- University News Archive - 糖心Vlog传媒 Little Rock /news-archive/tag/cyber-security/ 糖心Vlog传媒 Little Rock Wed, 28 Aug 2019 14:58:47 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 Google grant allows 糖心Vlog传媒 Little Rock to provide free cloud-based cybersecurity labs for Arkansas students /news-archive/2019/08/28/google-grant-cybersecurity-lab/ Wed, 28 Aug 2019 14:58:47 +0000 /news/?p=74934 ... Google grant allows 糖心Vlog传媒 Little Rock to provide free cloud-based cybersecurity labs for Arkansas students]]> A University of Arkansas at Little Rock professor has received a $10,000 Google grant that will help provide free cloud-based cybersecurity labs for junior high and high school students in Arkansas. Philip Huff, assistant professor of computer science and research associate with the Emerging Analytics Center, received $10,000 in Google Cloud Platform credits from Google鈥檚 education grants team. The credits will be used to host online cybersecurity labs in development at 糖心Vlog传媒 Little Rock.聽 Funded by a three-year from the National Science Foundation, the 糖心Vlog传媒 Little Rock Emerging Analytics Center is developing a free open-source, cybersecurity curriculum for students in Arkansas with assistance from the Arkansas Department of Higher Education. 鈥淕ov. Asa Hutchinson has expanded computer science education in Arkansas, and now the state wants to expand cybersecurity education as well. We want to play a central role in educating cybersecurity students and getting them ready for the workforce.鈥 The new curriculum is part of 糖心Vlog传媒 Little Rock鈥檚 effort to create a pipeline for students to fill cybersecurity positions in the workforce. Set to be launched later this fall, the curriculum will provide a variety of cybersecurity labs that teachers can provide to their students at no cost. The online lab environment, known as the Cyber Gym, will be placed on Google Cloud. 糖心Vlog传媒 Little Rock students who are developing the Cyber Gym workouts include Andrew Bombberger, Chance Melby, Ryan Ronquillio, and Verdin-Pol Ga茅tan. 鈥淭he main benefit of the grant is that it enables us to run the Cyber Gym for middle and high school teachers for most of the 2019-20 school year,鈥 Huff said. 鈥淲ith the $10,000, we have the ability to run 2,000 distinct classroom labs a month for six months. We are extremely grateful to Google for helping us provide these no-cost labs to students and their teachers.鈥澛 In the upper right photo, Philip Huff (left), 糖心Vlog传媒 Little Rock assistant professor and research fellow at Emerging Analytics Center, leads a cybersecurity workshop for high achool teachers from around the state. Photo by Ben Krain.]]> 糖心Vlog传媒 Little Rock researcher receives $2.4 million for cybersecurity research /news-archive/2019/07/19/nitin-agarwal-cybersecurity-grant/ Fri, 19 Jul 2019 14:48:25 +0000 /news/?p=74773 ... 糖心Vlog传媒 Little Rock researcher receives $2.4 million for cybersecurity research]]> Dr. Nitin Agarwal, director of the Collaboratorium for Social Media and Online Behavioral Studies () at the University of Arkansas at Little Rock, has been awarded a $2.4 million grant from the U.S. Department of Defense to develop ways to track emerging cyber-social threats and strengthen social cybersecurity research infrastructure.聽 The funding will support the development of research infrastructure to assess social media and blogs in real time and respond to the growing weaponization of online discourse in influencing peacekeeping, and tactical, operational, and strategic operations. The research infrastructure will include development of models, software applications, and training programs. Military units at all levels will benefit from the intended goals of the project in identification of threats and opportunities within the information environment. 鈥淲e appreciate the support from Sen. John Boozman for the social networking research at 糖心Vlog传媒 Little Rock,鈥 Agarwal said of the three-year grant. 鈥淭he senator recognizes the importance of developing new approaches, software tools, and training programs for national security in cyberspace, and this grant was enabled through his support of funding for the Navy鈥檚 Social Networks Analysis program.鈥 Boozman serves as chairman of the U.S. Senate Appropriations Subcommittee on Military Construction, Veterans Affairs and Related Agencies and has a seat on the Senate Appropriations Subcommittee on Defense. 鈥溙切腣log传媒 Little Rock continues to be an outstanding partner in the Navy鈥檚 efforts to track and counter our adversaries鈥 use of social media to bring harm to American interests at home and overseas,鈥 Boozman said. 鈥淭his award will expand capabilities at 糖心Vlog传媒 Little Rock and create opportunities for students to develop new skills and expertise in this important area of information science.