The system will perform real-time data collection from various networked devices using agent- based and agentless mechanisms. It will use its own log parser and correlate available data from multiple systems. It will also quantify bad, suspicious, or abnormal events, corroborate behavioural events in a manner that will enable efficient detection of cyber-attacks using computational intelligence and machine-learning techniques. The system will focus on IT networks.
Once an initial security posture of an ICS is established, the next step is to deploy protection mechanisms protect the ICS, detect and respond to security breaches or cyber-attacks. This involves continuous monitoring of the ICS network and process-physics related studies to map the impact of cyber-attacks on the physical process. The system will focus on ICS specific protocols.
Malware Chemistry is getting more and more complex with each passing day. Encryption, polymorphism and metamorphism are used for evasion of detection techniques. The objective of this project will be the development of national cyber-threat library, providing a collection of common malware signature database. This will be followed by development of an anti-malware system using computational intelligence and machine learning techniques to detect patterns of unknown malwares.
Assessment of the Cyber Security posture of any ICS is an important step to pro-actively address any shortcomings and vulnerabilities. A vulnerability assessment system shall collect data from the system, analyze, and deduce if the system is vulnerable to any known exploits.
Our core members and reserchers are academics, developers, administrators and MS/PhD students. Our industrial partners are public and private cyber security organizations that advise us on the design, implementation and commercialization of the R&D work originating from our Lab.
CO-PI Cyber Threat Monitoring System For Corporate Networks
ICS Network Monitoring And Mitigation System
Development Of National Threat Library (NTL) and Anti-Malware System
Development of ICS Cyber Vulnerability Assessment System