Skip to main content
University of North Dakota
University of North Dakota
    • Current Students
    • Faculty & Staff
    • Alumni
    • Email
    • Blackboard
    • Campus Connection
    • Employee Self-Service (HRMS)
    • Starfish
    • Degree Map
    • Zoom
  • Directory
  • Calendar
  • Scope of this search:
College of Engineering & Mines
College of Engineering & Mines
  • About
  • Academics
  • Admissions
  • Research
  • Outreach
University of North Dakota
  • About
  • Academics
  • Admissions
  • Research
  • Outreach
  • Request Info
  • Visit
  • Apply
Scope of this search:
  • Request Info
  • Visit
  • Apply
Scope of this search:
College of Engineering & Mines
  • Home
  • Research
  • Center for Cyber Security Research
  • Research
Skip Section Navigation
  • Center for Cyber Security Research
  • 2022 Symposium Show/hide children
    • Symposium Schedule
    • Speakers Biographies
    • Call for Posters
    • Sponsorships
    • Event Highlights
    • Gallery
  • Colloquia Series
  • Research
  • Industry Advisory Board

Research

Focus Areas

AI-supported systems can analyze thousands of data points online to identify potential cyber security threats and help with the prevention of cyberattacks. Over the past years, cyberattacks have grown in scale and complexity.​

Advantages of AI in Cyber Security​

Detecting New Threats​

Through algorithms, AI-based systems can learn to identify new threats and ransomware. Plus, they can detect changes in existing threats, thus shielding the organization from cyberattacks.​

​Battling Bots​

Bots automate repetitive and pre-defined tasks. They’ve revolutionized customer services because of their ability to work much faster than humans. Though some bots are programed by hackers to steal customer credentials, send spam, or create bogus accounts.​

Breach Risk Protection​

AI systems help an organization manage its IT asset inventory, which comprises the hardware, software, and applications linked to the information system. AI also helps companies understand the strength and weaknesses of their information security system.​

Better Endpoint Protection​

The shift to remote working has led to an increase in the number of endpoints. This creates a serious challenge because securing thousands of devices and users from cybersecurity threats is difficult.​

 

Faruque, S., & Ranganathan, P. (2019). Secure Smart Grid Communications,U.S. Patent No. 10,284,373. Washington, DC: U.S. Patent and Trademark Office

  • Detecting False Data Injection Attacks in Smart Grids
  • Geo-Fence Detection System for UAV Airspace to Provide Counter-Autonomy
  • Investigation of a GPS Spoofing Attack
  • Next Generation Counter-sUAS Swarm Technology
  • Smart Grid Metering Infrastructures: Threats and Solutions
  • Vehicular Cyber-security Challenges

  • Develop Real-Time Machine Learning Models for SCADA or Synchrophasor Datasets - The project has data set containing physical and cyber fault signatures with time stamp information. The resolution of the data is at very high speed. The end goal is to detect these signatures using machine learning algorithms, perform dimensionality reduction methods, at 5-minute resolution and design a FPGA hardware unit for PMUs.
  • GPS/ADS-B Anomaly detection using machine learning algorithms - The project will use simulated GPS/ADS-B data to model drop outs and erroneous data and apply machine learning algorithms to identify and track anomalies (magnitude, and duration) of various parameters such as timestamp, altitude, speed etc.
  • Vehicular CAN Data Analysis for Optimal ECU operations - The project will collect Controller Area Network Data from multiple vehicles and makes and analyze the CAN data using ON-Board Diagonstic Module. The project has multi-fold goals 1) to develop machine learning based algorithms to identify ECU identification numbers; 2) map ECU to varying signatures such as braking, steering, etc. Although Software component is primary, the project can be extended to include the development of embedded hardware security module to exploits attack vectors in CAN ports. 

  1. T. Przybylski, N. Sugunaraj, and P. Ranganathan, “A Whitepaper On Aircraft Communication Systems - Topologies, Protocols, and Vulnerabilities By Center for Cyber Security Research (C2SR)”, 2023.

  2. El Mrabet, Z., Sugunaraj, N., Ranganathan, P., & Abhyankar, S. (2022). Random Forest Regressor-Based Approach for Detecting Fault Location and Duration in Power Systems. Sensors, 22(2), 458.
  3. Mohan, J., Sugunaraj, N., & Ranganathan, P. (2022). Cyber Security Threats for 5G Networks. In International Conference on Electro Information Technology. Mankota; IEEE.

