Raheem Beyah

Last updated

Beyah, R.; Kangude, S.; Strickland, B.; Copeland, J. (2004). "Rogue access point detection using temporal traffic characteristics". IEEE Global Telecommunications Conference, 2004. GLOBECOM '04. Vol. 4. pp. 2271–2275. doi:10.1109/GLOCOM.2004.1378413. ISBN   0-7803-8794-5. S2CID   10272290.
  • Ji, Shouling; Li, Weiqing; Srivatsa, Mudhakar; Beyah, Raheem (November 3, 2014). "Structural Data De-anonymization: Quantification, Practice, and Implications". Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. pp. 1040–1053. doi:10.1145/2660267.2660278. ISBN   9781450329576. S2CID   16403005.
  • Vu, C. T.; Beyah, R. A.; Li, Y. (April 2007). "Composite Event Detection in Wireless Sensor Networks". 2007 IEEE International Performance, Computing, and Communications Conference. pp. 264–271. doi:10.1109/PCCC.2007.358903. ISBN   978-1-4244-1137-5. S2CID   821282.
  • Patents

    • Systems and methods for fingerprinting physical devices and device types based on network traffic [22]
    • Systems and methods for detection of infected websites [23]
    • Systems and methods for detecting anomalous software on a programmable logic controller [24]
    • Device fingerprinting for cyber-physical systems [25]



    Related Research Articles

    <span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

    Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

    Information security standards or cyber security standards are techniques generally outlined in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.

    The College of Engineering at the Georgia Institute of Technology provides formal education and research in more than 10 fields of engineering, including aerospace, chemical, civil engineering, electrical engineering, industrial, mechanical, materials engineering, biomedical, and biomolecular engineering, plus polymer, textile, and fiber engineering. The College of Engineering is the oldest and largest college of the institution.

    A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit. A hardware Trojan is completely characterized by its physical representation and its behavior. The payload of an HT is the entire activity that the Trojan executes when it is triggered. In general, Trojans try to bypass or disable the security fence of a system: for example, leaking confidential information by radio emission. HTs also could disable, damage or destroy the entire chip or components of it.

    A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, personal computer devices, or smartphones. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organizations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyberattacks have increased over the last few years. A well-known example of a cyberattack is a distributed denial of service attack (DDoS).

    Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing. His work has addressed the identification of software vulnerabilities toward high assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification methods. In an invited essay for ACSAC 2013, he proposed the idea of developing building codes for building software that is used in critical infrastructures. He has organized an NSF funded workshop to develop a building code and research agenda for medical device software security. The final committee report is available through the Cyber Security and Policy Institute of the George Washington University, and the building code through the IEEE.

    The following outline is provided as an overview of and topical guide to computer security:

    The President's Commission on Enhancing National Cybersecurity is a Presidential Commission formed on April 13, 2016, to develop a plan for protecting cyberspace, and America's economic reliance on it. The commission released its final report in December 2016. The report made recommendations regarding the intertwining roles of the military, government administration and the private sector in providing cyber security. Chairman Donilon said of the report that its coverage "is unusual in the breadth of issues" with which it deals.

    In cybersecurity, cyber self-defense refers to self-defense against cyberattack. While it generally emphasizes active cybersecurity measures by computer users themselves, cyber self-defense is sometimes used to refer to the self-defense of organizations as a whole, such as corporate entities or entire nations. Surveillance self-defense is a variant of cyber self-defense and largely overlaps with it. Active and passive cybersecurity measures provide defenders with higher levels of cybersecurity, intrusion detection, incident handling and remediation capabilities. Various sectors and organizations are legally obligated to adhere to cyber security standards.

    <span class="mw-page-title-main">Rob Joyce</span> American cybersecurity official

    Robert E. Joyce is an American cybersecurity official who served as special assistant to the President and Cybersecurity Coordinator on the U.S. National Security Council. He also began serving as White House Homeland Security Adviser to President Donald Trump on an acting basis after the resignation of Tom Bossert from April 10, 2018 to May 31, 2018. He completed his detail to the White House in May 2018 and returned to the National Security Agency. where he is now the Senior Advisor to the Director NSA for Cyber Security Strategy, Joyce previously performed as acting Deputy Homeland Security Advisor since October 13, 2017. On January 15, 2021 the NSA announced that Joyce would replace Anne Neuberger as its Director of Cybersecurity.

