Loading
IA-REDI | Information Assurance - Research, Education, and Development Institute

Research | Cybersecurity Education

Research

As the use of the Internet grows, so does the amount of cybercrime being committed. This cybercrime results in the loss of billions of dollars in revenue and the private exposure of confidential data. Cybersecurity Education combined with Technology is the major approach to fighting this wave of crime. Users of the Internet need to become security aware, and Universities and other educational institutions need to produce more trained cybersecurity defenders. Our research in cybersecurity education focus on the development of instructional materials for K-20 students.



People

Faculty

  • Dr. Jonathan Graham
  • Dr. Claude Turner
  • Dr. Thorna Humphries
  • Dr. Aurelia Williams

Graduate Students

  • Christopher Dixon
  • Willie Fuller
  • Deepika Gadam
  • Brittany Herring
  • LaKeishawn Hunter
  • Chris Lanclos
  • Moeti Masiane
  • Bredina Rogers
  • Reginald Sands
  • Gerine Staten
  • Curtis Steward
  • DeMarcus Thomas

Undergraduate

  • Deji Oladipupo
  • Dominique Piggot

Publications, Presentation, & Student Productivity

Faculty Publications

  • G. Hsieh, D. Paruchuri, C. Steward, E. Nwafor and D. Gadam, "Lessons Learned: Porting Java Applications to Android," to appear in Proc. 2013 Int'l Conf. on Software Engineering Research and Practice (SERP'13), July 2013, Las Vegas, NV.
  • R. Mullapudi and G. Hsieh, "A Monitored Student Testing Application Using Cloud Computing," to appear in Proc. 2013 Int'l Conf. on Frontiers in Education: Computer Science and Computer Engineering (FECS'13), July 2013, Las Vegas, NV.
  • G. Hsieh and E. Nwafor, "A Self-Protecting Security Framework for CDA Documents," to appear in Proc. 2013 Int'l Conf. on Security and Management (SAM'13), July 2013, Las Vegas, NV.
  • G. Hsieh and R.-J. Chen, "Design for a Secure Interoperable Cloud-Based Personal Health Record Service," in Proc. IEEE CloudCom 2012 Conf., pp. 472-479, Dec. 2012, Taipei, Taiwan, R.O.C.
  • R. Sands, G. Hsieh, W. Hendricks and A. Williams, "Building a Secure Virtual Lab Infrastructure for IT Education," in Proc. 2012 Int'l Conf. on Frontiers in Education: Computer Science and Computer Engineering (FECS'12), July 2012, Las Vegas, NV.
  • F. Doswell. Security and Privacy in Mobile Cloud Computing. Presented at PVAMU/TAMU Advance PAID Grant Workshop. May 2012.
  • Mullapudi, R., and G. Hsieh. A Monitored Student Testing Application Using Cloud Computing. 2013 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS'13). July 2013, Las Vegas, NV.
  • Hsieh, G., D. Paruchuri, C. Steward, E. Nwafor and D. Gadam. Lessons Learned: Porting Java Applications to Android. 2013 International Conference on Software Engineering and Practice (SERP'13). July 2013, Las Vegas, NV.
  • Hsieh, G., and E. Nwafor. A Self-Protecting Security Framework for CDA Document. 2013 International Conference on Security and Management (SAM'13). July 2013, Las Vegas, NV.
  • F. Doswell, D. Oladipupo & D. Piggott. Designing an Electronic Medical Records System Using Cloud Computing for a Community Health Center Environment. ADMI 2011. April 2011. Clemson, SC.
  • C. Lanclos & D. Thomas. Combination of iPads and Cloud Computing to Reduce Desktop Computer Usage. ADMI 2011. April 2011. Clemson, SC.
  • G. Hsieh & M. Masiane. Towards an Integrated Embedded Fine-Grained Information Protection Framework. ICISA 2011. April 2011. Jeju, Korea.
  • G. Hsieh. Towards Self-Protecting Security for e-Health CDA Documents, accepted for WORLDCOMP '11. July 2011. Las Vegas, NV.
  • G. Hsieh. Towards Self-Protecting Security for e-Health CDA Documents. In Proc. 2011 Int'l Conf. on Security and Management (SAM'11). pp. 637-643. July 2011. Las Vegas, NV.
  • A. Evans, A. Williams and J. Graham. Future of Digital Forensics: A Survey of Available Training. In Proc. 2011 Int'l Conf. on Frontiers in Education: Computer Science and Computer Engineering (FECS'11). July 2011, Las Vegas, NV.
  • R. Sands, G. Hsieh, W. Hendricks and A. Williams. Building a Secure Virtual Lab Infrastructure for IT Education Accepted for 2012 Int'l Conf. on Frontiers in Education: Computer Science and Computer Engineering (FECS'12). July 16-19, 2012. Las Vegas, NV.
  • J. Geter and A. Williams. Designing Interactive Learning Lesson Games to Teach Youth about Computer Forensics. Accepted for 2012 Int'l Conf. on Frontiers in Education: Computer Science and Computer Engineering (FECS'12). July 16-19, 2012. Las Vegas, NV.
  • G. Hsieh. Towards Self-Protecting Security for e-Health CDA Documents. Presented at 2011 Int'l Conf. on Security and Management (SAM'11). July 2011. Las Vegas, NV.
  • A. Williams Future of Digital Forensics: A Survey of Available Training. Presented at 2011 Int'l Conf. on Frontiers in Education: Computer Science and Computer Engineering (FECS'11). July 2011, Las Vegas, NV.
  • G. Hsieh. Towards Self-Protecting Security for e-Health CDA Documents, accepted for WORLDCOMP '11. July 2011. Las Vegas, NV.
  • F. Doswell, D. Oladipupo & D. Piggott. Investigation of Software Development in Secure Cloud Computing Environments. ADMI 2011. April 2011. Clemson, SC.
  • L. Hunter & B. Rogers. Designing an Electronic Medical Records System Using Cloud Computing for a Community Health Center Environment. ADMI 2011. April 2011. Clemson, SC.
  • J. Powell, A. Williams, L. Wahsheh and C. Hinds. Digital Forensics Investigation in Secure Cloud Computing Environments. ADMI 2011. April 2011. Clemson, SC.
  • B. Herring and A. Williams. Development of a Cloud Environment using vSphere. (Poster). ADMI 2011. April 2011. Clemson, SC.
  • C. Lanclos & D. Thomas. Combination of iPads and Cloud Computing to Reduce Desktop Computer Usage. ADMI 2011. April 2011. Clemson, SC.
  • G. Hsieh & M. Masiane. Towards an Integrated Embedded Fine-Grained Information Protection Framework. ICISA 2011. April 2011. Jeju, Korea.
  • F. Doswell and T. Ortiz. Laboratory Preparation for Forensic Analysis of Biometrically Enhanced Mobile Devices. ADMI 2010. April 2010. Jackson, MS.
  • G. Hsieh, R. Meeks and L. Marvel. Supporting Secure Embedded Access Control Policy with XACML+XML Security. FutureTech 2010. May 2010. Busan, Korea.

