Ali Dehghantanha | |
---|---|
Born | 1982 Mashhad, Iran |
Nationality | Iranian - Canadian |
Occupation | Academic entrepreneur |
Known for | Research in the field of cybersecurity and threat intelligence |
Awards | Outstanding Leadership Award, IEEE Marie-Curie International Incoming Fellowship Research Excellence Award, University of Guelph College of Engineering and Physical Sciences |
Academic background | |
Education | Ph.D. Security in Computing – University Putra Malaysia |
Academic work | |
Institutions | University of Guelph,ON,Canada University of Salford,Manchester,UK |
Ali Dehghantanha is an academic-entrepreneur in cybersecurity and cyber threat intelligence. He is a Professor of Cybersecurity and a Canada Research Chair in Cybersecurity and Threat Intelligence. [1]
Dehghantanha is a pioneer in applying machine learning techniques toward cyber threat hunting,cyber threat intelligence,and enterprise risk management. His research is highly cited in both academic and industrial settings. [2] He is the Founder and Director of Cyber Science Lab. [3]
After completing his Diploma in Mathematics at National Organization for Development of Exceptional Talents (NODET),Dehghantanha attended Islamic Azad University,Mashhad Branch,from which he graduated with a bachelor's degree in Software Engineering in 2005. He earned his Master's and Doctoral degrees in Security in Computing from University Putra Malaysia in 2008 and 2011,respectively. [1]
Dehghantanha started his academic career as Sr. Lecturer of Computer Science and Information Technology at the University Putra Malaysia in 2011,and later on joined the University of Salford as Marie Curie International Incoming Post-Doctoral Research Fellow in 2015. [4] From 2017 to 2018,he held appointment as Sr. Lecturer (Associate Professor) in the Department of Computer Science at the University of Sheffield. [5] Following this appointment,he joined the University of Guelph (UoG),Ontario,Canada,as an Associate Professor and Director of Master of Cybersecurity and Threat Intelligence program. [6] He became a Tier 2 NSERC Canada Research Chair in Cybersecurity and Threat Intelligence at the University of Guelph (UoG) in 2020. [7] He also holds a concurrent appointment as Adjunct Associate Professor in Schulich School of Engineering's Department of Electrical &Software Engineering at the University of Calgary since 2020. [8] He has developed two Master's programs in cybersecurity,one in the University of Guelph –Canada, [9] and another in the University of Salford.
Dehghantanha is among highly cited researchers in cybersecurity. [2] He is well-recognized for his research in cyber threat intelligence, [10] and in several fields of cyber security including malware analysis, [11] Internet of Things (IoT) security,and digital forensics. [12]
Dehghantanha was among the first to introduce some major security and forensics challenges within the Internet of Things (IoT) domain. He also reviewed previous studies published in this special issue targeting identified challenges. [13] In 2016,he proposed a two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. He has influenced the IoT/ICS network defense field by creating an Intrusion Detection System (IDS) for IoT networks,a secret sharing method of encryption key exchange in vehicular IoT networks,and a method for secret key sharing and distribution between IoT devices. He conducted experiments using NSL-KDD dataset,and proved that his proposed model outperforms previous models designed to detect U2R and R2L attacks. [14] His most notable contributions were made to building AI-based methods for cyber-attack identification and analysis in IoT. [15] [16] Moreover,he developed a Deep Recurrent Neural Network structure for in-depth analysis of IoT malware. [17]
Dehghantanha introduced ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,and also discussed its applications in terms of detection rate and classification accuracy when compared to other classification techniques. [18] While presenting a systematic literature review of blockchain cyber security,he conducted a systematic analysis of the most frequently adopted blockchain security applications. The systematic review also highlights the future directions of research,education and practices in the blockchain and cyber security space,such as security of blockchain in IoT,security of blockchain for AI data,and sidechain security. [19] Furthermore,he focused his study on machine learning aided Android malware classification,and also presented two machine learning aided approaches for static analysis of Android malware. [20]
In 2019,Dehghantanha built a framework that models the impacts of adopting Privacy Enhancing Technologies (PETs) on the performance of SMEs in Canada. [21] He has also created several frameworks for security analysis of cloud platforms,including CloudMe, [22] OneDrive,Box,GoogleDrive,DropBox, [23] MEGA, [24] and SugarSync. [25] He also works to create frameworks for breach coaching and exposure management. In 2016,he published a book entitled Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, and explored the implications of cloud (storage) services and mobile applications on digital forensic investigations. [26]
Computer security is the protection of computer software,systems and networks from threats that can lead to unauthorized information disclosure,theft or damage to hardware,software,or data,as well as from the disruption or misdirection of the services they provide.
Malware is any software intentionally designed to cause disruption to a computer,server,client,or computer network,leak private information,gain unauthorized access to information or systems,deprive access to information,or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security,cybersecurity training,and selling certificates. Topics available for training include cyber and network defenses,penetration testing,incident response,digital forensics,and auditing. The information security courses are developed through a consensus process involving administrators,security managers,and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021,SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin,Audit,Network,and Security.
Internet of things (IoT) describes devices with sensors,processing ability,software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The Internet of things encompasses electronics,communication,and computer science engineering. "Internet of things" has been considered a misnomer because devices do not need to be connected to the public internet;they only need to be connected to a network and be individually addressable.
