Academic Patners

PIEAS Islamabad
Critical Infrastructure Protection
and Malware Analysis Lab

Cyber Threat Monitoring System
for Corporate Networks

The system will perform real-time data collection from various networked devices using agent- based and agentless mechanisms. It will use its own log parser and correlate available data from multiple systems. It will also quantify bad, suspicious, or abnormal events, corroborate behavioural events in a manner that will enable efficient detection of cyber-attacks using computational intelligence and machine-learning techniques. The system will focus on IT networks.

ICS Network Monitoring
and Mitigation System

Once an initial security posture of an ICS is established, the next step is to deploy protection mechanisms protect the ICS, detect and respond to security breaches or cyber-attacks. This involves continuous monitoring of the ICS network and process-physics related studies to map the impact of cyber-attacks on the physical process. The system will focus on ICS specific protocols.

Development of National Threat Library
and Anti- Malware System

Malware Chemistry is getting more and more complex with each passing day. Encryption, polymorphism and metamorphism are used for evasion of detection techniques. The objective of this project will be the development of national cyber-threat library, providing a collection of common malware signature database. This will be followed by development of an anti-malware system using computational intelligence and machine learning techniques to detect patterns of unknown malwares.

ICS Cyber Vulnerability
Assessment System

Assessment of the Cyber Security posture of any ICS is an important step to pro-actively address any shortcomings and vulnerabilities. A vulnerability assessment system shall collect data from the system, analyze, and deduce if the system is vulnerable to any known exploits.

Our People

Our core members and reserchers are academics, developers, administrators and MS/PhD students. Our industrial partners are public and private cyber security organizations that advise us on the design, implementation and commercialization of the R&D work originating from our Lab.

Core Members
Principle Investigator/Director

The Lab is managed by a Principle Investigator (PI) and three Co-PIs
who are leading one research project each with the support of project team leads.

Dr. Muhammad Hanif Durad

Principal Investigator
CO-PI Cyber Threat Monitoring System For Corporate Networks

Dr. Naeem Iqbal

Co-Principal Investigator
ICS Network Monitoring And Mitigation System

Dr. Mureed Hussain

Co-Principal Investigator
Development Of National Threat Library (NTL) and Anti-Malware System

Dr. Ghulam Mustafa

Co-Principal Investigator
Development of ICS Cyber Vulnerability Assessment System