Download Curriculum Vitae - ASU People Search

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Next-Generation Secure Computing Base wikipedia , lookup

Unix security wikipedia , lookup

Cyberwarfare wikipedia , lookup

Information security wikipedia , lookup

Airport security wikipedia , lookup

Cross-site scripting wikipedia , lookup

Cloud computing issues wikipedia , lookup

Cyberattack wikipedia , lookup

Wireless security wikipedia , lookup

Hacker wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Distributed firewall wikipedia , lookup

Cybercrime wikipedia , lookup

Social engineering (security) wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Security-focused operating system wikipedia , lookup

Mobile security wikipedia , lookup

Computer security wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
ANKUR CHOWDHARY
Apt.29, 1700 S College Ave. Tempe AZ-85281
Ph: +14803528446
[email protected]
I am a computer science doctorate student at ASU specializing in Information Security and Data Science with two years of
corporate experience. I have hands on experience in network security, network protocols, security analysis and application
development. My research work has been accepted in several reputed research conferences. I am motivated and have strong
problem solving skills.
CERTIFICATIONS
 Oracle Certified Professional, Java SE 6
 Oracle Certified Expert, Java EE 6 Web Component Developer
 Red Hat Certified Engineer
 R Programming (John Hopkins University)
EDUCATION
PhD (Computer Science) Arizona State University, Tempe GPA (3.76)
Aug 2015-Present
MS (Computer Science) Arizona State University, Tempe GPA (3.53)
July 2013-June 2015
THESIS: A Secure Mobile SDN (Software Defined Network) based BYOD (Bring Your Own Device) Framework using KVM
Virtualization under mentorship of Dr. Dijiang Huang.
B.Tech (Information Technology) GGSIPU, Delhi
GPA (3.68)
July 2007- June 2011
WORK EXPERIENCE
Blackberry Ltd. (Security Assurance R&D Intern)
May-August 2016
 Quantified and measured system security using static analysis tools and formal methods.
 Implemented Machine Learning algorithms using R to identify security vulnerability related code features.
 Introduced novel sampling techniques for training ML algorithms to reduce false positives in identifying security
vulnerabilities.
Republic Services (Information Security Intern)
June-August 2015
 Designed scan policies for vulnerability scans in Nessus.
 Programmed security threat alerts and correlation analysis dashboards in SPL(Splunk Programming Language)
 Conducted Proof of Concept analysis for Cisco Firesight Security Suite based on SourceFire.
CSC India (Associate Software Engineer)
June 2011- July 2013
 Coded customer enhancements for Insurance Domain product POINT IN in Java using SOAP/RESTful APIs;
 Developed automation tools using Java Struts framework that reduced running time of Daily Batch cycle by 20%.
 Designed Databases using RDBMS and developed presentation layer using HTML, JavaScript, CSS, jQuery, JSON.
 Utilized Scrum SDLC framework to develop frameworks for life cycle management of client applications.
Teaching Assistant (CSE468/CSE 548/ CSE434/CSE546) under Dr. Dijiang Huang
Spring 2015-Present
 Responsible for designing labs for Network Security, System Security and Cryptography using Openstack framework.
ACADEMIC PROJECTS
Software Security
CSE545
Spring 2016
 Designed secured communication layer by modification of frame format of IP, TCP and UDP layer using Scapy.
 Implemented Automated and Precise Cross Site Script (XSS) generator for Web Application testing in python.
 Simulated malicious web server client to identify vulnerabilities in code of python based Web Server.
 Solved catch the flag challenges including directory traversal, buffer overflow and Path based vulnerabilities.

SDN Based IDPS in Cloud
CSE548(Advanced Computer Networks Security) Apr 2014
 Configured intrusion detection system to detect and prevent network attacks in SDN cloud system (OpenStack) by
monitoring traffic through OpenvSwitch (OpenFlow) using Snort as an anomaly and signature detection tool.
 Analyzed risk using MulVAL and NVD. Generated attack graph using Nessus, CVE, CVSS and network information to
predict future attack vectors in cloud network and to make intelligent security decisions.



