Cyber Security

Overview:

Network, Host and Virtual Machine and Wireless Security: Our research focuses on network security, host security, VM security, wireless security to protect the cyberspace (Typical diagram of any organization is as shown in Figure 1). Network or perimeter security can protect network from outside attackers. Over 60% attacks are generated from inside of the network. In addition to perimeter security, host (including virtual) security adds another layer of security to protect entire network and  infrastructure.  Virtual machines are easy to clone or delete, so security related to virtual host and network is another  important aspect of cyber security. Most of the organizations these days have wireless network which opens another door for attackers. Thus wireless security is another dimension we need to consider while dealing with cyber security. Furthermore, wireless networks are ubiquitous, inexpensive, and anyone can setup a wireless network. In wireless network, vulnerability of security and privacy are major concerns to protect from malicious actions. In infrastructure based wireless networks, presence of rogue wireless access points create challenging security issues. Whereas in infrastructure-less wireless networks (such as VANETs, MANETs, Sensor Networks), establishing and maintaining security, privacy and trust among precipitating nodes are central problems.

Our research focuses on all aspects of cyber security including proactive real-time intrusion prevention systems (IPS) and intrusion detection systems (IDS) using machine learning and artificial intelligence, network segmentation, controlled wireless propagation, authentication, authorization, certification. The proposed solutions comprised of scalable, resilient, and adaptive cyber security/defense techniques for 
  • Network Security
  • Host Level Security 
  • Virtual Machine Security 
  • Wireless Security.




Figure 1: Network, Host , Virtual Machine and Wireless Security. .


Personnel: 
  • Dr. D. B. Rawat
  • Dr. C. Bajracharya
  • Dr. G. Yan
  • Dr. B. B. Bista


Publications:
    • T. Amin, D. B. Rawat and M. Song, "Performance Analysis of Secondary Users in the Presence of Attackers in Cognitive Radio Networks," Proc. of IEEE GLOBECOM-2015, San Diego, CA, USA, Dec. 6 - 10, 2015
    • S. Reddy, I. Cushman, D. B. Rawat, and M. Song, “Securing Real-time Opportunistic Spectrum Access in Cognitive Networks Against Malicious Secondary Users,” to appear in Proc. of IEEE GLOBECOM Workshop on Security, Privacy, and Forensics in Wireless Mobile Ad Hoc Networks and Wireless Sensor NetworksSan Diego, CA, USA, Dec. 6 - 10, 2015.
    • R. K. Sharma and D. B. Rawat, "Advances on Security Threats and Countermeasures, for Cognitive Radio Networks: A Survey," IEEE Communications Surveys and TutorialsVol. 17, No. 2, pp. 1023 - 1043, 2015..
    • Danda B. Rawat, Bhed B. Bista and Gongjun Yan, Eds. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications. IGI Global, October 2013. Preview at Barnes & Noble.
    • D. B. Rawat and C. Bajracharya, "Detection of False Data Injection Attacks in Smart Grid Communication Systems," IEEE Signal Processing Letterspp. 1652 - 1656, Vol. 22, No. 10, 2015. 
        • Danda B. Rawat. Computer and Network Security: An Experimental Approach, CS Publishing, April 15, 2013. Preview at Barnes & Noble
        • D. B. Rawat and M. Song, "Securing Space Communication Systems Against Reactive Cognitive Jammer," Proc. of the 2015 IEEE Wireless Communications and Networking Conference (IEEE WCNC 2015), New Orleans, LA USA, on 9 – 12 March 2015. 
          • Danda B. Rawat, Gongjun Yan, Bhed B. Bista and Vigs Chandra, "Wireless Network Security: An Overview,"In Building Next-Generation Converged Networks: Theory and Practice, A.-S. Khan Pathan, M. M. Monowar and Z. Md. Fadlullah, Eds. CRC Press, Taylor & Francis Group, USA, 2012.
          • Gongjun Yan, Danda B. Rawat, Bhed B. bista and Lei Chen, "Location Security in Vehicular Wireless Networks," In Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, Danda B. Rawat, Bhed B. Bista and Gongjun Yan, Eds. IGI, 2013. 
          • Gongjun Yan, Danda B. Rawat, Bhed B. Bista and Awny Alnusair,, "Privacy Protection in Vehicular Ad-hoc Networks," In Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, Danda B. Rawat, Bhed B. Bista and Gongjun Yan, Eds. IGI, 2013. 
          • Danda B. Rawat, G. Yan, B. B. Bista and M. C. Weigle , "Trust On the Security of Wireless Vehicular Ad-hoc Networking," in Ad Hoc & Sensor Wireless Networks (AHSWN) Journal, (Impact Factor 0.41) to appear. 
          • Gongjun Yan, Weiming Yang, Jingli Lin, Danda B. Rawat, "Cross-layer Location Information Security in Vehicular Networks," JNIT: Journal of Next Generation Information Technology, Vol. 3, No. 2, pp. 37 ~ 56, 2012.
          • Gongjun Yan, J. Lin, Danda B. Rawat, and W. Yang. A Geographic Location-based Security Mechanism for Intelligent Vehicular Networks, Communications in Computer and Information Science, 1, Volume 135, Intelligent Computing and Information Science, Pages 693-698, 2011. 
          • Danda B. Rawat, G. Yan, B. B. Bista and M. C. Weigle , "Trust On the Security of Wireless Vehicular Ad-hoc Networking," in Ad Hoc & Sensor Wireless Networks (AHSWN) Journal, (Impact Factor 0.41) to appear. 
          • Danda B. Rawat, Sachin Shetty and Khurram Raza, "Secure Radio Resource Management in Cloud Computing Based Cognitive Radio Networks" In proceedings of The 4th International Workshop on Security in Cloud Computing, Pittsburgh, PA, USA, Sept. 12, 2012!(CloudSec 2012), September 12, 2012, Pittsburgh, PA, USA. 
          • Gongjun Yan, Bhed B. Bista, and Danda B. Rawat, "General Active Position Detectors Protect VANET Security," In Proceedings of the Sixth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2011). Barcelona, Spain, October 26-28 2011.










                             free hit counter