+  

Cybersecurity Awareness

One-day Virtual Workshop

(9 AM - 12 PM, September 2)

All people (including students, faculty and staffs) are welcome to participate in this workshop

Funded by Microsoft Corporation (a.k.a. MS)


INTRODUCTION


This workshop is to motivate the community (including students, faculty, and staff) at the University of the District of Columbia and make them become the nation's essential personnel in Cybersecuirty. It also focuses on supporting future Cybersecuirty workforce demands.
This MS-Funded Workshop is organized by SEAS faculty under the support of a Microsoft grant (Titled: Building Capacity in Cyber Security and Computer Engineering at UDC).
Recorded Workshop (Video)
Password: Please contact Dr. Jeong (djeong [at] udc.edu)

Programs in Detail


Program starts at 9:00 AM and lasts about 3 hours (9:00 AM - 12:00 PM).

9:00 - 9:40

Key Management Module for Air Traffic Surveillance

Dr. Kacem

The emergence of Automatic Dependent Surveillance-Broadcast (ADS-B) caused a revolution in Air Traffic Control and surveillance thanks to the numerous benefits this protocol provides, especially when compared to traditional surveillance technologies. However, several security experts criticized its open broadcast of clear text messages which can be exploited by attackers. This talk sheds the light on ADS-Bsec framework that ensures the authenticity and integrity of ADS-B messages with the particular focus on the key management module that represents the cornerstone of the whole approach.

school

9:40 - 10:00

Cybersecurity Research and Education at UDC

Dr. Wellman

The Department of Computer Science and Information Technology's strategic plan is to establish the Cyber Security Research and Development (CSRD) Center. The mission of CSRD is to prepare undergraduate and graduate students with innovative and comprehensive educational experiences and enhance cybersecurity research to solve complex cybersecurity problems. CSRD will provide opportunities for world-class education, research, workforce development, and community engagement to address the challenges of securing the nation’s cyber systems. Participants of this talk will learn about the latest developments and plans for cybersecurity education and research in the Department of Computer Science and Information Technology.

broken_image

10:00 - 10:40

Trends in cybersecurity

Dr. Girma

Cybersecurity trends have evolved considerably over the past few years. As hackers have become more adept at breaking through advanced firewalls, companies have had to update their systems. Millions around the globe are affected by data breaches, while cybercrime continues to run rampant. Cybersecurity is a major concern for businesses, individuals, and organizations alike.
Industry leaders and organizations are constantly looking at ways to improve cybersecurity as a whole and mitigate threats. With increased user awareness and training, and a focus on improving the security infrastructure as a whole, you might think that cyberattacks will dwindle over time—but they, too, shall evolve. Nonetheless, simple steps, such as protecting your network from insider threats, can go a long way in ensuring business continuity!
That's why it's important we pay attention to the latest cybersecurity trends.
wifi

10:40 - 11:20

Adversarial Multi-Armed Bandits for Multichannel Wireless Communication Systems Security

Dr. Alipour-Fanid

In wireless communication systems, denial-of-service (DoS) attacks launched by jammers target the availability security goal and degrade the system performance. Existing work discuss numerous countermeasure techniques including frequency channel hopping and transmission power control. However, they mainly adopt optimization-based methods and rely on acknowledgement information as well as prior knowledge of the attacker’s attack policy. In addition, these methods lag behind in designing efficient channel switching schemes. To relax this constraint, in the first part of this talk, I will present a novel adversarial multi-armed bandit (MAB) for channel access policy of the transmitter to combat against the attacks while providing a provable system performance guarantee. In the second part, I will discuss an application of adversarial MAB frameworks in cooperative adaptive cruise control (CACC) system security. In this application, we consider both vehicles and jammer employ MAB frameworks to access the wireless channels for data packet transmission and attack, respectively. Then, we derive the CACC stability condition with respect to the minimum packet loss probability, the number of wireless channels, and the number of channels attacked by the jammer. Numerical evaluations validate our theoretical analysis.

visibility

11:20 - 12:00

Uncertainty-aware Visualization in Network Traffic Analysis

Dr. Jeong

Analyzing network traffic data to detect suspicious network activities (i.e., intrusions) requires tremendous effort due to the variability of the data and constant changes in network traffic patterns. In this talk, Dr. Jeong presents his reserach activities focusing on utilizing various interactive visual anlytics techniques for understanding and identifying intrusive network events.

Research Activities in the Department


Hosted at the University of the District of Columbia
Location: Virtual
4200 Connecticut Avenue NW
Washington, DC 20008