My research endeavor centered around developing Security Analytics for Distributed Threat Hunting and Critical Security Control Enforcement Assessment. I developed a hierarchical event monitoring system for distributed threat hunting using low-level log (Windows ETW) Analysis, Provenance Graph Analysis, Bayesian network, NLP, and Deep learning techniques.

Another goal of my research is to determine what to measure (observables), how to measure (tools required), and metrics to assess the enforcement of CIS’s critical security controls. I used prompt engineering techniques (Few-shot learning, Chain-of-Thought, Tree-of-Though) with LLM (ChatGPT, LLAMA) to extract that information from the CIS CSC guidelines. I extensively used MITRE ATT&CK framework, ElasticSearch, and RabbitMQ in my work.

Prior to starting my Ph.D. at UNC Charlotte, I worked at Kona Software Lab Ltd., Dhaka, Bangladesh as a Software Engineer and Team Lead. During my time there, I gained valuable experience in core J2EE, NFC, PKI Systems, CA, and chip-based smart card technologies. My primary responsibility was to design and develop middleware libraries for PKI and CA systems. Additionally, I led a team of three software developers in designing and developing NFC-based smart card authentication for Windows OS.

I received my B.SC. in Computer Science and Engineering from CSE@BUET in February 2013.

I earned my Ph.D. in Computing and Information Systems from UNC Charlotte in March 2024.

I am currently looking for full time Research/SDE position in industry.

NEWS:

  • March 29, 2024: I successfully defended my Ph.D. Dissertation.
  • March 27, 2024: Our paper "Prompting LLM to Enforce and Validate CIS Critical Security Control" has been accepted at ACM SACMAT 2024. Recent.
  • October 11, 2023: Our paper "Ushoshi2023 at BLP-2023 Task 2: A Comparison of Traditional to Advanced Linguistic Models to Analyze Sentiment in Bangla Text" has been accepted at EMNLP 2023 Workshop BLP.
  • June 22, 2023: I presented our paper "SCAHunter: Scalable Threat Hunting through Decentralized Hierarchical Monitoring Agent Architecture" at Computing Conference 2023.
  • December 13, 2022: Our paper "SCAHunter: Scalable Threat Hunting through Decentralized Hierarchical Monitoring Agent Architecture" has been accepted at Computing Conference 2023.
  • April 14, 2022: I was awarded "Graduate School Summer Fellowship" by UNC Charlotte Graduate School to develop my dissertation on "Secutrity Analytics for Distributed Threat Hunting".
  • May 22, 2020: I was awarded "Proposal Development Summer Fellowship" by UNC Charlotte Graduate School.
  • April 3, 2019: I presented our poster "Measures and Metrics for the Enforcement of Critical Security Controls: A Case Study of Boundary Defense" at HOTSOS 2019.
  • November 10, 2018: Our poster "Statistical Learning of APT TTP Chains from MITRE ATT&CK" is accepted at ACSAC 2018.
  • October 22, 2018: Our paper "gExtractor: Towards Automated Extraction of Malware Deception Parameters" has been accepted at SSPREW 2018.
  • July 10, 2018: Our paper "A Poisoning Attack against Crypto-currency Mining Pools" has been accepted at CBT Workshop, ESORICS 2018.
  • August 19, 2017: Our paper "TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources" has been accepted at ACSAC 2017.