A structured cybersecurity research project focused on designing, validating, and benchmarking detection capabilities in distributed cloud-native environments.
- Designed distributed cloud architecture
- Defined trust boundaries
- STRIDE analysis
- Attack surface identification
- Simulated SSH brute-force attacks
- Validated Wazuh SIEM detection
- Confirmed log ingestion and alerting
- Verified end-to-end detection pipeline
- Conducted attack simulations using Hydra
- Validated SIEM detection behavior
π View Work:
docs/week7-8-detection-validation/
- Reviewed research aligned with leading academics
- Identified gaps in detection performance evaluation
- Defined research problem direction
π View Work:
docs/week9-10-literature-review/
This project is evolving toward:
A reproducible framework for empirical detection benchmarking in distributed cloud systems
- Wazuh SIEM
- Kali Linux
- Ubuntu Desktop
- Hydra (attack simulation)
- VirtualBox
π Lab01-SecureDistributedCloud
β
βββ π README.md
β
βββ π docs
β β
β βββ π 00-research-assets
β β βββ π diagrams
β β β βββ secure-cloud-architecture.drawio
β β β βββ week1-architecture-v1.1.png
β β β βββ threat-model-attack-surface-week3.png
β β β
β β βββ π screenshots
β β βββ π week5-control-validation
β β βββ π week6-extended-analysis
β β βββ π week7-8-detection-validation β
β β
β βββ π week1-2-architecture
β βββ π week3-4-threat-modelling
β βββ π week5-6-control-validation
β β
β βββ π week7-8-detection-validation β
β β βββ week7-8-detection-validation.md
β β
β βββ π week9-10-literature-review β
β βββ week9-10-targeted-literature-review.md
# π Licence
Academic and research use.
---
# π€ Author
Charles Owajoba
Cybersecurity | Cloud Security | Detection Engineering
---
# π Vision
Bridging the gap between:
> Secure system design
and
> measurable detection effectiveness