Cybersecurity Lab
2 / 7

Cybersecurity Lab

Vahid Heydari, Ph.D. 

Associate Professor of Computer Science, Rowan University

Director of Rowan Center for Cybersecurity Education and Research (CCER)

Faculty Advisor of Rowan Cybersecurity Club

Education:

Ph.D., Computer Engineering, University of Alabama in Huntsville

M.S., Cybersecurity, University of Alabama in Huntsville

Research Interests:

Moving Target Defenses, IPv6 Security, Mobile and Wireless Networks Security, and Wireless Networks Analysis and Simulation.

Courses Taught:

Practical Aspects of Cybersecurity (CS 01395),  Advanced Cyber Security: Principles and Applications (CS 07551),  Operating Systems (CS 04390),  Computer Forensics (CS 07595),  Cyber Security: Fundamentals, Principles and Applications (CS 07351). 

Contact:

Email: heydari@rowan.edu Phone: 856-256-4500 x53548  

Address: Department of Computer Science, Robinson Hall, 3rd Floor, 201 Mullica Hill Road, Glassboro, NJ 08028  

Ongoing Research

Internet-Controlled Systems

  •  Internet-controlled systems employ various healthcare, military, and Industrial applications. The strength of this approach lies in the fact that this type of remote control can be done from an unlimited distance through the Internet. In addition, simplifying communication is another advantage based on leveraging Internet Protocol (IP) as a mature method with a large number of off-the-shelf applications. Remote control system of an airplane, an uninterruptible autopilot system, is one of the Internet-controlled systems' applications that can be used in emergency events like terrorist attempts hijacking an aircraft. Besides all of its advantages, an important drawback of this system is the potential for cyber-terrorists to hack into an aircraft's control system. In this project, we are working on a framework for building a secure and private peer to peer communication to combat remote cyber-attacks by thwarting any potential attacks at their reconnaissance stage. 

Security and Privacy of Wearable Medical Devices

  •  Digital connectivity is fundamental for the health care system to deliver safe and effective care. However, insecure connectivity could be a major threat to patient safety and privacy (e.g. on August 2017, FDA recalled 465,000 pacemakers because of discovering security flaws). Although connecting a patient’s pacemaker to the Internet has many advantages for monitoring the patient, this connectivity opens a new door for cyber-attackers to steal the patient data or even control the pacemaker or damage it. Therefore, patients are forced to choose between connectivity and security. This research work presents a framework for secure and private communications between wearable medical devices and patient monitoring systems. The primary objective of this research is twofold, first to identify and analyze the communication vulnerabilities, second, to develop a framework for combating unauthorized access to data through the compromising of computer security. 

Secure PLC

  •  Critical infrastructure including electricity distribution, water treatment, petroleum refining, etc., is the backbone of our nation's economy, security, and health. Supervisory control and data acquisition (SCADA) systems perform key functions in controlling industrial systems. A SCADA system includes two main components, a Human Machine Interface (HMI) and Programmable Logic Controllers (PLCs). HMI is a user interface for signaling and controlling the state of the system. PLC is directly connected to the physical infrastructure through sensors and actuators. The SCADA system uses a client/server communication model in which the HMI is the client that continually sends write and read commands to the PLC that is the server. In this way, the HMI can send control parameters or read sensor measurements and the state of the PLC program. Cyber-attacks on such infrastructure can cause loss of life, threaten public safety/national security, or impact environmental disasters. In this research, we use a Moving Target Defense (MTD) method which changes the IP addresses of the HMI and the PLC to defeat remote cyber-attacks. 

Anti-Censorship Framework

  •  Over the past decade, the widespread access to the Internet has led to significant changes in the way people live. The power of having information that can be readily accessed via a computer or a mobile device has prompted never-before-seen rate of advances in science, technology, and cultural transformations. Though some may also argue the downsides of the Internet, it has enabled all communities around the globe to come much closer together than ever before. Unfortunately, the freedom to access information, which is considered a basic human right, is not protected for some people in various parts of the world today. Freedom of information is key to a free, democratic society. In addition to fueling the transformations as described above, it symbolizes a fundamental struggle towards the betterment of mankind. Through the use of technology, it is possible to combat censorship, and help people from all around the globe access information that can ultimately help them reach their potential in all areas of science, technology, digital culture, etc. This research work presents a framework through which web servers can combat censorship. The primary objective is to develop a framework for combating censorship, which makes it too expensive and impractical for the adversary to censor targeted websites without completely cutting off the Internet resources co-located with the web servers in question. 

Publications

Patents

  1. V. Heydari, "Anti-Censorship Framework Using Moving Target Defense Systems and Methods," U.S. Patent 10,630,636, issued April 21, 2020.
  2. V. Heydari, "Systems and Methods for Preventing Remote Attacks Against Transportation Systems," U.S. Patent 10,554,683, issued February 4, 2020.
  3. Inventor of "Moving Target Defense Systems and Methods," filed May 2017, Patent Pending.

Book Chapter

  1. V. Heydari. "IP Hopping by Mobile IPv6," In Handbook of Cyber-Development, Cyber-Democracy and Cyber-Defense, Springer International Publishing, 2017.