Presentations

  • G. Hsieh. "Building a Secure Virtual Lab Infrastructure for IT Education," in 2012 Int'l Conf. on Frontiers in Education: Computer Science and Computer Engineering (FECS'12), July 2012, Las Vegas, NV.
  • G. Hsieh. "Design for a Secure Interoperable Cloud-Based Personal Health Record Service," in IEEE CloudCom 2012 Conf., Dec. 2012, Taipei, Taiwan, R.O.C.
  • D. Piggott. Investigation of Software Development in Secure Cloud Computing Environments. ADMI 2011. April 2011. Clemson, SC.
  • L. Hunter & B. Rogers. Designing an Electronic Medical Records System Using Cloud Computing for a Community Health Center Environment. ADMI 2011. April 2011. Clemson, SC.
  • J. Powell. Digital Forensics Investigation in Secure Cloud Computing Environments. ADMI 2011. April 2011. Clemson, SC.
  • B. Herring. Development of a Cloud Environment using vSphere. (Poster). ADMI 2011. April 2011. Clemson, SC.
  • C. Lanclos & D. Thomas. Combination of iPads and Cloud Computing to Reduce Desktop Computer Usage. (Poster). ADMI 2011. April 2011. Clemson, SC.
  • F. Doswell and A. Williams. Cloud Computing Standards and Education. Lecture. ADMI 2011. April 2011. Clemson, SC.
  • G. Hsieh. Towards an Integrated Embedded Fine-Grained Information Protection Framework. ICISA 2011. April 2011. Jeju, Korea.

