Research
Focus Areas
AI-supported systems can analyze thousands of data points online to identify potential cyber security threats and help with the prevention of cyberattacks. Over the past years, cyberattacks have grown in scale and complexity.
Advantages of AI in Cyber Security
Detecting New Threats
Through algorithms, AI-based systems can learn to identify new threats and ransomware. Plus, they can detect changes in existing threats, thus shielding the organization from cyberattacks.
Battling Bots
Bots automate repetitive and pre-defined tasks. They’ve revolutionized customer services because of their ability to work much faster than humans. Though some bots are programmed by hackers to steal customer credentials, send spam, or create bogus accounts.
Breach Risk Protection
AI systems help an organization manage its IT asset inventory, which comprises the hardware, software, and applications linked to the information system. AI also helps companies understand the strength and weaknesses of their information security system.
Better Endpoint Protection
The shift to remote working has led to an increase in the number of endpoints. This creates a serious challenge because securing thousands of devices and users from cybersecurity threats is difficult.
Faruque, S., & Ranganathan, P. (2019). Secure Smart Grid Communications,U.S. Patent No. 10,284,373. Washington, DC: U.S. Patent and Trademark Office
- Detecting False Data Injection Attacks in Smart Grids
- Geo-Fence Detection System for UAV Airspace to Provide Counter-Autonomy
- Investigation of a GPS Spoofing Attack
- Next Generation Counter-sUAS Swarm Technology
- Smart Grid Metering Infrastructures: Threats and Solutions
- Vehicular Cyber-security Challenges
- Develop Real-Time Machine Learning Models for SCADA or Synchrophasor Datasets - The project has data set containing physical and cyber fault signatures with time stamp information. The resolution of the data is at very high speed. The end goal is to detect these signatures using machine learning algorithms, perform dimensionality reduction methods, at 5-minute resolution and design a FPGA hardware unit for PMUs.
- GPS/ADS-B Anomaly detection using machine learning algorithms - The project will use simulated GPS/ADS-B data to model drop outs and erroneous data and apply machine learning algorithms to identify and track anomalies (magnitude, and duration) of various parameters such as timestamp, altitude, speed etc.
- Vehicular CAN Data Analysis for Optimal ECU operations - The project will collect Controller Area Network Data from multiple vehicles and makes and analyze the CAN data using ON-Board Diagonstic Module. The project has multi-fold goals 1) to develop machine learning based algorithms to identify ECU identification numbers; 2) map ECU to varying signatures such as braking, steering, etc. Although Software component is primary, the project can be extended to include the development of embedded hardware security module to exploits attack vectors in CAN ports.
- El Mrabet, Z., Sugunaraj, N., Ranganathan, P., & Abhyankar, S. (2022). Random Forest Regressor-Based Approach for Detecting Fault Location and Duration in Power Systems. Sensors, 22(2), 458.
-
El Mrabet, Z., & Ranganathan, P. (2022). Cyber-Physical Attack Detection Approaches in the Wide Area Measurement System: A Survey. Power And Energy Systems, Elsevier, (under review).
-
Sugunaraj, N., Vrtis, J., Snyder, J., & Ranganathan, P. (2022). False Data Injection Modeling & Detection Using Unsupervised Learning. In North American Power Symposium (NAPS) 2022. Salt Lake City, UT; IEEE.
-
S.E.V.S. Pillai and W.-C. Hu, "Mobile text misinformation detection using effective information retrieval methods". Information Security and Privacy in Smart Devices: Tools, Methods, and Applications, IGI Global, 2022 (under review).
-
S.E.V.S. Pillai and W.-C. Hu, "Effective information retrieval for mobile misinformation identification". In Proceedings of the 2022 International Conference on Engineering, Science and Technology (IConEST 2022), Austin, TX, October 13-16, 2022.