  4. Sugunaraj, N., Ramchandra, A., & Ranganathan, P. (2022). Cyber Fraud Economics, Scam Types, and Potential Measures to Protect U.S. Seniors: A Short Review. In International Conference on Electro Information Technology. Mankota; IEEE.

  5. El Mrabet, Z., & Ranganathan, P. (2022). Cyber-Physical Attack Detection Approaches in the Wide Area Measurement System: A Survey. Power And Energy Systems, Elsevier, (under review).

  6. Sugunaraj, N., Vrtis, J., Snyder, J., & Ranganathan, P. (2022). False Data Injection Modeling & Detection Using Unsupervised Learning. In North American Power Symposium (NAPS) 2022. Salt Lake City, UT; IEEE.

  7. S.E.V.S. Pillai and W.-C. Hu, "Mobile text misinformation detection using effective information retrieval methods". Information Security and Privacy in Smart Devices: Tools, Methods, and Applications, IGI Global, 2022 (under review).

  8. S. E. V. S. Pillai, A. A. ElSaid and W. -C. Hu, "A Self-Reconfigurable System for Mobile Health Text Misinformation Detection," 2022 IEEE International Conference on Electro Information Technology (eIT), 2022, pp. 242-247, doi: 10.1109/eIT53891.2022.9813840.

  9. W.-C. Hu, S. E. V. S. Pillai, and A. A. ElSaid, ‘Mobile Health Text Misinformation Identification Using Mobile Data Mining’, International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics, vol. 12, no. 1, pp. 1–14, Oct. 2022.

  10. S.E.V.S. Pillai and W.-C. Hu, "Effective information retrieval for mobile misinformation identification". In Proceedings of the 2022 International Conference on Engineering, Science and Technology (IConEST 2022), Austin, TX, October 13-16, 2022.

  11. S.E.V.S. Pillai and W.-C. Hu, "Mobile users versus service providers in privacy preservation using dummy locations". In Proceedings of the 2022 International Conference on Engineering, Science and Technology (IConEST 2022), Austin, TX, October 13-16, 2022.

  12. T. Talaei Khoei, S. Ismail, and N. Kaabouch, “Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs,” Sensors, vol. 22, no. 2, p. 662, Jan. 2022, doi: 10.3390/s22020662. [Online]. Available: http://dx.doi.org/10.3390/s22020662
     
  13. T. T. Khoei, H. O. Slimane, and N. Kaabouch, “A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions.” arXiv, 2022.

  14. T. T. Khoei, A. Gasimova, M. A. Ahajjam, K. A. Shamaileh, V. Devabhaktuni and N. Kaabouch, "A Comparative Analysis of Supervised and Unsupervised Models for Detecting GPS Spoofing Attack on UAVs," 2022 IEEE International Conference on Electro Information Technology (eIT), 2022, pp. 279-284, doi: 10.1109/eIT53891.2022.9813826.

  15. J. Price, Y. Li, K. A. Shamaileh, Q. Niyaz, N. Kaabouch and V. Devabhaktuni, "Real-time Classification of Jamming Attacks against UAVs via on-board Software-defined Radio and Machine Learning-based Receiver Module," 2022 IEEE International Conference on Electro Information Technology (eIT), 2022, pp. 1-5, doi: 10.1109/eIT53891.2022.9813923.

  16. H. O. Slimane, S. Benouadah, K. A. Shamaileh, V. Devabhaktuni and N. Kaabouch, "ADS-B Message Injection Attack on UAVs: Assessment of SVM-based Detection Techniques," 2022 IEEE International Conference on Electro Information Technology (eIT), 2022, pp. 405-410, doi: 10.1109/eIT53891.2022.9813819.

  17. T. T. Khoei, W. C. Hu and N. Kaabouch, "Residual Convolutional Network for Detecting Attacks on Intrusion Detection Systems in Smart Grid," 2022 IEEE International Conference on Electro Information Technology (eIT), 2022, pp. 231-237, doi: 10.1109/eIT53891.2022.9813983.

  18. H. O. Slimane, S. Benouadah, T. T. Khoei and N. Kaabouch, "A Light Boosting-based ML Model for Detecting Deceptive Jamming Attacks on UAVs," 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), 2022, pp. 0328-0333, doi: 10.1109/CCWC54503.2022.9720830.