Graduate Thesis

  • Alexander Eng. "Forensic Mobile Imaging: An on-The-Go solution." M.S. Project. Completed May 2013.
  • Latoya Rich. "Android Forensics: Forensic Analysis of an Android Device." M.S. Project. Completed May 2013.
  • Tyisha Fennell. "Design of a Residential Keyless Access Solution Using A Mobile Device." M.S. Project. Completed in May 2013.
  • Tierra Brown & Brian McClanahan. "Application to Teach Machine Learning Concepts in a Cloud Computing Environment." B.S. Seminar Project. Completed in May 2013.
  • B. Rogers. Designing an Electronic Medical Records System Using Cloud Computing for a Community Health Center Environment. MS Project. May 2011.
  • L. Hunter. Designing an Electronic Medical Records System Using Cloud Computing for a Community Health Center Environment. MS Project. May 2011.
  • M. Masiane. Integrating XKMS into a Secure Embedded Fine-Grained Access Control Framework. MS Thesis. July 2010.
  • Leah Winkfield. "Developing a Personal Health Record Application for Android." B.S. Seminar Project. Completed in May 2013.
  • Brian McClanahan. Application to Teach Machine Learning Concepts in a Cloud Computing Environment. (Second Place Award for Undergraduate Poster Presentation). ADMI 2013 Conference. Virginia Beach, VA, April 11-13, 2013.
  • Dwijitha Paruchuri. "Developing a Personal Health Record Application for Android Platform." M.S. Thesis. Completed in April 2013.
  • Deepika Gadam. "Generating CDA Documents and Embedding XML Security." M.S. Thesis. Completed in March 2013.
  • RamaKrisha Mullapudi. "Monitored Student Testing Service using Cloud Computing." M.S. Project. Completed in January 2013.

Student Productivity

  • G. Hsieh and R. -J. Chen, "Desing for a Secure Interoperable Cloud-Based Personal Health Record Service," in Proc. IEEE CloudCom 2012 Conf., pp. 472-479, Dec. 2012, Taipei, Taiwan, R.O.C.
  • G. Hsieh and E. Nwafor. "A Self-Protecting Security Framework for CDA Document" 2013 International Conference on Security and Management (SAM' 13). July 2013, Las Vegas, NV.
  • D. Butts and F. Doswell. Poster: "Contradition: Public Access to Private Social Network Accounts, " Tapia Conference, Seattle, Washington. February 5-8, 2014.
  • T. Ezekwenna and F. Doswell. Poster: Secure Education Content through a Mobile Cloud Environment" Tapia Conference, Seattle, Washington. February 5-8, 2014.
  • D. Butts and F. Doswell. Paper and Presentation: "Design of a Comprehensive Tool to Decrease Public Access to Private Social Netowrk Accounts". Tapia Conference, Seattle, Washington. February 5-8, 2014.
  • D. Butts and F. Doswell. Paper and Presentation: "Design of a Comprehensive Tool to Decrease Public Access to Private Social Netowrk Accounts". ADMI 2014 Conference. Virginia Beach, VA, April 3-5, 2014.
  • Tyisha Fennell. Design of a Residential Keyless Access Solution Using a Mobile Device. (First Place Award for Graduate Poster Presentation). ADMI 2013 Conference. Virginia Beach, VA, April 11-13, 2013.
  • Alexander Eng. "Forensic Mobile Imaging: An on-The-Go solution." M.S. Project. Completed May 2013.
  • Latoya Rich. "Android Forensics: Forensic Analysis of an Android Device." M.S. Project. Completed May 2013.
  • Tyisha Fennell. "Design of a Residential Keyless Access Solution Using A Mobile Device." M.S. Project. Completed in May 2013.
  • Tierra Brown & Brian McClanahan. "Application to Teach Machine Learning Concepts in a Cloud Computing Environment." B.S. Seminar Project. Completed in May 2013.
  • Leah Winkfield. "Developing a Personal Health Record Application for Android." B.S. Seminar Project. Completed in May 2013.
  • Brian McClanahan. Application to Teach Machine Learning Concepts in a Cloud Computing Environment. (Second Place Award for Undergraduate Poster Presentation). ADMI 2013 Conference. Virginia Beach, VA, April 11-13, 2013.
  • Dwijitha Paruchuri. "Developing a Personal Health Record Application for Android Platform." M.S. Thesis. Completed in April 2013.
  • Deepika Gadam. "Generating CDA Documents and Embedding XML Security." M.S. Thesis. Completed in March 2013.
  • RamaKrisha Mullapudi. "Monitored Student Testing Service using Cloud Computing." M.S. Project. Completed in January 2013.
  • Nwafor, Ebelechukwu. "A Self-Protecting Security Framework for CDA Document." 2013 International Conference on Security and Management (SAM'13).
  • L. Hunter & B. Rogers. Look Into My Eyes: A Survey of Biometric Security., In Proceedings of the 10th International Conference on Information Technology: New Generations, pp. 422-427, April 2013.
  • J. Powell, A. Williams, L. Wahsheh and C. Hinds. Digital Forensics Investigation in Secure Cloud Computing Environments. ADMI 2011. April 2011. Clemson, SC.
  • B. Herring & A. Williams. Development of a Cloud Environment using vSphere. (Poster). ADMI 2011. April 2011. Clemson, SC.
  • W. Fuller. Mobile Cloud Computing Web Server and Storage Using Android Mobile Devices. NSU Research Colloquium. March 13-14, 2012. NSU, Norfolk, VA.
  • T. Ortiz. Acquisition of Biometric Data for Mobile Devices using Digital Forensic Techniques. NSU Research Colloquium. March 13-14, 2012. NSU, Norfolk, VA.
  • L. Rutherford. Privacy and Security Risk Assessment of Social Network Sites. NSU Research Colloquium. March 13-14, 2012. NSU, Norfolk, VA.
  • J. Blunt, B. Frazier and T. Pugh. A Social Network for NSU. Seminar Symposium. Department of Computer Science, Norfolk State University. April 2012.
  • J. Powell. Digital Forensics Investigation in a Cloud Computing Environment. M.S. Thesis. Department of Computer Science, Norfolk State University. May 2012.
  • J. Geter. Designing Interactive Learning Lesson Games to Teach Youth about Computer Forensics. M.S. Project. Department of Computer Science, Norfolk State University. May 2012.
  • W. Fuller. Mobile Cloud Computing Web Server and Storage Using Android Mobile Devices. M.S. Project. Department of Computer Science. Norfolk State University. May 2012.
  • T. Ortiz. Acquisition of Biometric Data for Mobile Devices using Digital Forensic Techniques. M.S. Thesis. Department of Computer Science, Norfolk State University. May 2012.
  • L. Rutherford. Privacy and Security Risk Assessment of Social Network Sites. Graduate Independent Study. Department of Computer Science, Norfolk State University.
  • J. Blunt, B. Frazier and T. Pugh. A Social Network for NSU. Seminar Project. Department of Computer Science, Norfolk State University. April 2012.
  • R. Sands. Building Secure Virtual Lab Environments using VMware Virtualization Infrastructure. M.S. Project. Department of Computer Science, Norfolk State University. Dec. 2011.
  • A. Rajpalem. Using Sun SPOT Technology for Developing Freight Management Applications. M.S. Project. Department of Computer Science, Norfolk State University. April 2012.