    William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

    <span class="mw-page-title-main">Cybersecurity and Infrastructure Security Agency</span> Agency of the United States Department of Homeland Security

    The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government, coordinating cybersecurity programs with U.S. states, and improving the government's cybersecurity protections against private and nation-state hackers.

    <span class="mw-page-title-main">Mark Tehranipoor</span>

    Mark M. Tehranipoor is an Iranian American academic researcher specializing in hardware security and trust, electronics supply chain security, IoT security, and reliable and testable VLSI design. He is the Intel Charles E. Young Preeminence Endowed Professor in Cybersecurity at the University of Florida and serves as the Director of the Florida Institute for Cybersecurity Research. Since June 2022, he has served as the chair of the Department of Electrical and Computer Engineering at the University of Florida. He is a fellow of IEEE, ACM, and NAI as well as a Golden Core member of the IEEE. He is a co-founder of the International Symposium on Hardware Oriented Security and Trust (HOST). He is the recipient of the 2023 SRC Aristotle award. Tehranipoor also serves as a co-director of the Air Force Office of Scientific Research CYAN and MEST Centers of Excellence.

    Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face, the risks they introduce and mitigating security best practices to guide their behavior. End users are considered the weakest link and the primary vulnerability within a network. Since end-users are a major vulnerability, technical means to improve security are not enough. Organizations could also seek to reduce the risk of the human element. This could be accomplished by providing security best practice guidance for end users' awareness of cyber security. Employees could be taught about common threats and how to avoid or mitigate them.

    <span class="mw-page-title-main">Sadie Creese</span> British cybersecurity specialist

    Sadie Creese is a British cybersecurity specialist. She is Professor of Cybersecurity in the Department of Computer Science at the University of Oxford, Director of the Global Cyber Security Capacity Centre at the Oxford Martin School, co-director of the university's Cyber Security Centre and of the Martin School's Institute for the Future of Computing, and a fellow of Worcester College, Oxford.

    Ibrahim "Abe" Moussa Baggili is a cybersecurity and digital forensics scientist at Louisiana State University with a joint appointment between the college of engineering and the Center for Computation and Technology. Before that, he was the founder and director of the Connecticut Institute of Technology (CIT) at the University of New Haven. Baggili was also a full professor and Elder Family Endowed Chair at UNewHaven. He has a B.S., M.S., and Ph.D. in Computer and Information Technology from Purdue University's Purdue Polytechnic Institute. Baggili is a Jordanian/Arab American first generation college graduate and a well-known scientist in the domain of Cyber Forensics and Cybersecurity with seminal peer-reviewed work in the areas of Virtual Reality Forensics (VR) and security, mobile device forensics and security, application forensics, drone forensics and memory forensics.

    Duminda Wijesekera is an American Computer Scientist of Sri Lankan descent. He is a professor in the Department of Computer Science at George Mason University and acting chair of Cyber Security Engineering Department. He is also a visiting research scientist at the National Institute of Standards and Technology (NIST). He has a PhD in Computer Science from the University of Minnesota (1997) and another PhD in Mathematical Logic from Cornell University (1990). He has a Bachelors in Mathematics from University of Colombo. He also holds a courtesy appointments at the Computer Science Department at the Naval Postgraduate School, NIST. He has published more than 100 research papers in the area of cybersecurity. He was also part of the team that investigated Metro Blue Line derailment in Washington DC.

    The School of Cybersecurity and Privacy (SCP) is an academic unit located within the College of Computing at the Georgia Institute of Technology. This interdisciplinary unit draws its faculty from the College of Computing as well as the College of Engineering, the School of Public Policy, the Sam Nunn School of International Affairs, the Scheller College of Business, and the Georgia Tech Research Institute (GTRI). Faculty are engaged in both research and teaching activities related to computer security and privacy at the undergraduate and graduate levels. The school's unifying vision is to keep "cyberspace safer and more secure."