  19. B. Bansal, W. C. Hu, and N. Kaabouch, ‘Detecting mobile pandemic misinformation by using mobile text/data mining’, in 25th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2021, 2021, pp. 114–119.
  20. Foote, R., Sugunaraj, N., & Ranganathan, P. (2021). Low Cost ICS Network Scanning For Vulnerability Prevention. In EAI International Conference on Cognitive Computing and Cyber Physical Systems. Springer.

  21. T. T. Khoei, G. Aissou, W. C. Hu and N. Kaabouch, "Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid," 2021 IEEE International Conference on Electro Information Technology (EIT), 2021, pp. 129-135, doi: 10.1109/EIT51626.2021.9491891.

  22. F. Salahdine, Z. El Mrabet and N. Kaabouch, "Phishing Attacks Detection A Machine Learning-Based Approach," 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2021, pp. 0250-0255, doi: 10.1109/UEMCON53757.2021.9666627.

  23. El-Rewini, Z., Sadatsharan, K., Sugunaraj, N., Selvaraj, D. F., Plathottam, S. J., & Ranganathan, P. (2020). Cybersecurity attacks in vehicular sensors. IEEE Sensors Journal, 20(22), 13752-13767.

  24. W.-C. Hu, B. Bansal, and N. Kaabouch, ‘Using Incremental Direction Searches to Stay Away from COVID-19’.
  25. El-Rewini, Z., Sadatsharan, K., Selvaraj, D. F., Plathottam, S. J., & Ranganathan, P. (2020). Cybersecurity challenges in vehicular communications. Vehicular Communications, 23, 100214.

  26. F. Salahdine and N. Kaabouch, "Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey", Physical Communication, vol. 39, p. 101001, 2020.
  27. E. Ghribi, T. T. Khoei, H. T. Gorji, P. Ranganathan and N. Kaabouch, "A Secure Blockchain-based Communication Approach for UAV Networks," 2020 IEEE International Conference on Electro Information Technology (EIT), 2020, pp. 411-415.

  28. Badrouchi, F. et al. (2020). Cybersecurity Vulnerabilities in Biomedical Devices: A Hierarchical Layered Framework. In: Raj, P., Chatterjee, J., Kumar, A., Balamurugan, B. (eds) Internet of Things Use Cases for the Healthcare Industry. Springer, Cham.

  29. I. J. Jensen, D. F. Selvaraj and P. Ranganathan, "Blockchain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs)," 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), 2019, pp. 1-7.

  30. M. Pozniak, D. Sadhukhan and P. Ranganathan, "RF Exploitation and Detection Techniques using Software Defined Radio: A Survey," 2019 IEEE International Conference on Electro Information Technology (EIT), 2019, pp. 345-350.

  31. Wen-Chen Hu, Naima Kaabouch, and Hongyu Guo, "Location privacy protection using dummy locations and routes". In Proceedings of the 23rd World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2019), Orlando, Florida, USA, July 6-9, 2019.

  32. Z. E. Mrabet, D. F. Selvaraj, A. S. Nair and P. Ranganathan, "Detection of the False Data Injection Attack in Home Area Networks using ANN," 2019 IEEE International Conference on Electro Information Technology (EIT), 2019, pp. 176-181.

  33. F. Salahdine and N. Kaabouch, “Social Engineering Attacks: A Survey,” Future Internet, vol. 11, no. 4, p. 89, Apr. 2019, doi: 10.3390/fi11040089. [Online]. Available: http://dx.doi.org/10.3390/fi11040089
  34. M. Pozniak and P. Ranganathan, "Counter UAS Solutions Through UAV Swarm Environments," 2019 IEEE International Conference on Electro Information Technology (EIT), 2019, pp. 351-356.

  35. M. Bouabdellah, E. Ghribi and N. Kaabouch, "RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks," 2019 IEEE International Conference on Electro Information Technology (EIT), 2019, pp. 1-6, doi: 10.1109/EIT.2019.8834095.

  36. F. Salahdine and N. Kaabouch, “Social Engineering Attacks: A Survey,” Future Internet, vol. 11, no. 4, p. 89, Apr. 2019, doi: 10.3390/fi11040089. [Online]. Available: http://dx.doi.org/10.3390/fi11040089
  37. M. Riahi Manesh and N. Kaabouch, ‘Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions’, Computers & Security, vol. 85, pp. 386–401, 2019.
  38. M. R. Manesh, J. Kenney, W. C. Hu, V. K. Devabhaktuni and N. Kaabouch, "Detection of GPS Spoofing Attacks on Unmanned Aerial Systems," 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2019, pp. 1-6.

