Cybersecurity Research • Adversarial ML • Network Defense

Mayank Raj

I break ML-based security systems to make them unbreakable. 4 first-author papers. DoD-funded. NCAE champion.

4 Papers (1 Accepted, 3 Under Review) NCAE Cyber Games 1st Place DoD • West Point Collaboration STEM OPT • 3 Yrs U.S. Work Auth

MS Data Science (Thesis Track) • UMass Dartmouth • Graduating May 2026

Mayank Raj

About Me

I'm completing my MS in Data Science (thesis track) at the University of Massachusetts Dartmouth, working as a Graduate Research Assistant under Dr. Gokhan Kul on Department of Defense-funded cybersecurity research in collaboration with the U.S. Military Academy at West Point.

My thesis research falls under the DoD-funded project "Resilience Engineering of ML-enabled Open World Recognition for Network Intrusion Detection Systems" (Grant W911NF-22-2-0160). My work centers on two core contributions: MITRE ATT&CK-based attack chain prediction using hybrid LSTM-Markov models, and Adversarial Risk Analysis (ARA-OSID), a decision-theoretic framework with ATT&CK-derived utility functions for defender-attacker scenarios in NIDS. My earlier research addressed what I call the False Champion Problem: ML-based intrusion detection systems that achieve high aggregate accuracy while failing catastrophically on critical attack classes. I've authored four first-author papers across these areas (1 accepted at DSN, 3 under review).

Before graduate school, I spent 3+ years as a Data Scientist and Software Engineer building production ML pipelines, time series models, and cloud-native services on AWS. I'm seeking research scientist, ML engineer, and cybersecurity engineer roles where I can apply both research depth and engineering skills. STEM OPT eligible with 3 years of U.S. work authorization.

Research Interests

Adversarial Machine Learning
Network Intrusion Detection
Deep Learning Robustness
Cyber Threat Intelligence
Synthetic Data Generation
AI Security & Safety
4
First-Author Papers
(1 Accepted, 3 Under Review)
1st
NCAE Cyber Games
Northeast 2 Region (2026)
DoD
Funded Research
(Grant W911NF-22-2-0160)
U.S. Military Academy
3.60
GPA
Master's Program
100+
Students
Mentored

Research & Publications

DoD-Funded Project (Grant W911NF-22-2-0160) in collaboration with U.S. Military Academy at West Point
Ordered chronologically — Papers 3 & 4 (marked "Thesis Core") represent the primary thesis contributions

Under Review IEEE Access

Categorical Robustness Assessment and Model Evaluation for Machine Learning Based Network Intrusion Detection Systems

Raj M, Bastian N.D, Kul G, Fiondella L.

Designed and evaluated adversarial robustness framework for ML-based NIDS, achieving 93.97% baseline accuracy on 1.2M+ packet ACI-IoT-2023 dataset. Demonstrated up to 77% model performance degradation under FGSM/PGD attacks using CLEVER score analysis.

Adversarial ML NIDS Deep Learning Security
Under Review ICCCN 2026

Synthetic Network Packet Generation through Statistical Learning and Genetic Algorithms

Raj M, Bastian N.D, Kul G, Fiondella L.

Developed novel synthetic IoT network packet generator combining statistical learning and genetic algorithms, validated through dual anomaly detection achieving <1.2% anomaly rate. Enables privacy-preserving dataset generation for cybersecurity research.

Synthetic Data Genetic Algorithms IoT Security Privacy
Thesis Core Under Review SECRYPT 2026

MITRE ATT&CK-based Attack Chain Prediction using Hybrid LSTM-Markov Models for Cybersecurity Risk Assessment

Raj M, Bastian N.D, Kul G, Fiondella L.

Engineered hybrid LSTM-Markov models for MITRE ATT&CK-based attack chain prediction with integrated probabilistic risk scoring framework. Enables proactive threat intelligence and security posture assessment.

MITRE ATT&CK LSTM Threat Intelligence Risk Assessment
Thesis Core Accepted DSN 2026 Workshop

From Threat Intelligence to Decision Theory: ATT&CK-Derived Utility Functions for Adversarial Risk Analysis in NIDS

Raj M, Bastian N.D, Kul G.

Developed a formal Adversarial Risk Analysis framework with ATT&CK-derived utility functions for network intrusion detection, integrating EPSS/KEV vulnerability data with game-theoretic decision models for defender-attacker scenarios.

Adversarial Risk Analysis Decision Theory Game Theory MITRE ATT&CK

Scholar Services

Contributing to the academic community through peer review

Conference Reviewer

IEEE MILCOM 2025 (W07)

Peer reviewer for IEEE Military Communications Conference 2025, evaluating submissions in cybersecurity, machine learning, and network security domains.

August 2025

Technical Program Committee

DSN Workshop on Dependable and Secure Autonomous Systems: Space and Drone Technologies in the Age of AI 2026

Technical Program Committee member for the Workshop on "Dependable and Secure Autonomous Systems: Space and Drone Technologies in the Age of AI", co-located with the 56th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2026), Charlotte, USA, June 2026.

June 2026

Experience

Jan 2025 - Present

Research Assistant

University of Massachusetts Dartmouth

Dartmouth, MA

Department of Defense-Funded Project (Grant W911NF-22-2-0160) | Advisor: Dr. Gokhan Kul

  • Designed and evaluated adversarial robustness framework for ML-based Network Intrusion Detection Systems, achieving 93.97% baseline accuracy on 1.2M+ packet ACI-IoT-2023 dataset
  • Demonstrated up to 77% model performance degradation under FGSM/PGD attacks using CLEVER score analysis
  • Developed novel synthetic IoT network packet generator combining statistical learning and genetic algorithms
  • Engineered hybrid LSTM-Markov models for MITRE ATT&CK-based attack chain prediction
  • Collaborated with military researchers on national security applications; presented findings at research meetings
  • Reviewer at IEEE MILCOM WS-07: Security, Resilient, and Robustness of Systems and Software 2025
  • Technical Program Committee Member for DSN Workshop: Dependable and Secure Autonomous Systems: Space and Drone Technologies in the Age of AI 2026
Adversarial ML NIDS Deep Learning MITRE ATT&CK
Sept 2025 - Present

Graduate Teaching Assistant - Database Design (CIS-552)

University of Massachusetts Dartmouth

Dartmouth, MA

  • Mentored 50+ graduate students in advanced database systems, focusing on relational algebra, query optimization, and AI-driven architectures
  • Delivered instruction on vector databases, learned query optimization, ML-based cost estimation, and distributed/NoSQL systems
  • Guided projects on ER modeling, schema optimization, indexing strategies, and recovery protocols
  • Integrated emerging database technologies (feature stores, data lakehouses, AI-native consistency models) into coursework
Database Systems Teaching AI Integration
May 2024 - Aug 2024

Research Technician/Digitizer

School of Marine Science and Technology - UMass Dartmouth

Dartmouth, MA

Stokesbury Lab

  • Participated in oceanographic field expeditions operating specialized seafloor mapping equipment (HabCam, video survey systems)
  • Developed automated data processing pipelines analyzing terabytes of seafloor imagery using machine learning and computer vision
  • Performed quantitative spatial analysis with geospatial tools (GeoPandas, QGIS) to evaluate environmental factors
  • Contributed computational expertise to data-driven fisheries management strategies
Computer Vision Data Analysis Geospatial Analysis
Sept 2024 - Dec 2024

Graduate Teaching Assistant - Procedural Programming (CIS-190)

University of Massachusetts Dartmouth

Dartmouth, MA

  • Led hands-on lab sessions for 30+ undergraduate students in C/C++ programming, debugging techniques, and code optimization
  • Developed and presented instructional materials on data structures, memory management, pointers, and file I/O operations
  • Fostered algorithmic thinking and problem-solving skills through structured exercises and real-world programming challenges
  • Provided individualized mentoring during office hours, guiding students through complex programming concepts
C/C++ Teaching Mentoring
Jan 2020 - Apr 2023