    Ali Dehghantanha is an academic-entrepreneur in cybersecurity and cyber threat intelligence. He is a Professor of Cybersecurity and a Canada Research Chair in Cybersecurity and Threat Intelligence.

    Houbing Herbert Song (FIEEE) is the Director of the Security and Optimization for Networked Globe Laboratory at the University of Maryland, Baltimore County in Baltimore, USA. He gained a Ph.D., Electrical Engineering from the University of Virginia in 2012.

    References

    1. Futrell, Patti (January 4, 2021). "Beyah Named Dean of College of Engineering". Georgia Institute of Technology. Retrieved January 5, 2021.
    2. "OMS Cybersecurity Program Director Featured on WABE". GTPE News. September 10, 2018.
    3. 1 2 Harris, Kelsey (November 29, 2018). "From Research Engineer to Cybersecurity Expert". Georgia Tech Professional Education. Retrieved January 5, 2021.
    4. "Teaching Wasn't Always in Cards for Beyah". Georgia Institute of Technology. July 22, 2013. Retrieved January 4, 2021.
    5. 1 2 "Dr. Raheem Beyah". rbeyah.ece.gatech.edu. Retrieved January 5, 2021.
    6. ICS-CERT advisories:
    7. Brewster, Thomas (September 10, 2015). "Want To Hack The Mars Rover? Take A Look At Its Intel-Owned Operating System". Forbes. Retrieved January 5, 2021.
    8. Weise, Elizabeth (June 12, 2017). "Malware discovered that could threaten electrical grid". USA Today. Retrieved January 5, 2021.
    9. "Using IOT Botnets to Manipulate the Energy Market". August 6, 2020.
    10. Newman, Lily Hay. "Hackers Could Use IoT Botnets to Manipulate Energy Markets". Wired.
    11. "Major cloud is infested with malware, researchers say". November 10, 2016.
    12. Kovacs, Eduard (February 14, 2017). "Simulation Shows Threat of Ransomware Attacks on ICS | SecurityWeek.Com". Security Week.
    13. "Tech Responds to Student Data Disclosure". Georgia Institute of Technology. April 28, 2020. Retrieved January 5, 2021.
    14. "Davita Crime Fraud Opposition" (PDF). Archived from the original (PDF) on August 29, 2017. Retrieved January 5, 2021.
    15. Burress, Jim (May 5, 2015). "DaVita Settles Atlanta Whistleblower Lawsuit For $495M". WABE. Retrieved January 5, 2021.
    16. "About Us: Raheem Beyah, Ph.D." Fortiphyd. Retrieved January 5, 2021.
    17. "NSF Award Search: Award#1140230 - CAREER: A Networking Approach to Host-based Intrusion Detection". National Science Foundation. Retrieved January 5, 2021.
    18. "Minority in Research Science Trailblazer, National Black Engineer of the Year Awards (BEYA)" (PDF). BEYA STEM Global Competitiveness Conference. Retrieved January 5, 2021.
    19. "ACM Recognizes Distinguished Members for Computing Innovations that Transform Society" (PDF). Association for Computing Machinery. November 30, 2016. Retrieved January 5, 2021.
    20. "University Teams Win Berths at Prestigious Applied Research and Policy Competitions At NYU Cyber Security Awareness Week". Cyber Security Trend. October 27, 2016. Retrieved January 5, 2021.
    21. Abdul-Alim, Jamaal (February 23, 2017). "Raheem Beyah Wants to Open More Doors to Cybersecurity - Higher Education". Diverse. Retrieved January 5, 2021.
    22. "Systems and methods for fingerprinting physical devices and device types based on network traffic".
    23. "Systems and methods for detection of infected websites".
    24. "Systems and methods for detecting anomalous software on a programmable logic controller".
    25. "Device fingerprinting for cyber-physical systems".
    Raheem Beyah
    Raheem Beyah.jpg
    Born (1976-12-23) December 23, 1976 (age 47)
    Nationality American
    TitleDean
    Academic background
    Alma mater North Carolina A&T State University
    Georgia Institute of Technology
    Thesis "A Deployable Approach to Better Than Best Effort Quality of Service"
    Doctoral advisorJohn A. Copeland
    Raghupathy Sivakumar