Network Security Research Group Home Page

This is the main web page of Network Security Research Lab headed by Dr. Edward Chow. Currently we have the following projects at different stages (some of these project-person mappings are tentative; you may move around or propose new one; follow your bliss; hope not changing too often:-)):

Enhance Security of Blockchain Systems

  1. Investigate attacks and defenses of core technologies used by blockchain systems.
  2. Investigate vulnerabilities of permissioned blockchains for a business network in general and gorvernment services in particular.
  3. Create penetration testing tool specifically for blockchain systems
  4. Prototype permissioned blockchain systems for government services and perform vulnerability analsysis and penetration testing on them.

Homomorphic Encryption Research Project

  1. Efficient Clifford-Based Homomorphic Cryptosystems

Right Place Right Route Data Delivery(R2D2) project

  1. Design and develop system for specifying/verifying R2D2 requirements.
  2. Develop web app with web crypto and google map APIs for encrypting data and specifying R2D2 restrictions.
  3. Develop Value-Added Software Defined Network for location path verification.
  4. Develop privacy preserving/enforcement tools for R2D2
  • Proximity Based Encryption (PBE) sponsored by Northrop Grumman.
    1. Proximity Specification and Verification.
    2. Tools for PBE based on Web Cryptography draft standard
    3. Create new network verification services for supporting PBE.
  • Software Defined Network Based TOR Network (SOR). Abdelhamid Elgzil.
    1. Design and develop bootstrap networks for TOR networks.
    2. Design and develop anonymous secure payment systems for SOR services.
    3. Design and develop efficent SDN based TOR networks.
  • Unified homeland security strategies through game theory. Rick White and Aaron Burkhart
    1. Rick White just finished his phd defense 11/5/2013. His dissertation attracts attention from DHS ST resulting the following grant.
    2. RAMCAP standard review and enhancement. Funded by ORNL and DHS ST.
    3. Develop a risk analysis tool for critical infrastructure. LIRA.
  • Cyber Resilience.
    1. Network Resilience in Cloud across Cloud Providers
    2. Defend with Diviersity: Explore the use of diverse OS/Library/Programming Languages.
    3. Migration of web service S2M, M2M, S2S, and M2S.
  • SCOLD: DDoS attacks and defenses.
    1. Intrusion Tolerance and the Cloud: Explore the use of virtual machines in cloud providers to establish alternate routes using multiple indirect routing/secure DNS.
    2. Utilize IPv6 address hoping to avoid and slowdown DDoS attacks.
    3. Large Scale Modeling and Simulation study of Botnet DDoS attacks and defense techniques.
    4. Fast intrusion traceback/pushback/tolerance techniques with Software Defined Networks. Josh Alcorn. Modeling using Estinet.
    5. Cloud/Computer/Mobile Forensics. Haitham Ennajah, Adil Ahmad
  • SCORES (Smart Cloud Optimal Resource Selection):
    1. N-Cloud Storage. Secure efficient striping techniques and tools for utilizing low cost cloud storage. Fahad Alsolami (he will move to Dr. Boult's group after finish the first phase this project with me.)
    2. Algorithms and network services for selecting data center locations given a set of producers, consumers, and metrics.
  • Tools and Techniques for Regulation Conformance (Initial work done by Sarah Pramanik, first graduate of phd security program). Sarah Pramanik, Ammar Almutawa
    1. Apply to DoD systems.
    2. Apply to Healthcare systems.

    Research Projects with Current and Past Members

    1. Blockchain Security Research (Joint Rearch Projects with Drs. Xiaobo Zhou and Sang-Yoon Chang). Shawn Emery, Hsiang-Jen Hong, Wenjun Fan.
      1. Vulnerability Anslysis Blockchain Based E-Voting System.
      2. Fast Resilient Consensus Protocol for Blockchain.
    2. Homomorphic Encryption Research (Joint Project with Professor Carlos Araujo). David Honorio, Suneetha Tedla
    3. Attribute-Based Chameleon Hash Algorithms for Redactable Blockchain in mHealth Systems. Arij Alfadi
    4. Behavior Study for Preventing Social Engineering. Henry Collier.
    5. R2D2: Right Place Right Path Data Delivery. Ehab Ashary
    6. Threats Theory and Their Applications. Sarah Pramanik
    7. SOR: Anonymity Software-Defined-Network-Based Onion Routing. Abdelhamid Elgzil.
    8. SDN on-the-Go. Scott Melton, Joshua Alcorn.
    9. SDN Security Research. Scott Melton, Joshua Alcorn, Amer Aljaedi.
    10. Multi-channel software-based MAC protocol for Under Water Sensor Networks. Ahmed Guqhaiman.
    11. Secure GPS Data for Critical Infrastructure and Key Resources. Steve Lewis.
    12. UFAP: Ultra-fast Handoff Authentication Protocol for Wireless Mesh Networks. Naif Alamri.
    13. Machine Learning for Classifiying Sensitive/Classified Document (Joint Project with Dr. Terry Boult.) Khudran Alzhrani
    14. Risk Analysis for Critical Infrastructure Protection (funded by DHS). Rick White, Randy George, Aaron Burkhart.
    15. Long Lasting Survivable Web Objects. Jebreel Alamri.

    Rules To Follow:

    Expectation:

    Some advices given to beginning students: