{"id":63,"date":"2023-07-16T19:27:54","date_gmt":"2023-07-16T19:27:54","guid":{"rendered":"https:\/\/www.vrkaushik.com\/?page_id=63"},"modified":"2024-03-02T14:59:46","modified_gmt":"2024-03-02T14:59:46","slug":"projects","status":"publish","type":"page","link":"https:\/\/www.vrkaushik.com\/?page_id=63","title":{"rendered":"Projects"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/vrkaushik\/Threat-Intelligence-Security-Solution\">Threat Intelligence Security Solution <\/a><\/h2>\n\n\n\n<p>Implemented and end-to-end security solution by setting up OpenCTI for Threat Intelligence Sharing and Wazuh for intrusion detection, to enhance resilience against cyber threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/vrkaushik\/SCA-Platform\">Software Composition Analysis Platform<\/a><\/h2>\n\n\n\n<p>Set up a Software Composition analysis platform using Dependency Track, for ingesting SBOMs using Trivy, and automating vulnerability scans for Github Repositories. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/vrkaushik\/Crytptographic-Digital-Envelope\">Cryptographic Digital Envelope<\/a><\/h2>\n\n\n\n<p>Implemented a Secure group file sharing cryptosystem that enacted the CIA triad. OpenSSL enforced a combination of symmetric cryptography, asymmetric cryptography and hashing algorithms<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/vrkaushik\/NIDS\">Network Intrusion Detection System<\/a><\/h2>\n\n\n\n<p>Developed a machine learning model using a decision tree classifier that analyzes an open source NSL KDD dataset and predicts various types of intrusions based upon previous data patterns.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Centralized FreeIPA Client-Server Authentication<\/h2>\n\n\n\n<p>Established centrally managed SSH Authentication, Host-based Access Control (HBAC) and Role-based Access Control (RBAC) between Server and clients on Linode.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Flask Based Web Application <\/h2>\n\n\n\n<p>Built a user interactive website that queried on a University database. It was linked to the database in My-SQL Workbench and built using the FLASK Python Framework.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat Intelligence Security Solution Implemented and end-to-end security solution by setting up OpenCTI for Threat Intelligence Sharing and Wazuh for intrusion detection, to enhance resilience against cyber threats. Software Composition Analysis Platform Set up a Software Composition analysis platform using Dependency Track, for ingesting SBOMs using Trivy, and automating vulnerability scans for Github Repositories. Cryptographic [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages\/63"}],"collection":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=63"}],"version-history":[{"count":4,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages\/63\/revisions"}],"predecessor-version":[{"id":124,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages\/63\/revisions\/124"}],"wp:attachment":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}