-
S.E.V.S. Pillai and W.-C. Hu, "Mobile users versus service providers in privacy preservation using dummy locations". In Proceedings of the 2022 International Conference on Engineering, Science and Technology (IConEST 2022), Austin, TX, October 13-16, 2022.
-
- B. Bansal, W. C. Hu, and N. Kaabouch, ‘Detecting mobile pandemic misinformation by using mobile text/data mining’, in 25th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2021, 2021, pp. 114–119.
- W.-C. Hu, B. Bansal, and N. Kaabouch, ‘Using Incremental Direction Searches to Stay Away from COVID-19’.
- F. Salahdine and N. Kaabouch, "Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey", Physical Communication, vol. 39, p. 101001, 2020.
-
Wen-Chen Hu, Naima Kaabouch, and Hongyu Guo, "Location privacy protection using dummy locations and routes". In Proceedings of the 23rd World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2019), Orlando, Florida, USA, July 6-9, 2019.
- F. Salahdine and N. Kaabouch, “Social Engineering Attacks: A Survey,” Future Internet, vol. 11, no. 4, p. 89, Apr. 2019, doi: 10.3390/fi11040089. [Online]. Available: http://dx.doi.org/10.3390/fi11040089
- F. Salahdine and N. Kaabouch, “Social Engineering Attacks: A Survey,” Future Internet, vol. 11, no. 4, p. 89, Apr. 2019, doi: 10.3390/fi11040089. [Online]. Available: http://dx.doi.org/10.3390/fi11040089
- M. Riahi Manesh and N. Kaabouch, ‘Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions’, Computers & Security, vol. 85, pp. 386–401, 2019.
-
Wen-Chen Hu, Naima Kaabouch, Hongyu Guo, and Ahmed El-Saied, "Dummy locations for robust privacy preservation of location-based services". In Proceedings of the 2018 International Conference on Engineering, Technology, and Applied Science (ICETA 2018), Taipei, Taiwan, June 25-27, 2018.
- Z. E. Mrabet, Y. Arjoune, H. E. Ghazi, B. A. A. Majd, and N. Kaabouch, “Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter,” Journal of Sensor and Actuator Networks, vol. 7, no. 3, p. 26, Jul. 2018, doi: 10.3390/jsan7030026. [Online]. Available: http://dx.doi.org/10.3390/jsan7030026
Grants
- Siby Jose Plathottam (ANL), Kumar Jhala (ANL), Benjamin A Blakely (ANL), Manimaran Govindarasu (ISU), Prakash Ranganathan (UND), Julieta Giraldez (Kevala, Inc.), "Adaptive Cybersecurity for Distributed Energy Resources: A Game-Theoretic and Machine Learning Approach for Real-Time Threat Detection and Mitigation", Department of Energy (DoE), ($525,000), 10/2023-09/2026, (Submitted: June 2023, Status: Awarded).
- R. Adams, P. Ranganathan, W. Semke, "A56-Evaluating Electro Magnetic Compatibility for UAS Environment", Federal Aviation Authority (FAA) ASSURE, ($325,000), 8/2021-8/2023, (Submitted: August 2020, Status: Awarded).
- W. Semke, P. Ranganathan (Co-PI), R. Adams, “A44-Mitigating Global Positioning Systems Risks for UAS”, Federal Aviation Authority (FAA) ASSURE, ($325,000), 5/2021-8/2023, (Submitted: August 2020, Status: Awarded).
- Naima Kaabouch (UND Lead), Khair A Al Shamaileh (Purdue State University), "Collaborative Research: SaTC: CORE: Small: UAV-NetSAFE.COM: UAV Network Security Assessment and Fidelity Enhancement through Cyber-Attack-Ready Optimized Machine-Learning Platforms", ($399,478), (October 2020-September 2023).
- Ryan Adams and Naima Kaabouch, "Navigation & C2 Approaches to Degraded/Denied Environments", NASA, ($506,719), (July 2021-June 2023).
- Naima Kaabouch and Ryan Adams, "Command and Control technologies Assessment", NASA, ($412,213), (September 2021-October 2024).
- P. Ranganathan, Real-Time Machine Learning Models for Mitigating Cyber Attacks in Power Systems, ND EPScoR: Cyber Assistantship, ($10,000), 1/2021-08/2021, (Submitted: Nov 2020, Status: Awarded).
- Joe Vacek, Paul Snyder (CoPI), and Naima Kaabouch, "CyberSecurity and Safety Literature Review", Federal Aviation Administration (FAA), ($288,476), (October 2020-2021).
- Naima Kaabouch and Mohsen Manesh, "Securing Automatic Dependent Surveillance-Broadcast for Air Traffic Control", ND EPSCoR/NSF, ($60,366), (2017-2019).
- A. Bergstrom, P. Ranganathan, J. Neubert, S. Felege, “NSF: MRI: Acquisition of FlashTAIL - An All-NVMe Flash Storage Instrument for the Talon Artificial Intelligence & Machine Learning Cloud, $229,390, 10/2019-09/2022, (Submitted: 01/2019, Status: Awarded).
- P. Ranganathan (PI), N. Kaabouch, INTERN DCL - Topology Aware Resource Optimization and Uncertainty Quantification Energy Models for the Power Grid, $55,009, Program: GOALI,, Supported Ph.D. student Arun Sukumaran Nair to attend PNNL for six months, 10/2019-05/2020. (Submitted: 05/2019, Status: Awarded on 08/2019).
- Naima Kaabouch, "Enhancement of Spectrum Decision through Probabilistic Graphical Models", National Science Foundation (NSF), ($291,599), (2014-2018).
- P. Ranganathan (PI), D. Selvaraj (Post doc & Co-PI), “Missing Data Identification and Capturing Anomalies for Synchrophasors, Duke Energy-Electric Power Holding Company, ($130,000) (Submitted: 08/2019, Status: Awarded). 6. S. Noghanian, P. Ranganathan, J. Jensen, Legal Consideration in Safe and Secure Radio Frequency Wireless Power Transfer, Energy Environmental Research Center (EERC) grant, 12/2017-05/2018. ($2,500), (Submitted: 09/2017, Status: Awarded). December 2017-May 2018.
- P. Ranganathan, “Geo-Fence Detection System (GFDS) for Unmanned Aerial Vehicular Airspace to provide Counter Autonomy”, 05/2017-08/2021, Rockwell Collins, ($25,000), (Submitted: March 2017, Status: Awarded).
- P. Ranganathan (PI), Cyber Threat Security Analyzer using MU8000 equipment grant, College of Engineering and Mines (CEM) Fund, UND Dean’s office, ($30,000), (Submitted: 2014, Status: Awarded).
- P. Ranganathan, “Cyber Attack Simulator for Unmanned Aerial Vehicular networks”, 05/2015-08/2018, Rockwell Collins, ($25,000), (Submitted: March 2015, Status: Awarded).
- P. Ranganathan, N. Kaabouch, Topology Aware Resource Optimization and Uncertainty Quantification Energy Models for the Power Grid, $215, 622, 09/2015-08/2021 (Submitted: 02/2015, Status: Awarded).
Research Partners
- Advanced Engineering and Environmental Services (AE2S)
- Allete Inc
- Collins Aerospace
- U.S. Department of Defense
- Drexel University
- Duke Energy
- Eaton
- EERC
- Embry-Riddle Aeronautical University
- North Dakota Established Program to Stimulate Competitive Research (ND EPSCoR)
- Federal Aviation Administration (FAA)
- Kansas State University
- University of Kansas
- Minnkota Power Cooperative
- North Dakota Department of Agriculture
- NSF Innovation Corps
- National Science Foundation (NSF)
- Oregon State University
- SkyScopes
- Tau Drones
- University of Alaska Fairbanks