  39. Horton, E., Ranganathan, P. Development of a GPS spoofing apparatus to attack a DJI Matrice 100 Quadcopter. J. Glob. Position. Syst. 16, 9 (2018).

  40. Wen-Chen Hu, Naima Kaabouch, Hongyu Guo, and Ahmed El-Saied, "Dummy locations for robust privacy preservation of location-based services". In Proceedings of the 2018 International Conference on Engineering, Technology, and Applied Science (ICETA 2018), Taipei, Taiwan, June 25-27, 2018.

  41. W. Kayser et al, "Next-Generation Transportation Vulnerabilities," Proceedings of the International Conference on Embedded Systems, Cyber-Physical Systems, and Applications (ESCS), pp. 71-76, 2018.

  42. A. Said et al, "Smart Home Vulnerabilities – A Survey," Proceedings of the International Conference on Embedded Systems, Cyber-Physical Systems, and Applications (ESCS), pp. 83-87, 2018.

  43. J. Pollack and P. Ranganathan, "Social Engineering and Its Impacts on Critical Infrastructure: A Comprehensive Survey," Proceedings of the International Conference on Security and Management (SAM), pp. 122-128, 2018.

  44. Z. E. Mrabet, Y. Arjoune, H. E. Ghazi, B. A. A. Majd, and N. Kaabouch, “Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter,” Journal of Sensor and Actuator Networks, vol. 7, no. 3, p. 26, Jul. 2018, doi: 10.3390/jsan7030026. [Online]. Available: http://dx.doi.org/10.3390/jsan7030026
  45. J. Pollack and P. Ranganathan, "Aviation Navigation Systems Security: ADS-B, GPS, IFF," Proceedings of the International Conference on Security and Management (SAM), pp. 129-135, 2018.

  46. French, R., & Ranganathan, P. (2017). Cyber attacks and defense framework for unmanned aerial systems (uas) environment. J Unmanned Aerial Syst, 3, 37-58.

  47. S. Faruque and P. Ranganathan, “A Secure Wireless Spectrum Control, Error Correction Scheme in Synchrophasors,” Int. J. Handheld Comput. Res., vol. 5, no. 3, pp. 49–59, Jul. 2014.

  48. P. Ranganathan and S. Faruque, "A 3 Tier Spectrum Management Scheme and Security Assessment in Synchrophasors," 2014 National Wireless Research Collaboration Symposium, 2014, pp. 55-58.

