Simulating the Internet
Introduction Simulating the Internet involves creating realistic network topologies and using simulation environments to study various network behaviors and protocols. The Internet is a vast and c...
Introduction Simulating the Internet involves creating realistic network topologies and using simulation environments to study various network behaviors and protocols. The Internet is a vast and c...
Introduction The Internet has come a long way from being just a few interconnected machines to a behemoth of billions of devices spread across the globe. It comprises independently operated networ...
Recently, I worked on a project to simulate the Internet, observe the effects of BGP (Border Gateway Protocol) poisoning on ASes (Autonomous Systems), and understand how effective it is for topolog...
Introduction In today’s interconnected world, the ubiquity of mobile applications comes with heightened concerns over privacy, particularly regarding the use of sensitive resources like cameras an...
Introduction In our rapidly evolving digital age, the proliferation of advanced deep learning models has ushered in a transformative era of benefits across various sectors. Machine learning, a cor...
Overview I studied the BETH Dataset to implement and evaluate various anomaly detection methods. The dataset comprises 8,004,918 events, and each record contains a label called “sus”, which indica...
Overview This report presents the implementation and evaluation of various algorithms and transformers on the SMSSpamCollection dataset. The dataset comprises unstructured text data, which we prep...
Introduction As we integrate Artificial Intelligence (AI) systems more deeply into our everyday lives and crucial fields like cybersecurity, we encounter their immense potential and looming challe...
Overview This report summarizes the implementation and evaluation of a K-Means clustering algorithm on the Iris and Wine datasets. A standard Euclidean distance metric and a weighted Mahalanobis d...
Overview This project uses a deep neural network to classify network traffic into benign and malicious categories. The model can detect various types of attacks, such as denial of service, distrib...