Resources

  • The Information Security Laboratory, with equipment in RTC 300, RTC 304 and Computer Science Server Room, is a state-of-the-art facility designed to support student learning and research in network security, cloud computing and big data. For network security experimentation, this lab is equipped with Cisco Networking Academy curriculum and equipment including: (a) nine Cisco Integrated Service Routers configured with Advanced Security (e.g., firewall, intrusion detection/prevention systems, and VPN), Wireless, and VoIP feature packages; (b) six Cisco Catalyst Ethernet switches with VLAN and port security features; and (c) sixteen PC’s loaded with VMware software for running multiple VMs of different operating systems on each physical PC.
  • The “Production” Hadoop Cluster is comprised of 12 data nodes and 5 master nodes with a total of 408 Intel Xeon 64-bit Cores, 1.4 TB RAM, and 312 TB hard disk storage. Two high-performance 10/40 Gb switches are used to connect the nodes within the cluster and the outside. The “Integration and Test” Hadoop Cluster is comprised of 5 nodes with a total of 120 Xeon 64-bit Cores, 640 GB RAM, and 18 TB hard disk storage.
  • The “Production” Cloud Computing System is comprised of four servers with a total of 64 Xeon 64-bit Cores, 1 TB RAM, and 30 TB hard disk storage. The “Integration and Test” Cloud Computing System is comprised of an enterprise-grade server (16 Xeon 64-bit Cores, 512 GB RAM, and 438 GB hard disk storage), one iSCSI SAN (7.2 TB hard disk storage), and two departmental-level servers (24 Xeon 64-bit Cores, 256 GB RAM, and 1.2 TB hard disk storage total). For learning, research, and development, there are additional servers (4), workstations (13), and PC’s (8) configured to support three developmental Hadoop clusters and two cloud computing systems. A third high-performance 10/40 Gb switch and two additional 1/10 Gb switches are used to provide 1 Gb+ connectivity for the equipment in the lab.
  • Overall, there will be approximately 630 Xeon-64 bit Cores, 3.8 TB RAM, and 370 TB hard disk storage available in this high-performance computing lab, representing an investment of over $600,000 in the past three years.

Additional Hardware

  • 8 PC's,
  • 2 Workstations
  • 16-port gigabit LAN switch

Additional Software

  • Microsoft Active Directory Server and DNS Server for identity and access management;
  • VMware vCenter Server for centralized management of the virtualization infrastructures
  • VMware vSphere ESX for hypervisor host
  • VMware View (Manager, Connection Server, Composer, Transfer Server, and Client) for virtual desktop infrastructures
  • VMware VMs (Windows 7, Windows XP, Ubuntu Linux, Windows 2008 Server.