Enhancing Security in Industrial Control Systems with SDN/NFV

Enhancing Security in Industrial Control Systems with SDN/NFV

Vijay Varadharajan, Uday Tupakula, and Kallol Krishna Karmakar's recent publication, Techniques for Enhancing Security in Industrial Control Systems (ACM Trans. Cyber-Phys. Syst., 2024), explores the challenges and solutions for securing Industrial Control Systems (ICS), which are increasingly connected to the Internet for greater efficiency. The paper introduces a software-enabled security architecture that leverages Software Defined Networking (SDN) and Network Function Virtualisation (NFV) to enhance real-time situational awareness and dynamic decision-making.

Submitted by Katie Dey on

"New Algorithms Increase the Privacy of Sensitive Data"

"New Algorithms Increase the Privacy of Sensitive Data"

Saloni Kwatra, a doctoral student at Umea University, has identified flaws in the technology known as "federated learning" or "collaborative learning" and developed new algorithms to bolster user security. When visiting a doctor, information such as medication prescriptions, X-rays, and genetic tests are recorded to help the physician. In these cases, federated learning reduces the risk of exposing sensitive data as the technology enables multiple devices to work together without sharing actual data with each other.

Submitted by Gregory Rigby on

"Researchers Eye 'Topological Signatures' of Cyber Threats"

"Researchers Eye 'Topological Signatures' of Cyber Threats"

Researchers at Pacific Northwest National Laboratory (PNNL) are developing a new method to exploring the higher-dimensional shape of cyber systems in order to identify adversarial attack signatures. The researchers tested their technique with a publicly accessible dataset used for the analysis of Advanced Persistent Threats (APTs). According to Emilie Purvine, a senior data scientist at PNNL, the method reveals patterns in the data that are aligned with adversary activity.

Submitted by Gregory Rigby on

"New NSF-Backed Research Addressing Threat of Security Breaches in Semiconductor Design"

"New NSF-Backed Research Addressing Threat of Security Breaches in Semiconductor Design"

The University of Maine's National Science Foundation (NSF)-funded collaborative research project, “KIPPER: A Scalable Learning-Guided Hardware IP Protection Platform,” will address the threat of confidentiality breaches in semiconductor design, including reverse engineering and Intellectual Property (IP) theft. The KIPPER project will create a new hardware security framework that incorporates Artificial Intelligence (AI) techniques. The AI tools will automate vulnerability detection and simulate security researchers' identification of attack vectors and causes.

Submitted by Gregory Rigby on

"Secure Messaging Through Distributed Messages"

"Secure Messaging Through Distributed Messages"

Researchers at the Technical University of Darmstadt have developed a method called "Encrypted Multi-Channel Communication" (EMC2) to secure sensitive messages by distributing trust across multiple communication channels. EMC2 takes advantage of the modern proliferation of messaging apps to distribute encrypted message parts across several independent communication channels. This article continues to discuss the researchers' work to enable better protection for sending sensitive information.

Submitted by Gregory Rigby on

"Grad Student Works With Research Team to Strengthen Nonprofits’ Cybersecurity"

"Grad Student Works With Research Team to Strengthen Nonprofits’ Cybersecurity"

Anivesh Sinha, a master's student in Information Science at Penn State Great Valley, is collaborating with a team of faculty and other students to conduct a Presidential Public Impact Research Project to help Pennsylvania nonprofit organizations improve their cybersecurity. Sinha points out that nonprofits usually have fewer resources than for-profit organizations, which can lead to poor information security controls and a lack of expertise to implement advanced security measures. This article continues to discuss the project to bolster cybersecurity for nonprofit organizations.

Submitted by Gregory Rigby on

"Security in Quantum Computing"

"Security in Quantum Computing"

Researchers at the National Center for Supercomputing Applications (NCSA), a unit of the University of Illinois Urbana-Champaign, are addressing the issue of practical quantum computers breaking classical encryption before it becomes an actual problem. They presented a paper titled  "Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC Adoption Rates and Identifying Migration Pathways" that proposes the design of a novel PQC network instrument housed at NCSA and the University of Illinois, and incorporated as a part of the FABRIC testbed.

Submitted by Gregory Rigby on

"Health Monitoring Devices at Risk of Being Hacked, Study Shows"

"Health Monitoring Devices at Risk of Being Hacked, Study Shows"

Researchers at Charles Darwin University (CDU) hacked into an oximeter, a smartwatch, and a smart peak flow meter to explore the potential risks and vulnerabilities of these Internet-connected medical devices. According to the study's co-author, Dr. Bharanidharan Shanmugam, the team attacked each device using three different techniques. This article continues to discuss the study on the vulnerability of health monitoring devices to hacking.

Submitted by Gregory Rigby on

"The Sherlock Holmes of AI"

"The Sherlock Holmes of AI"

Georgia Tech developed a postmortem cybersecurity forensic tool named "AI Psychiatry" (AiP) that uses Artificial Intelligence (AI) to recover the original Deep Learning (DL) models a compromised machine, such as a self-driving car, runs on and determine where the fatal error emerged. Using AiP, cyber investigators can immediately see the whole picture. This article continues to discuss the goals and capabilities of the AiP tool.

Georgia Tech reports "The Sherlock Holmes of AI"

Submitted by Gregory Rigby on

"Cybersecurity and Privacy Institute Secures $1.5M in Funding"

"Cybersecurity and Privacy Institute Secures $1.5M in Funding"

Researchers at the University of Waterloo's Cybersecurity and Privacy Institute (CPI) will receive over $1.5 million in funding from the National Cybersecurity Consortium (NCC) to advance digital security in Canada.

Submitted by Gregory Rigby on
Subscribe to