Skip to content

PsalmTech/Cybersecurity-Realtime-Project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Portfolio Banner

Cybersecurity Realtime Projects

Welcome to my Cybersecurity Portfolio — a curated collection of my hands-on projects, research, and learning milestones in cybersecurity, machine learning, and threat intelligence. These works were developed during the 3MTT Nigeria program, personal R&D, and my M.Sc in Computer Science.

Each project highlights a specific challenge in the cybersecurity landscape — from real-time detection of fake alerts to threat intelligence automation and ML-based attack prediction.


Table of Contents

  1. 3MTT Projects
  2. Advanced Cybersecurity Research
  3. Contact & Collaboration

1. 3MTT Projects

Explore practical challenges tackled during the 3MTT Cybersecurity Cohort, including demonstrations and thought-provoking insights.

View Folder on Google Drive »

Highlights:

  • Packet Sniffing with Wireshark
    Capturing and analyzing network traffic using Wireshark to detect suspicious activity.
    Tools: Wireshark, TCP/IP protocols

  • Fake Bank Alert Detection & Awareness
    Investigating common mobile fraud schemes and demonstrating how to spot fake transaction alerts.
    Tools: Social Engineering Analysis, Device Forensics

  • Hackathon 2.0 Winner – Ekiti State
    My team emerged as the grand prize winner, building a solution to a real-world cybersecurity problem within a limited time.

  • OSINT & Dark Web Monitoring
    Utilizing open-source tools to gather intelligence from public and dark web platforms.

  • Career Growth & Personal Development
    Reflections on building a cyber path and personal growth throughout the 3MTT journey.


2. Advanced Cybersecurity Research

Detection of Vampire Attacks in WSNs Using Machine Learning

View Project Folder »

This master's research focuses on detecting vampire attacks—a type of resource-draining attack—in wireless sensor networks. It uses Random Forest and XGBoost for predictive modeling.

Contents:

  • Preprocessed Dataset: WSN-DS-Preprocessed.csv
  • Trained Models: best_rf_model.pkl, best_xgb_model.pkl
  • Performance Metrics:
    • Confusion Matrices
    • ROC Curves (Per-Class + Combined)
    • Classification Reports

Tools & Tech:

Python, Scikit-learn, XGBoost, pandas, matplotlib, Jupyter Notebook


Evaluation of Cyber Threat Intelligence Sharing Platforms

View Project Folder »

This project evaluates and compares CTI-sharing platforms such as AlienVault OTX and VirusTotal for their effectiveness in collaborative threat detection.

Key Files:

  • Real-time and combined datasets (cleaned_realtime.csv, cti_combined_dataset.csv)
  • Threat indicator expansion outputs
  • Jupyter Notebook for threat similarity analysis

Outcomes:

  • Comparative insights into CTI data quality
  • Similarity scoring and detection overlap evaluation

Contact & Collaboration

I’m open to collaborations, internships, or research opportunities in cybersecurity, machine learning, or digital forensics. Feel free to connect:


Note: Some project files (e.g., full source codes or detection tools) are available upon request for educational or collaborative purposes.


#3MTT #Cybersecurity #MachineLearning #CTI #Wireshark #WSN #DarkWeb #AI #Portfolio

About

Welcome to my Cybersecurity Portfolio — a curated collection of my hands-on projects, research, and learning milestones in cybersecurity, machine learning, and threat intelligence. These works were developed during the **3MTT Nigeria program**, personal R&D, and my **M.Sc in Computer Science**

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors