Categories
Research Projects

NSF “Bridging the Cybersecurity Leadership Gap: Assessment, Competencies and Capacity Building” Project

Join CARE Mailing List

The goal of the 2013 – 2016 NSF “Bridging the Cybersecurity Leadership Gap: Assessment, Competencies and Capacity Building” project is to help address the cybersecurity leadership gap developing Chief Information Security Officer (CISO) core competencies.

Categories
Current Projects Research Projects

City/County Cybersecurity Partnership

Join CARE Mailing List

The objective of this NSF-funded project (NSF Award #1623653) is to develop and provide focused and context specific cybersecurity leadership education and training for city and county governments.

Categories
Current Projects Research Projects

Extreme DDoS Defense (XD3)

Join CARE Mailing List

The threat of distributed denial of service (DDoS) attacks has been well-recognized in the data networking world for two decades. Such attacks are orchestrated by sets of networked hosts that collectively act to disrupt or deny access to information, communications or computing capabilities, generally by exhausting critical resources such as bandwidth, processor capacity or memory of targeted resources. The nature of DDoS attacks can span a wide range. Botnet-induced volumetric attacks, which can generate hundreds of gigabits per second of malicious traffic, are perhaps the best-known form of DDoS. However, low-volume DDoS attacks can be even more pernicious and problematic from a defensive standpoint. Such attacks target specific applications, protocols or state-machine behaviors while relying on traffic sparseness (or seemingly innocuous message transmission) to evade traditional intrusion-detection techniques.

The current art in DDoS defense generally relies on combinations of network-based filtering, traffic diversion and ”scrubbing” or replication of stored data (or the logical points of connectivity used to access the data) to dilute volumetric attacks and/or to provide diverse access for legitimate users. In general, these existing approaches fall well short of desired capabilities in terms of response times, the ability to identify and to thwart low-volume DDoS, the ability to stop DDoS within encrypted traffic and the need to defend real-time transactional services such as those associated with cloud computing and military command and control.

DARPA’s Extreme DDoS Defense (XD3) program will focus on three broad areas of opportunity to improve resilience against DDoS attacks. The program aims to thwart DDoS attacks by: (1) dispersing cyber assets (physically and/or logically) to complicate adversarial targeting; (2) disguising the characteristics and behaviors of those assets through networked maneuver to confuse or deceive the adversary; and (3) using adaptive mitigation techniques on endpoints (e.g., mission-critical servers) to blunt the effects of attacks that succeed in penetrating other defensive measures. This research program will include formulation of new algorithms, demonstrations and field exercises with software prototypes, development of performance metrics to assess effectiveness and integration of systems across the three aforementioned areas to maximize overall defensive capabilities.

Categories
News

Mason Researchers Help Bolster Virginia Cybersecurity Efforts by Partnering State Cities and Counties

Join CARE Mailing List

Source: John Hollis from George Mason University News on February 2nd, 2018.

Virginia counties figure to be at the front lines in the battle for cybersecurity, so George Mason University’s J.P. Auffret and Angelos Stavrou are helping them formulate a more cohesive defense with a grant that partners them with local governments.

Categories
Current Projects Research Projects

LADS Project

Join CARE Mailing List

The main goal of the project is to enhance the cyber security of digital devices, such as Embedded and Mission‐Specific Devices (EMSD), by developing a monitor capable of detecting attackers by analyzing involuntary analog emissions across a variety of modalities, including power consumption, electromagnetic, and acoustic emissions.