鈥 Agarwal鈥檚 proposed research infrastructure will enable rapid and appropriate response that can neutralize propaganda and mitigate its negative effects. Social media platforms that are manipulated by adversarial campaigns can shift international and regional opinions about the use of military force or validity of military operations in a region. At the tactical level, social media propaganda could potentially be used to persuade susceptible targets to disrupt or delay military operations through protests or other 鈥渘on-lethal鈥 resistance. 鈥淭he aim of this project is to examine, evaluate, measure, and predict the threat level of the adversarial information campaigns,鈥 Agarwal said. Agarwal and his team will develop a multi-model approach to analyze adversarial information campaigns conducted online. Their research will identify key actors, groups, narratives, media integration strategies, and tactics deployed by those who disseminate disinformation and conduct influence operations.聽 The research approach will adopt a blend of computational modeling, big social data, and social science theoretical principles to examine cyber campaigns and assess the threats they pose. More specifically, the effort will bridge big data and social computing research communities to advance big data research infrastructure and security for the modern social and communication space.聽 COSMOS will develop research-informed solutions to surmount challenges in curating and analyzing social media data characterized by its volume, velocity, and variety. Training exercises will be conducted that will help enhance the U.S. workforce with skills in the challenging and changing domain of big data analytics, data management, machine learning, and artificial intelligence with applications in security. 鈥淲e hope to spark innovation and entrepreneurial aspirations in big data and its applications aligning with the knowledge-based economic development mission of the state of Arkansas,鈥 Agarwal said. 鈥淭his will not only help develop talent within Arkansas but also retain and acquire new talent.鈥 About the Collaboratorium for Social Media and Online Behavioral Studies (COSMOS) At COSMOS, researchers study various aspects of social media and online behavior under the direction of Dr. Nitin Agarwal, who is directing several projects with funding from the U.S. National Science Foundation, U.S. Army Research Office, U.S. Office of Naval Research, U.S. Air Force Research Lab, and the U.S. Defense Advanced Research Projects Agency. Research at COSMOS has contributed to computational social network analysis and advanced the studies in social cyber security, cyber campaign coordination, identifying powerful actors and groups, disinformation dissemination across social media, cyber threat monitoring, social-cyber forensics, health informatics, data mining, and privacy. COSMOS has developed publicly available social media mining tools, Blogtrackers and YouTubeTracker, used during NATO鈥檚 military exercises. COSMOS participates in the national Tech Innovation Hub launched by the U.S. Department of State鈥檚 Global Engagement Center to defeat foreign-based propaganda. For more information, visit .]]> Emerging Analytics Center hosts teacher workshop to promote cybersecurity education /news-archive/2019/06/26/emerging-analytics-center-hosts-teacher-workshop-to-promote-cybersecurity-education/ Wed, 26 Jun 2019 12:31:34 +0000 /news/?p=74606 ... Emerging Analytics Center hosts teacher workshop to promote cybersecurity education]]> The University of Arkansas at Little Rock Emerging Analytics Center hosted a three-day workshop for secondary education teachers who teach cybersecurity in Arkansas June 5-7.聽 Funded by a from the National Science Foundation, the workshop is part of a program to promote cybersecurity education in Arkansas high schools. The 20 participating teachers learned about the fundamentals of cybersecurity, including spoofing, network protection, cryptography, cyberattacks, web application security, and password cracking. Additionally, the teachers evaluated an open-source cybersecurity curriculum currently in development by 糖心Vlog传媒 Little Rock professors and graduate students. Members of the 糖心Vlog传媒 Little Rock Cybersecurity Club are creating cybersecurity exercises through cloud technology that high school teachers will be able to provide to their students at no cost beginning in the fall. This is part of 糖心Vlog传媒 Little Rock鈥檚 effort to create a pipeline for students to fill cybersecurity positions in the workforce. 鈥淭his workshop meets a significant need since the state of Arkansas is very interested in utilizing cybersecurity in secondary education,鈥 said Philip Huff, a research associate with the Emerging Analytics Center who ran the workshop. 鈥淕ov. Asa Hutchinson鈥檚 has expanded computer science education, and now they want to expand cybersecurity education. We want to play a central role in educating cybersecurity students and getting them ready for the workforce.鈥
Philip Huff (right), 糖心Vlog传媒 Little Rock assistant professor and research fellow at Emerging Analytics Center, leads a cybersecurity workshop for high achool teachers from around the state. Photo by Ben Krain.

