Project Title: Strengthening IIOT Cyber Security through SSH and VPN Integration
Role: Project Lead
Overview: This project addresses the critical need for robust cybersecurity in Industrial Internet of Things (IIOT) environments. As the project lead, I guided a team of four members to develop an innovative solution to secure IIOT systems by integrating Secure Shell (SSH) and Virtual Private Network (VPN) technologies within the Amazon Web Services (AWS) platform.
Key Contributions:
Lead the design and implementation of a secure communication framework for IIOT devices using SSH and VPN technologies.
Oversaw the configuration of Virtual Private Cloud (VPC), VPN tunnels, and security groups to ensure secure and scalable network infrastructure.
Managed the project timeline, coordinated team activities, and ensured the successful completion and final presentation at the NIRAL Thiruvizha Hackathon, hosted by Anna University Regional Campus, Madurai.
Technologies Used:
AWS Services: Amazon EC2, Amazon VPC
Security Protocols: SSH, VPN
Tools: Wireshark, Nessus
B.E FINAL YEAR PROJECT
Project Title: Comprehensive Active Directory and DHCP Server Configuration
Tools Used: Windows Server 2019, VirtualBox, Windows 10 Pro
Project Overview: This project involved the design and implementation of an Active Directory (AD) infrastructure on Windows Server 2019 within a VirtualBox environment. The server was configured as a DHCP server, handling IP address allocation for a secured internal network. The project aimed to simulate a real-world enterprise environment, providing both internet connectivity and internal network management.
Key Configurations:
Active Directory Domain Services (ADDS):
Established a robust Active Directory structure, creating a domain controller to manage network resources and user accounts. This included setting up organizational units (OUs) and configuring group policies to manage the internal network.
NAT/RAS (Network Address Translation/Remote Access Service):
Implemented NAT to enable the internal network to access external resources while maintaining security. Configured RAS to allow remote access to the network, simulating a secure remote working environment.
DHCP (Dynamic Host Configuration Protocol):
Configured the DHCP service on the domain controller to automatically allocate IP addresses to devices within the internal network. This setup ensures efficient IP management and reduces the potential for address conflicts.
Routing and Remote Access:
Configured the server as a router, managing traffic between the internal network and the internet. Implemented remote access capabilities, allowing secure connections from external devices to the internal network.
Subnetting:
Designed and implemented subnetting to segment the network, optimizing performance and enhancing security within the internal environment.
Windows 10 Pro Client Configuration:
Added a Windows 10 Pro machine to the internal network within VirtualBox.
Configured the client to receive an IP address automatically from the DHCP server (domain controller).
Ensured the client had seamless internet access via the domain controller, demonstrating successful network and server configuration.
Outcome:
The project resulted in a fully functional network environment where a Windows 10 Pro client was able to interact with the Active Directory, receive IP configuration automatically, and access the internet through the domain controller. This setup reflects a typical enterprise network environment, showcasing advanced skills in server and network administration.
Self-initiated project
Project: Vulnerability Assessment and Patching using nessus
Tools Used: Nessus, VirtualBox, Windows 11
Overview: Conducted a comprehensive vulnerability analysis on a sandboxed Windows 10 virtual machine using Nessus. Identified and patched critical security issues, ensuring the system's integrity and security.
Details: The project involved setting up a secure testing environment in VirtualBox, running a full vulnerability scan with Nessus, analyzing the results, and implementing the necessary patches. The virtual machine was sandboxed to prevent any potential threats from affecting the host system, ensuring a controlled and secure testing process.