About me
Step into a world where digital fortresses stand tall and unseen guardians shield our data from the nefarious hands of cyber threats. Welcome to my cyber realm, where passion and curiosity intertwine to create an unyielding love for the ever-evolving field of cybersecurity.
Hello, I'm Sumedh Joshi, as a Master of Science student in Information and Cyber Security at Purdue University, I've had the opportunity to delve deep into various aspects of this ever-evolving field and I'm thrilled to share my journey as a cybersecurity enthusiast with you.
I actively engage in research, projects, and publications related to cybersecurity. Currently, I'm involved in an interesting research at Purdue University, working with Dr. Elisa Bertino on a host-based agent for Zero-Trust Architecture Network. This project aims to provide critical insights into network and process behavior, facilitating policy generation and dynamic authorization.
One of my notable projects, the Signature-Less Ransomware Detection and Mitigation System, demonstrates my ability to develop innovative solutions. Through extensive research and collaboration with Dr. Aarti Agarkar, I achieved a detection rate of over 95% for tested ransomware attacks on Windows operating systems. Such initiatives reflect my dedication to staying ahead of the curve in cybersecurity advancements.
What i'm doing
-
Cyber Security
Exploring and learning new things in this field everyday.
-
Software Development
I love developing more secure applications and providing software solutions.
-
Catch the Flag (CTF)
Sharpening my cybersecurity skills through practical problem-solving.
-
Research
Engaging in security research enables practical industry-focused solutions for real-world impact.
My skills
-
Programming Languages: Python, C, C++, Bash
90% -
Cloud technologies: AWS, Kubernetes, Docker
70% -
Database: SQL, Mongodb
90% -
Security Knowledge: OWASP 10, Web & Software security, Fuzzing(AFL, AFL++)
70% -
Network Security: Protocols(TCP/IP, DNS, TLS, UDP, HTTP, IPSEC), Zero Trust
80% -
Security Tools: GHIDRA, IDA Pro, Nmap, pwntool, Wireshark, Burpsuit, Metasploit
80% -
Security Frameworks: NIST, ISO 27001
70%