Implemented countermeasure strategies and actions in an OpenFlow SDN POX controller on OpenvSwitch to process
the suspicious traffic with focus on denial of service attacks.
DoS Attacks Against Floodlight SDN
CSE534(Advanced Computer Networks) May 2014
 Simulated Detection and Prevention of Data Plane and Control Plane Attacks against Floodlight SDN Controller on
Mininet Platform.
 Coded REST APIs and utilized JSON to push flows in flow table of Controller to block/redirect/control flows using
static network firewall.
 Implemented DoS Attack Detection and mitigation on GENI platform.
ownCloud ISCSI Application
CSE591(Cloud Computing) Nov 2013
 Developed iSCSI storage as a service (SaaS) application and deployed on ownCloud cloud platform hosted on ASU
MobiCloud virtualization platform using PHP LAMP. Used JIRA for Bug Tracking.

Search Engine Implementation
CSE 598/494 (Information Retrieval, Mining and Integration) Mar 2015
 Implemented clustering using K-means approach to classify the search results of same query into different clusters
using Lucene API on crawled documents.
 Implemented Authorities/Hub computation and PageRank for all files from crawled corpus and conducted Link
Analysis.
 Analyzed the stability and robustness of each technique to random perturbation and adversarial changes to the web
structure and designed UI using Java Spring Framework.

Pole Balancing on Unmanned Aerial Vehicle using CMAES
CSE 591 (Advances in Robots Learning) Oct 2015
 Implementing pole balancing in 2D plane using ROS framework. The environment simulated using Gazebo and RViz.
 States of system are represented as neural network and CMA-ES (Covariance Matrix Adaptation Evolutionary
Strategy) is used as learning algorithm to optimize objective function weight with respect to expected rewards.

Neural Network Classifier/Protégé/CLINGO
CSE 571 (Artificial Intelligence) Oct 2015
 Implementation of Neural Network based Perceptron and MIRA classifiers to classify test data to correct labels.
 Using Protégé for simulating OWL and Ontologies for knowledge representation.
 Simulated Answer Set Programming in CLINGO framework for deriving the models associated.
AWARDS
 Computer Science Outstanding Teaching Assistant (2016) – ASU
PUBLICATIONS
 SDN based scalable MTD solution in Cloud Networks, in Proceedings of 3rd ACM Workshop on Moving Target Defense
(MTD), 2016.
 Security Policy checking in Distributed SDN Clouds, in Proceedings of IEEE Conference on Communications and
Network Security (CNS), 2016.
 VCBots: A vehicular Cloud Computing testbed with Mobile Robots, in Proceedings of ACM MobiHoc Workshop on
Internet of Vehicles and Vehicles of Internet (IoV-VoI), 2016.
 Software Defined Stochastic Model for MTD, in proceedings 3rd International Afro-European Conference for Industrial
Advancement (AECIA), 2016.
 Secured Mobile SDN (Master’s Thesis), 2015.
TECHNICAL SKILLS
Languages: Java, Python, R Programming Language, CSS, AJAX, JSON, C, C++, SQL, PHP, Shell Scripting, Octave.
Tools and Technologies: Openstack, Splunk, Hibernate, Android APIs, REST, MySQL, JSP, Apache, Hadoop, MVC, Agile, LAMP,
XAMMP, Opendaylight, Cloud Computing, ownCloud.
Networks and Security: Scapy, OpenvSwitch, Nessus, NVD, Metaspoilt, OpenFlow, Pen Testing, SDN, Snort, IDS, IPS,
VPN, Socket Programming, VMWare, Firewall, Burp Suite, Mininet.
Repository Management Tools: GIT, SVN, JIRA, perforce, yocto, rpm, yum, apt.