Namaste 👋🏾 ~
I’m a final-year student at Ramaiah Institute of Technology pursuing my Bachelor’s of Engineering in Computer Science and Engineering. From when I wrote my first Python script at 14, I have come to realize that the programming world is no more about the basic nuances of it but is developing practical applications that would help in the protection of private information and sensitive data. Beyond academics, I have consistently contributed to advancing knowledge and sharing expertise in fields like cybersecurity, network security, and open-source software (FOSS).
Research Intrests
Keywords: Computer Networks, Computer Security, Privacy preserving Technologies, Measurements and Performance Analysis
My research interests lie at the intersection of cybersecurity, privacy, and network security, with a strong focus on designing resilient and privacy-preserving systems. I am particularly interested in analyzing and mitigating security threats in IoT networks, ensuring robust encryption, access control mechanisms, and efficient key exchange protocols for resource-constrained devices. My work also explores privacy-preserving technologies, including anonymity networks like Tor, to safeguard user identities, enhance censorship resistance, and measure the effectiveness of different obfuscation techniques. Additionally, I am fascinated by network security, particularly in detecting and defending against cyber threats, optimizing secure protocols, and fortifying critical infrastructure. A key aspect of my research involves security and privacy measurements—evaluating attack surfaces, analyzing real-world traffic patterns, and assessing the effectiveness of defense mechanisms through empirical studies. By bridging the gap between theoretical security models and real-world applications, my research aims to develop practical solutions for enhancing privacy and security in modern digital ecosystems.
Publications
Cryptographic Bastions
published as a book chapter in Cloud Security: Concepts, Applications, and Practices (1st ed.) (CRC Press) Authors: Het Joshi, J.S. Murthy, G. M., S., & G., S.K. (Eds.) DOI: 10.1201/9781003455448
CHARGE GUARD: Early Detection of DDoS Attacks at EV Charging Stations Using Lightweight Micro Neural Network
published as a patent (Government of India, Patent No. 31/2024) Authors: Manjula L, G. T. Raju, Chethana H. R., Rajan M. A., Shashidhar H. R., Soumya C. S., Akshatha S. Bayyar, Het Joshi Rutul Publication Date: 02/08/2024 Application No. 202441056189
CyberGuard EV: Enhanced DDoS Defense in Charging Networks Using Lightweight Micro Neural Networks
accepted for publication in Algorithms for Intelligent Systems (Springer Journal) Authors: Manjula L, G. T. Raju, Chethana H. R., Het Rutul Joshi
Career Highlights
Here are some highlights of my journey so far:
Founder
of Mukti, the largest Free and Open Source Software (FOSS) community in Karnataka, with over 1,200 active members nationwide. Mukti has conducted nationwide workshops and seminars on cybersecurity, AI, and emerging technologies in collaboration with prestigious institutions such as IIT Bombay - Trust Lab and organizations like FOSS UNITED, FSMK.Delivered keynote speeches, webinars, and workshops
at IndiaFOSS 2023 and 2024, IEEE TechFest 2023, FOSSMeet 2024, and for the IEEE Bangalore Chapter.- Awarded the Top Speaker at FOSSMeet 2024 for my impactful presentations and workshops.
- Currently working as a
Security Research Intern
at IIT Bombay - Trust Lab , focusing on network security, privacy, communication protocols, and performance analysis of emerging technologies.
Notable Projects
Here are some standout projects I’ve worked on:
- Post-Quantum Safe IoT Framework: Developed a secure framework for resource-constrained devices, integrating CRYSTALS-Kyber for quantum-safe encryption.
- RAIDing the Fort: Framework demonstrating security vulnerabilities for storage area networks with RAID systems and Fiber Channel connections.
- WhatsAppUnsaved: An app allowing users to text unsaved numbers directly on WhatsApp.
- Netra and LokDrishti : Automated incident response and log monitoring solutions that can be deployed for no-cost with optimal performance.