Cloud computing security or,more simply,cloud security,refers to a broad set of policies,technologies,applications,and controls utilized to protect virtualized IP,data,applications,services,and the associated infrastructure of cloud computing. It is a sub-domain of computer security,network security,and,more broadly,information security.
Security information and event management (SIEM) is a field within computer security that combines security information management (SIM) and security event management (SEM) to enable real-time analysis of security alerts generated by applications and network hardware. SIEM systems are central to the operation of security operations centers (SOCs),where they are employed to detect,investigate,and respond to security incidents. SIEM technology collects and aggregates data from various systems,allowing organizations to meet compliance requirements while safeguarding against threats.
Palo Alto Networks,Inc. is an American multinational cybersecurity company with headquarters in Santa Clara,California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries,including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.
Changde Vocational and Technical College is a post-secondary institution in Changde,Hunan in China. In 2003 the Changde Agricultural School,the Changde Hygiene School and the Changde Mechatronic Engineering School merged to form the Changde Vocational and Technical College.
Air-gap malware is malware that is designed to defeat the air-gap isolation of secure computer systems using various air-gap covert channels.
Cyber threat intelligence (CTI) is knowledge,skills and experience-based information concerning the occurrence and assessment of both cyber and physical threats and threat actors that is intended to help mitigate potential attacks and harmful events occurring in cyberspace. Cyber threat intelligence sources include open source intelligence,social media intelligence,human Intelligence,technical intelligence,device log files,forensically acquired data or intelligence from the internet traffic and data derived for the deep and dark web.
Yuval Elovici is a computer scientist. He is a professor in the Department of Software and Information Systems Engineering at Ben-Gurion University of the Negev (BGU),where he is the incumbent of the Davide and Irene Sala Chair in Homeland Security Research. He is the director of the Cyber Security Research Center at BGU and the founder and director of the Telekom Innovation Laboratories at Ben-Gurion University. In addition to his roles at BGU,he also serves as the lab director of Singapore University of Technology and Design’s (SUTD) ST Electronics-SUTD Cyber Security Laboratory,as well as the research director of iTrust. In 2014 he co-founded Morphisec,a start-up company,that develops cyber security mechanisms related to moving target defense.
Anomali Inc. is an American cybersecurity company that develops and provides threat intelligence products. In 2023,the company moved into providing security analytics powered by artificial intelligence (AI).
William "Chuck" Easttom II is an American computer scientist specializing in cyber security,cryptography,quantum computing,and systems engineering.
The Internet of Military Things (IoMT) is a class of Internet of things for combat operations and warfare. It is a complex network of interconnected entities,or "things",in the military domain that continually communicate with each other to coordinate,learn,and interact with the physical environment to accomplish a broad range of activities in a more efficient and informed manner. The concept of IoMT is largely driven by the idea that future military battles will be dominated by machine intelligence and cyber warfare and will likely take place in urban environments. By creating a miniature ecosystem of smart technology capable of distilling sensory information and autonomously governing multiple tasks at once,the IoMT is conceptually designed to offload much of the physical and mental burden that warfighters encounter in a combat setting.
Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face,the risks they introduce and mitigating security best practices to guide their behavior. End users are considered the weakest link and the primary vulnerability within a network. Since end-users are a major vulnerability,technical means to improve security are not enough. Organizations could also seek to reduce the risk of the human element. This could be accomplished by providing security best practice guidance for end users' awareness of cyber security. Employees could be taught about common threats and how to avoid or mitigate them.
Cisco Talos, or Cisco Talos Intelligence Group, is a cybersecurity technology and information security company based in Fulton,Maryland. It is a part of Cisco Systems Inc. Talos' threat intelligence powers Cisco Secure products and services,including malware detection and prevention systems. Talos provides Cisco customers and internet users with customizable defensive technologies and techniques through several of their own open-source products,including the Snort intrusion prevention system and ClamAV anti-virus engine.
Raheem Beyah is an American computer engineer,researcher,and educator. As of January 15,2021 he is the Dean of the College of Engineering and Southern Company Chair at the Georgia Institute of Technology. Prior to becoming the Dean,he was the vice president for Interdisciplinary Research and the Motorola Foundation Professor and the executive director of Georgia Tech's online masters in cyber security program. Beyah is also the co-founder and chair of industrial security company Fortiphyd Logic,Inc.
Edward G. Amoroso is an American computer security professional,entrepreneur,author,and educator based in the New York City area. His research interests have centered on techniques and criteria for measuring trustworthy software development. the application of these methods to secure software development for critical projects in the defense and aerospace industries,and redefining trust parameters for improved security in the cloud.
IoT Forensics or IoT Forensic Science,a branch of digital forensics,that deals with the use of any digital forensics processes and procedures relating to the recovery of digital evidence which originates from one or more IoT devices for the purpose of preservation,identification,extraction or documentation of digital evidence with the intention of reconstructing IoT-related events. These events may reside across one or more configurable computing resources that are within close proximity to the location where the event has taken place.
The Lincoln Adaptable Real-time Information Assurance Testbed (LARIAT) is a physical computing platform developed by the MIT Lincoln Laboratory as a testbed for network security applications. Use of the platform is restricted to the United States military,though some academic organizations can also use the platform under certain conditions.