Securing cyberspace needs innovative mathematical concept models that consider practical scenarios such as incomplete/imperfect information and imperfect monitoring. Moreover, the wireless network security has its challenges such as as node mobility, situation awareness, and computational complexity that are critical to its success. Furthermore, for making decisions on security investments, special attention should be given to the accurate value-added quantification of network security. New computing paradigms, such as cloud computing, should also be investigated for security investments.
The security landscape is becoming more sophisticated with the emergence of new communication technology platforms and information, such as mobile computing, cloud computing, online social networks, cyber physical system and the Internet of Things (IoT). The persistence, complexity, and capabilities of todays adversaries are limitless, and their threat does not only affect individuals or organizations, but also nations.
Traditional firewalls are not sufficient to ensure the security of computer networks. Due to the interconnection of numerous networks, cyberspace is becoming vulnerable to cyber attacks. There is a need to strike a balance between firewalls and other protective mechanisms. Amongst these mechanisms, intrusion detection and the profiling of attackers are mostly used despite their limitations. However, some data mining techniques such as deep neural networks or clustering and machine learning can be used. The use of Process mining techniques combined with game theoretic concepts can bridge the gap for discovering security breaches and learning the attackers’ modus operandi.
This research opportunity is interested in applying new techniques such as Category theory, channel theory, control theory and information flow to tackle threat in the cyber domain. The aim to provide solutions or modeling approaches to aid decision-making. The associates will work in relation to the AFRL/RI in-house basic research project entitled “Strategic And Tactical Utility Running Nonstop - SATURN” that is funded by AFOSR.
Reference:
H. Zhao, et al., “Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection”, IEEE Transactions on Dependable and Secure Computing, TDSC.2018.2864733, August 2018.
C. Kamhoua, et al., “Modeling and Design of Secure Internet of Things”, Wiley-IEEE Computer Society, 1st edition, ISBN: 978-1119593362
Cyber Security; Cloud Computing; Hardware Security; Network Security; MANET; Game Theory; Category Theory; Cyber Threat Information; Information Theory; Channel Theory; Control Theory; Machine Learning; Deep Learning; Blockchain Technology; Internet of Things