Grants

  • W. Semke, P. Ranganathan (Co-PI), R. Adams, “A44-Mitigating Global Positioning Systems Risks for UAS”, Federal Aviation Authority (FAA) ASSURE, ($325,000), 5/2021-8/2023, (Submitted: August 2020, Status: Awarded).
  • Naima Kaabouch (UND Lead), Khair A Al Shamaileh (Purdue State University), "Collaborative Research: SaTC: CORE: Small: UAV-NetSAFE.COM: UAV Network Security Assessment and Fidelity Enhancement through Cyber-Attack-Ready Optimized Machine-Learning Platforms", ($399,478), (October 2020-September 2023).
  • Ryan Adams and Naima Kaabouch, "Navigation & C2 Approaches to Degraded/Denied Environments", NASA, ($506,719), (July 2021-June 2023).
  • Naima Kaabouch and Ryan Adams, "Command and Control technologies Assessment", NASA, ($412,213), (September 2021-October 2024).
  • P. Ranganathan, Real-Time Machine Learning Models for Mitigating Cyber Attacks in Power Systems, ND EPScoR: Cyber Assistantship, ($10,000), 1/2021-08/2021, (Submitted: Nov 2020, Status: Awarded).
  • Joe Vacek, Paul Snyder (CoPI), and Naima Kaabouch, "CyberSecurity and Safety Literature Review", Federal Aviation Administration (FAA), ($288,476), (October 2020-2021).
  • Naima Kaabouch and Mohsen Manesh, "Securing Automatic Dependent Surveillance-Broadcast for Air Traffic Control", ND EPSCoR/NSF, ($60,366), (2017-2019).
  • A. Bergstrom, P. Ranganathan, J. Neubert, S. Felege, “NSF: MRI: Acquisition of FlashTAIL - An All-NVMe Flash Storage Instrument for the Talon Artificial Intelligence & Machine Learning Cloud, $229,390, 10/2019-09/2022, (Submitted: 01/2019, Status: Awarded).
  • P. Ranganathan (PI), N. Kaabouch, INTERN DCL - Topology Aware Resource Optimization and Uncertainty Quantification Energy Models for the Power Grid, $55,009, Program: GOALI,, Supported Ph.D. student Arun Sukumaran Nair to attend PNNL for six months, 10/2019-05/2020. (Submitted: 05/2019, Status: Awarded on 08/2019).
  • Naima Kaabouch, "Enhancement of Spectrum Decision through Probabilistic Graphical Models", National Science Foundation (NSF), ($291,599), (2014-2018).
  • P. Ranganathan (PI), D. Selvaraj (Post doc & Co-PI), “Missing Data Identification and Capturing Anomalies for Synchrophasors, Duke Energy-Electric Power Holding Company, ($130,000) (Submitted: 08/2019, Status: Awarded). 6. S. Noghanian, P. Ranganathan, J. Jensen, Legal Consideration in Safe and Secure Radio Frequency Wireless Power Transfer, Energy Environmental Research Center (EERC) grant, 12/2017-05/2018. ($2,500), (Submitted: 09/2017, Status: Awarded). December 2017-May 2018.
  • P. Ranganathan, “Geo-Fence Detection System (GFDS) for Unmanned Aerial Vehicular Airspace to provide Counter Autonomy”, 05/2017-08/2021, Rockwell Collins, ($25,000), (Submitted: March 2017, Status: Awarded).
  • P. Ranganathan (PI), Cyber Threat Security Analyzer using MU8000 equipment grant, College of Engineering and Mines (CEM) Fund, UND Dean’s office, ($30,000), (Submitted: 2014, Status: Awarded).
  • P. Ranganathan, “Cyber Attack Simulator for Unmanned Aerial Vehicular networks”, 05/2015-08/2018, Rockwell Collins, ($25,000), (Submitted: March 2015, Status: Awarded).
  • P. Ranganathan, N. Kaabouch, Topology Aware Resource Optimization and Uncertainty Quantification Energy Models for the Power Grid, $215, 622, 09/2015-08/2021 (Submitted: 02/2015, Status: Awarded).

Research Partners

  • Advanced Engineering and Environmental Services (AE2S)
  • Allete Inc
  • Collins Aerospace
  • U.S. Department of Defense
  • Drexel University
  • Duke Energy
  • Eaton
  • EERC
  • Embry-Riddle Aeronautical University
  • North Dakota Established Program to Stimulate Competitive Research (ND EPSCoR)
  • Federal Aviation Administration (FAA)
  • Kansas State University
  • University of Kansas
  • Minnkota Power Cooperative
  • North Dakota Department of Agriculture
  • NSF Innovation Corps
  • National Science Foundation (NSF)
  • Oregon State University
  • SkyScopes
  • Tau Drones
  • University of Alaska Fairbanks

AE2S Logo

Allete Logo

Collins Logo

DoD Logo

Drexel University Logo

Duke Energy Logo

Eaton Logo

EERC Logo

Embry Riddle University Logo

EPSCOR Logo

FAA Logo

Kansas State University Logo

University of Kansas Logo

Minnkota Power Logo

ND Agriculture Logo

NSF Corps Logo

NSF Logo

Oregon State University Logo

SkyScopes Logo

Taudrones Logo

University of Alaska Logo

Center for Cyber Security Research (C2SR)
Upson II, Room 366G
243 Centennial Dr Stop 7165
Grand Forks, ND 58202-7165
und.c2sr@UND.edu

 

  • YouTube
We use cookies on this site to enhance your user experience.

By clicking any link on this page you are giving your consent for us to set cookies, Privacy Information.

College of Engineering & Mines

Upson II Room 165
243 Centennial Dr Stop 8155
Grand Forks, ND 58202-8155

701.777.2180 | UND.ceminfo@UND.edu

  • Facebook
  • Twitter
  • LinkedIn
    • Employment
    • Contact UND
    • Make a Gift
    University of North Dakota

    © 2023 University of North Dakota - Grand Forks, ND - Member of ND University System

    • Accessibility & Website Feedback
    • Terms of Use & Privacy
    • Notice of Nondiscrimination
    • Student Disclosure Information
    • Title IX
    ©