Canary Token Implementation
In this project, I set up and managed canary tokens within a controlled network environment to act as deceptive triggers for detecting unauthorized access. I monitored the alerts generated when these tokens were triggered and carefully reviewed the event data to distinguish between false positives and genuine security incidents. This involved classifying alert types, annotating suspicious activities, and contributing to building accurate datasets for threat detection. The experience strengthened my skills in event log analysis, classification, and security incident annotation—key tasks that support AI training for cybersecurity systems.