Data Scientist

Eklavya Estate Private Limited

Bengaluru, India

  • Architected ETL pipelines processing 500K+ real estate records with 99.7% accuracy through automated validation protocols
  • Developed time series models (ARIMA, LSTM) for housing price prediction across 15+ markets with monthly executive reporting
  • Applied ML techniques (Random Forest, XGBoost) to customer analysis, improving prediction accuracy by 18% and reducing loss ratio by 12%
  • Enhanced trend analysis efficiency by 15% using automated data mining, NLP, and interactive dashboards (Tableau, Power BI)
  • Implemented A/B testing and hypothesis testing for pricing strategies, informing $2M+ annual revenue decisions
Machine Learning Time Series Data Analytics ETL
Sept 2019 - Jan 2020

Software Engineer

Eklavya Estate Private Limited

Bengaluru, India

  • Designed RESTful APIs using Django and Flask to integrate legacy systems with cloud infrastructure
  • Architected AWS microservices (EC2, S3, RDS, Lambda) supporting 10K+ concurrent users with load balancing and auto-scaling
  • Containerized applications using Docker and Kubernetes, reducing deployment time by 60%
  • Developed secure file transfer dashboard with end-to-end encryption for automated local-to-remote synchronization
Django Flask AWS Docker Kubernetes
Apr 2016 - Aug 2016

Internship

Hindustan Aeronautics Limited (HAL)

Bengaluru, India

  • Applied ML algorithms with pneumatic control systems for automated testing of GSLV Mk 3 and PSLV Mk 2 rocket systems
  • Developed ML-powered quality control dashboards for production monitoring of fighter jets (Su-30MKI, Tejas) and combat helicopters (Apache, LCH)
  • Gained experience in industrial automation, control systems, and real-time data processing for mission-critical defense applications
Machine Learning Industrial Automation Defense

Awards & Achievements

1st Place - NCAE Cyber Games 2026

Won 1st place in the 2026 NCAE Cyber Games (Northeast 2 Region) as a UMass Dartmouth team member, achieving the highest overall score among all competing teams nationally. Competed in SOC analysis, Splunk and Corelight log queries, MITRE ATT&CK Navigator exercises, and live Linux/Windows server administration under attack.

SOC Analysis Splunk MITRE ATT&CK Blue Team

OWASP Juice Shop CTF Organizer

Organized and led the OWASP Juice Shop Capture The Flag competition for the UMass Dartmouth Cybersecurity and Computing Club. Designed challenge scenarios covering SQL injection, XSS, authentication bypass, and other OWASP Top 10 vulnerabilities.

CTF OWASP Penetration Testing Leadership

IEEE Communications Society Member

Active member of IEEE Communications Society. Served as peer reviewer for IEEE MILCOM 2025 and Technical Program Committee member for the DSN 2026 Workshop on Dependable and Secure Autonomous Systems.

IEEE Peer Review TPC Member

Open Source & Projects

Research repositories, cybersecurity tools, and data science projects on GitHub

Security & Detection

Adversarial Robustness of NIDS

Framework for evaluating ML-based Network Intrusion Detection Systems against FGSM/PGD adversarial attacks with CLEVER score analysis. ACI-IoT-2023 dataset, 1.2M+ packets.

PyTorch Adversarial ML NIDS

Synthetic Network Packet Generator

Novel IoT packet generation combining statistical learning and genetic algorithms. Dual anomaly detection validation with <1.2% anomaly rate for privacy-preserving cybersecurity research.

Genetic Algorithms IoT Synthetic Data

MITRE ATT&CK Attack Chain Prediction

Hybrid LSTM-Markov models for predicting attacker behavior sequences using MITRE ATT&CK tactics and techniques, with integrated probabilistic risk scoring.

LSTM MITRE ATT&CK Risk Scoring

SOC Home Lab

11-service Dockerized SOC with Wazuh, Suricata, TheHive, Cortex, Grafana. 9 authored Sigma rules with pytest CI, custom Sigma-to-Wazuh compiler, 8-stage MITRE ATT&CK adversary emulation covering 91.3% of the kill chain.

SOC SIEM Blue Team Detection Engineering

MITRE ATT&CK Coverage Dashboard

7-page Streamlit analytics over MITRE ATT&CK coverage. Ingests Sigma, Wazuh-XML, and JSON rules. Data-source-weighted coverage across 130+ threat actors. Exports ATT&CK Navigator JSON + PDF reports.

MITRE ATT&CK Streamlit Threat Coverage

Phishing URL Detector

XGBoost on 42 engineered features + CharCNN on raw URL characters. Per-request SHAP explanations, PSI drift monitoring, Prometheus metrics. ~97% accuracy at <1ms CPU inference. FastAPI + Docker.

