The emergence of Automatic Dependent Surveillance-Broadcast (ADS-B) caused a revolution in Air Traffic Control and surveillance thanks to the numerous benefits this protocol provides, especially when compared to traditional surveillance technologies. However, several security experts criticized its open broadcast of clear text messages which can be exploited by attackers. This talk sheds the light on ADS-Bsec framework that ensures the authenticity and integrity of ADS-B messages with the particular focus on the key management module that represents the cornerstone of the whole approach.
The Department of Computer Science and Information Technology's strategic plan is to establish the Cyber Security Research and Development (CSRD) Center. The mission of CSRD is to prepare undergraduate and graduate students with innovative and comprehensive educational experiences and enhance cybersecurity research to solve complex cybersecurity problems. CSRD will provide opportunities for world-class education, research, workforce development, and community engagement to address the challenges of securing the nation’s cyber systems. Participants of this talk will learn about the latest developments and plans for cybersecurity education and research in the Department of Computer Science and Information Technology.
In wireless communication systems, denial-of-service (DoS) attacks launched by jammers target the availability security goal and degrade the system performance. Existing work discuss numerous countermeasure techniques including frequency channel hopping and transmission power control. However, they mainly adopt optimization-based methods and rely on acknowledgement information as well as prior knowledge of the attacker’s attack policy. In addition, these methods lag behind in designing efficient channel switching schemes. To relax this constraint, in the first part of this talk, I will present a novel adversarial multi-armed bandit (MAB) for channel access policy of the transmitter to combat against the attacks while providing a provable system performance guarantee. In the second part, I will discuss an application of adversarial MAB frameworks in cooperative adaptive cruise control (CACC) system security. In this application, we consider both vehicles and jammer employ MAB frameworks to access the wireless channels for data packet transmission and attack, respectively. Then, we derive the CACC stability condition with respect to the minimum packet loss probability, the number of wireless channels, and the number of channels attacked by the jammer. Numerical evaluations validate our theoretical analysis.
Analyzing network traffic data to detect suspicious network activities (i.e., intrusions) requires tremendous effort due to the variability of the data and constant changes in network traffic patterns. In this talk, Dr. Jeong presents his reserach activities focusing on utilizing various interactive visual anlytics techniques for understanding and identifying intrusive network events.
Hosted at the University of the District of Columbia
Location: Virtual
4200 Connecticut Avenue NW
Washington, DC 20008