Security in Wireless Network and Cyber Physical System

Cyber Physical Aquaponics System (CyPhA), An automated testbed with modular and scalable design.

  • "POSTER: A Cyber-Physical Aquaponics System (CyPhA) Testbed", is accepted in CPS-Week 2023, ICCPS conference. and preprint version is available on arxiv [pdf]

  • Wi-Fi security protocol attack detection using machine learning.

  • Our Work "kTRACKER: Passively Tracking KRACK using ML Model" is accepted as poster in CODASPY 2022, and I'll present our work in "The 12th ACM Conference on Data and Application Security and Privacy April 25 - 27, 2022. Baltimore-Washington DC Area, United States".[pdf]

  • Our Work "CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake using Gradient Boosting based Ensemble Learning " is available on eprint.[pdf]
  • Our Work "CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake using Gradient Boosting based Ensemble Learning " is accepted in IEEE TDSC.[pdf]
  • Power Grid Attack Protection using Machine Learning.

  • Our Work "Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining" to be appear in "CPSIoTSec 2020" workshop of ACM CCS".[pdf][slides][talk]
  • Platform for Evaluating Cyber Security Solutions and providing neutral testing.

  • Above work resulted in article "CyberSecurity Solution Evaluation" published in Association of Small & Medium Enterprises(ASME) Singapore in January 2019 issue.[article]
  • Hybrid Simulation of Virtual Operational Technology Network specifically Power Tested.

  • Above work resulted in paper "VOTNET: Hybrid Simulation of Virtual Operational Technology Network for Cybersecurity Assessment" accepted in Winter Simulation Conference 2018 helding in Gothenburg Sweden.[pdf]
  • Modeling Insider Threat in CPS.

  • Above work resulted in paper "Poster: Physics-Based attack detection for an Insider threat Model in a Cyber-Physical System" published in Asia CCS 2018 held in Incheon South Korea.[pdf]
  • Looking for Anomalous Behaviour of system, if malicious code is injected.

  • Above work resulted in paper "Ladder Logic Bomb in ICS" published in CyberICPS 2017 held with Esorics in Oslo Norway.[pdf][springer][slides]
  • Media Coverage

      Helpnet Security
      Security Week
  • Providing security in CPS through Virtualization.

  • Above work resulted in paper "Towards high-interaction virtual ICS honeypots-in-a-box" published in CPS-SPC 2016 held with CCS in Vienna Austria.[pdf][slides]
  • Comparison and Counting based sorting appraoch in one algorithm.

  • Above work resulted in paper "Concom Sorting Algorithm" published in ICCSNT 2016 held in Harbin China.[pdf]