XGBoost FastAPI SHAP Phishing Detection

Network Traffic Anomaly Visualizer

Packet capture with Z-score/IQR anomaly detection. Per-source port scan detection via Shannon entropy. Interactive Plotly HTML dashboards. Streaming mode for long captures.

Scapy Plotly Anomaly Detection

Honeypot Attack Classifier

SSH/HTTP/FTP honeypot using paramiko with Random Forest session classification. Thread-safe rate limiting, webhook alerting, and real-time Flask dashboard. Docker Compose deployment.

Paramiko Random Forest Flask

Cloud Security Auditor

AWS security scanner across 6 service areas (S3, IAM, SG, EC2, RDS, CloudTrail) against CIS benchmarks. Multi-region scanning with retry/backoff. HTML + JSON reports. CI-friendly exit codes.

AWS Boto3 CIS Benchmarks

ML / Data Science

LLM Hallucination Detector

Factual grounding checker scoring LLM outputs against source documents via semantic similarity, entity overlap, and numerical accuracy with bootstrap CIs. LLM-as-judge bias detection (positional, verbosity, self-enhancement). Calibration curves with ECE/MCE. FastAPI server + Streamlit dashboard.

LLM NLP FastAPI Evaluation

Adaptive Experimentation Engine

Experimentation platform with A/B tests using O'Brien-Fleming sequential monitoring, Thompson Sampling multi-armed bandits (Beta-Bernoulli), and contextual bandits (online logistic regression). Simulation engine comparing cumulative regret. FastAPI assignment server with file-backed persistence.

A/B Testing Bandits Statistics FastAPI

Time-Series Foundation Model Benchmark

Benchmarking harness comparing classical methods (ARIMA, LSTM with early stopping + val split, XGBoost with lag features + cyclical encoding) against time-series foundation models (Chronos). Evaluates point accuracy, computational cost, and few-shot learning curves at varying context lengths.

Time Series PyTorch Chronos Benchmarking

Skills & Languages

Programming & Scripting

Python
R
SQL
Bash
C/C++

Frameworks & APIs

FastAPI
Django
Flask
RESTful APIs

Machine & Deep Learning

PyTorch
TensorFlow
Scikit-learn
XGBoost
Keras
PyCaret
LLMs / RAG
FGSM/PGD
MITRE ATT&CK
Genetic Algorithms
Diffusion & VAE

Security Tooling

Splunk
Wazuh SIEM
Suricata IDS
Sigma Rules
OWASP
Digital Forensics
Threat Modeling
CTF Operations

DevOps & Cloud

AWS
Docker
Kubernetes
GitHub Actions CI/CD
Azure
Prometheus/Grafana

Data Science & Analytics

NumPy
Pandas
SciPy
Matplotlib
Seaborn
Plotly
GeoPandas

NLP & Computer Vision

NLTK
SpaCy

Visualization & BI

Tableau
Power BI
Advanced Excel

Languages

English (Fluent)
Hindi (Fluent)
Spanish (Basic)

Certifications

Cybersecurity

(ISC)² Certified in Cybersecurity (CC)

ISC2 — Active

(ISC)² CISSP

In Progress — Target May 2026

Career Essentials in Cybersecurity

Microsoft and LinkedIn

Data Science & Analytics

Data Science Specialization

Johns Hopkins University

Data Analytics Certification

Google

Professional Data Science Certification

IBM

AI & Deep Learning

Deep Learning: Neural Network, AI, ChatGPT

Industry Certification

Deep Learning and Computer Vision

Industry Certification

Mathematical Foundations of Machine Learning

Industry Certification

Artificial Intelligence: Building AI + LLM and ChatGPT

Industry Certification

Programming

Python Specialization

University of Michigan

Cloud Computing

Amazon Web Services Certification

Amazon

Get In Touch

Seeking research scientist, ML engineer, and cybersecurity engineer opportunities

Location

Dartmouth, MA, USA

Open to Opportunities

STEM OPT eligible with 3 years of U.S. work authorization. Available to start Summer/Fall 2026. Interested in discussing roles, collaborations, or my research? Let's connect.