Journal Papers

  1. G. Mayorga, X. Do,and V. Heydari. "Using Smart Glasses for Facial Recognition," American Journal of Undergraduate Research, vol. 15, no. 4, pp. 23–35, 2019.
  2. V. Heydari. "Moving Target Defense for Securing SCADA Communications," IEEE Access, vol. 6, pp. 33329-33343, 2018.
  3. V. Heydari and S. M. Yoo. "Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks," Springer's International Journal of Wireless Information Networks, 2017.
  4. V. Heydari, S. Kim, and S.M. Yoo. "Scalable Anti-Censorship Framework using Moving Target Defense for Web Servers," IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1113-1124, 2017.
  5. V. Heydari and S. M. Yoo. "E2EACK: An End-to-End Acknowledgment-based Scheme against Collusion Black Hole and Slander Attacks in MANETs," Wireless Networks, vol. 22, no. 7, pp. 2259-2273, 2016.
  6. V. Heydari and S. M. Yoo. "Lightweight Acknowledgement-based Method to Detect Misbehavior in MANETs," KSII Transactions on Internet and Information Systems, vol. 9, no. 12, pp. 5150-5169, 2015.

Conference Papers

  1. J. Stranahan, T. Soni, and V. Heydari. "Supervisory Control and Data Acquisition Testbed for Research and Education," In proc. IEEE 9th Annual Computing and Communication Workshop and Conference, 2019.
  2. J. Stranahan, T. Soni, and V. Heydari. "Supervisory Control and Data Acquisition Testbed Vulnerabilities and Attacks," In proc. IEEE SoutheastCon 2019, Huntsville, AL, 2019.
  3. V. Heydari. "Moving Target Defense for Avionic Systems," National Cyber Summit, 2018.
  4. V. Heydari. "Preventing SSH Remote Attacks Using Moving Target Defense," 13th International Conference on Cyber Warfare and Security, (ICCWS 2018).
  5. V. Heydari, S.M. Yoo, and S. Kim. "Secure VPN using Mobile IPv6 based Moving Target Defense," In proc. IEEE Global Communications Conference, (GLOBECOM 2016), Washington, DC, 2016.
  6. V. Heydari, S. Kim, and S.M. Yoo. "Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense," In Proc. ACM 11th Annual Cyber and Information Security Research, (CISR 2016).
  7. V. Heydari and S.M. Yoo. "Securing Critical Infrastructure by Moving Target Defense," 11th International Conference on Cyber Warfare and Security, (ICCWS 2016).
  8. V. Heydari and S.M. Yoo. "EACK: End-to-End Acknowledgement-based Method for Reliable Data Collection in Wireless Sensor Networks," In proc. IEEE International Conference on Information Science and Security, (ICISS 2015).
  9. V. Heydari and S.M. Yoo. "Moving Target Defense Enhanced by MIPv6," 7th Annual Southeastern Cyber Security Summit, (2015).
  10. V. Heydari, S.M. Yoo, and A. Zhamanov. "Acknowledgement-based Methods to Detect Black Hole Attack in Mobile Ad Hoc Networks," International Conference on Information Technology Promotion in Asia, (ITPA 2014).
  11. V. Heydari. "A new Acknowledgment-based Scheme against Malicious Nodes and Collusion Attack in MANETs,'' in Proc. 14th IEEE International Conference on Communication Technology, (ICCT 2012).

Grants Proposals

  • Awarded: National Science Foundation (NSF), SFS (subcontract): Scholarship for Service Program at Rowan University for Graduate Students, Vahid Heydari (PI), 9/1/2020 - 8/31/2022, $295,115.
  • Awarded: National Science Foundation (NSF)/National Security Agency (NSA) GenCyber: GenCyber Student Camp at Rowan University, Vahid Heydari (PI), 3/1/2020 - 3/1/2022, $77,935.
  • Awarded: National Science Foundation (NSF)/National Security Agency (NSA) GenCyber: GenCyber Student Camp in Delaware by Rowan University, Vahid Heydari (PI), 3/1/2020 - 3/1/2022, $83,576.
  • Awarded: NJ Department of Labor and Workforce Development: Growing Apprenticeship in Non-traditional Sectors ("GAINS"), Subcontract to Saint Peter's University, Vahid Heydari (PI), 1/1/2020 - 12/31/2020, $18,989.
  • Awarded: National Science Foundation (NSF), SFS (subcontract): Establishment of a Scholarship for Service Program at Rowan University, Vahid Heydari (PI), 6/1/2019 - 5/31/2022, $622,694.
  • Awarded: US Department of Education: Graduate Assistance in Artificial Intelligence and Cybersecurity, Vahid Heydari (Project Manager), 1/10/2019 - 9/30/2021, $623,500.
  • Awarded: US Department of Education: Rowan's Graduate Fellowship Prepares for the Modern Age of Artificial Intelligence (Rowan's Prepare.AI), Vahid Heydari (Co-PI), 1/1/2019 - 12/31/2021, $1,510,470.

Selected Talks

  • Invited Talk, "Moving Target Defense for IP-based Control," 16th National Cyber Summit, June 9, 2016.
  • Short Talk, "IP Hopping by Mobile IPv6," 37th IEEE Symposium on Security and Privacy, May 24, 2016.
  • Invited Talk, "Advanced Security Solutions in IPv6," National Security Agency Center of Academic Excellence Tech Talk series, May 19, 2016.

Honors and Awards

  • Best Student Poster Award (CISSE 2016).
  • Best Poster Award (ICCWS 2016).
  • Academic Excellence Award from Dean of Graduate Studies, Univ. of Alabama in Huntsville (2016).
  • Student Travel Grant for 37th IEEE Symposium on Security and Privacy, The Colloquium 2016, IEEE SecDev 2016, IEEE GLOBECOM 2016, and Real World Cryptography Conference 2017.
  • Honorary Member of Phi Kappa Phi and IEEE Eta Kappa Nu.

Videos

Interview with WAAY-TV about "Preventing Remote Cyber Attacks against Aircraft Avionic Systems"





Rowan SCADA Testbed