team member, achieving the highest overall score among all competing teams nationally. Competed in SOC analysis, Splunk and Corelight log queries, MITRE ATT&CK Navigator exercises, and live Linux/Windows server administration under attack.
Organized and led the OWASP Juice Shop Capture The Flag competition for the UMass Dartmouth Cybersecurity and Computing Club. Designed challenge scenarios covering SQL injection, XSS, authentication bypass, and other OWASP Top 10 vulnerabilities.
Active member of IEEE Communications Society. Served as peer reviewer for IEEE MILCOM 2025 and Technical Program Committee member for the DSN 2026 Workshop on Dependable and Secure Autonomous Systems.
Research repositories, cybersecurity tools, and data science projects on GitHub
Framework for evaluating ML-based Network Intrusion Detection Systems against FGSM/PGD adversarial attacks with CLEVER score analysis. ACI-IoT-2023 dataset, 1.2M+ packets.
Novel IoT packet generation combining statistical learning and genetic algorithms. Dual anomaly detection validation with <1.2% anomaly rate for privacy-preserving cybersecurity research.
Hybrid LSTM-Markov models for predicting attacker behavior sequences using MITRE ATT&CK tactics and techniques, with integrated probabilistic risk scoring.
11-service Dockerized SOC with Wazuh, Suricata, TheHive, Cortex, Grafana. 9 authored Sigma rules with pytest CI, custom Sigma-to-Wazuh compiler, 8-stage MITRE ATT&CK adversary emulation covering 91.3% of the kill chain.
7-page Streamlit analytics over MITRE ATT&CK coverage. Ingests Sigma, Wazuh-XML, and JSON rules. Data-source-weighted coverage across 130+ threat actors. Exports ATT&CK Navigator JSON + PDF reports.
XGBoost on 42 engineered features + CharCNN on raw URL characters. Per-request SHAP explanations, PSI drift monitoring, Prometheus metrics. ~97% accuracy at <1ms CPU inference. FastAPI + Docker.
Packet capture with Z-score/IQR anomaly detection. Per-source port scan detection via Shannon entropy. Interactive Plotly HTML dashboards. Streaming mode for long captures.
SSH/HTTP/FTP honeypot using paramiko with Random Forest session classification. Thread-safe rate limiting, webhook alerting, and real-time Flask dashboard. Docker Compose deployment.
AWS security scanner across 6 service areas (S3, IAM, SG, EC2, RDS, CloudTrail) against CIS benchmarks. Multi-region scanning with retry/backoff. HTML + JSON reports. CI-friendly exit codes.
Factual grounding checker scoring LLM outputs against source documents via semantic similarity, entity overlap, and numerical accuracy with bootstrap CIs. LLM-as-judge bias detection (positional, verbosity, self-enhancement). Calibration curves with ECE/MCE. FastAPI server + Streamlit dashboard.
Experimentation platform with A/B tests using O'Brien-Fleming sequential monitoring, Thompson Sampling multi-armed bandits (Beta-Bernoulli), and contextual bandits (online logistic regression). Simulation engine comparing cumulative regret. FastAPI assignment server with file-backed persistence.
Benchmarking harness comparing classical methods (ARIMA, LSTM with early stopping + val split, XGBoost with lag features + cyclical encoding) against time-series foundation models (Chronos). Evaluates point accuracy, computational cost, and few-shot learning curves at varying context lengths.
ISC2 — Active
In Progress — Target May 2026
Microsoft and LinkedIn
Johns Hopkins University
IBM
Industry Certification
Industry Certification
Industry Certification
Industry Certification
University of Michigan
Amazon
Seeking research scientist, ML engineer, and cybersecurity engineer opportunities
Dartmouth, MA, USA
STEM OPT eligible with 3 years of U.S. work authorization. Available to start Summer/Fall 2026. Interested in discussing roles, collaborations, or my research? Let's connect.