Philip Huff (right), 糖心Vlog传媒 Little Rock assistant professor and research fellow at the Emerging Analytics Center, leads a cybersecurity workshop for high school teachers from around the state. Photo by Ben Krain.

Workshop participant Scott Maddox just finished up his first year as a cybersecurity instructor at Vilonia High School. He was inspired to make the switch from band director to cybersecurity teacher after Gov. Asa Hutchinson signed Arkansas Act 187, which required all of the state鈥檚 public and charter high schools to offer a course in computer coding. 鈥淲hen Gov. Hutchinson came out with the computer science education initiative, I really jumped on it, took a lot of training courses, and learned as much as I could,鈥 Maddox said. 鈥淚t鈥檚 been a very rewarding transition.鈥 Maddox said the most valuable part of the workshop has been gaining access to tools, programs, and activities that he can incorporate into his future classes. 鈥淥verall, the fact that we are getting some really good tools to use in the classroom is a great benefit,鈥 Maddox said. 鈥淭he big thing is the virtual lab environments that enables the students to utilize a lot of the techniques they are learning to defend against cyberattacks without negative consequences on our school鈥檚 network. That is very valuable for someone like me who doesn鈥檛 have a computer science background.鈥 ]]>
糖心Vlog传媒LR student researches how to keep cars safe from hacking /news-archive/2016/08/12/keep-cars-safe-hacking/ Fri, 12 Aug 2016 18:04:06 +0000 /news/?p=64887 ... 糖心Vlog传媒LR student researches how to keep cars safe from hacking]]> In 2015, two researchers a Jeep Cherokee being driven by a reporter who documented how the researchers controlled everything from the car鈥檚 radio and media console to its brakes and steering. For Dr. Shucheng Yu, an associate professor of computer science at the University of Arkansas at Little Rock, the exercise demonstrated how vulnerable smart cars with GPS, Bluetooth, and internet connections are to cyberattacks. 鈥淭hese cars have become the trend of the future,鈥 Yu said. 鈥淭here could be some very severe consequences if someone hacked into the car. A car can be fully controlled by the hacker if it is not protected.鈥 So Yu and his student, Zachary King, a junior majoring in computer science at 糖心Vlog传媒LR, spent the summer researching how to keep cars safe from cyberattacks. They worked on the project during an intensive eight-week summer research program at 糖心Vlog传媒LR. King was one of 10 college students from across the country recruited through a National Science Foundation grant-funded project, 鈥淩EU Site: CyberSAFE@糖心Vlog传媒LR: Cyber Security and Forensics Research at the University of Arkansas at Little Rock.鈥 The goal of the program is to decrease cyberattacks on people using mobile technology and social networking sites, said Dr. Mengjun Xie, an associate professor of computer science and director of the CyberSAFE@糖心Vlog传媒LR program. 鈥淭he basic idea is to integrate cybersecurity and cyber forensics research with the latest technology in mobile cloud computing and social media to provide research opportunities to students,鈥 Xie said. More than 130 students applied for 10 spots. Participants included undergraduate college students with a grade point average of 3.0 or higher who are majoring in computer science, computer engineering, math, physics, or electrical engineering. Those selected spent eight weeks conducting research full time with a faculty mentor at the University of Arkansas at Little Rock. Participants received a $4,000 stipend, on-campus housing, a meal plan, and travel expenses.

How to protect your smart car

In his project, 鈥淚nvestigating and Securing Communications in the Controller Area Network (CAN), King created a security protocol to protect smart cars from hacking. He also built an experimental environment that simulates the communication system in a smart car, which allows the security protocol to be tested through simulations. The research focuses on the development of a security protocol to protect the Controller Area Network (CAN), an internal communications system in vehicles. 鈥淭here are many ways that hackers can control CAN,鈥 King said. 鈥淥nce they access it, hackers can pretty easily control your car however they want. We are proposing to add a layer of security, so if an unauthorized person accesses it, they still wouldn鈥檛 be able to control your vehicle.鈥 The security protocol protects the CAN in two ways. It authenticates messages sent through the network by creating an authentication code. This authentication code allows nodes on the network to differentiate between a valid message and an attacker鈥檚 message. The second security feature protects against replay attacks, when a hacker attempts to breach the network by repeatedly sending an old message. The protocol uses a timestamp to calculate when the network last received the message, which verifies the message鈥檚 鈥渇reshness.鈥 Yu and King are continuing their research this fall. In the future, Yu hopes to collaborate with industry and funding agencies to implement the security protocol in commercial vehicles and protect cars from hackers. As for King, participating in this summer research program has left him considering a career in cybersecurity once he graduates in 2018. 鈥淭hree months ago, I wouldn鈥檛 have been able to tell you much about cybersecurity and what a security protocol would look like,鈥 he said. 鈥淎fter having completed this program, I am more interested in cybersecurity than I was before, and I may end up going that route.鈥

A summer of innovative research

The CyberSAFE@糖心Vlog传媒LR participants were honored during a commencement ceremony July 29 at the 糖心Vlog传媒LR Engineering and Information Technology Building. Their research topics range from utilizing cybersecurity and social network forensics to understanding cyber warfare to the use of facial emotion recognition for security purposes. The participants, faculty mentors, and projects included:
  • 聽聽聽聽聽Jonathan Ming, a junior at Azusa Pacific University (mentor: Mengjun Xie): 鈥淩emote Live Forensics for Android鈥
  • 聽聽聽聽聽Monica Bebawy, a junior at Azusa Pacific University (mentor: Mariofanna Milanova): 鈥淔acial Emotion Recognition for Security鈥
  • 聽聽聽聽聽Dennis Frank, a junior at Georgia Institute of Technology, and Jasmine Mabrey, a sophomore at Norfolk State University (mentor: Kenji Yoshigoe): 鈥淣eurological User Authentication: Security Framework鈥
  • 聽聽聽聽聽Antwane Lewis, a senior at Philander Smith College (mentor: Mengjun Xie): 鈥淩eal Time Motion-based Authentication for Smartwatch鈥
  • 聽聽聽聽聽Brandon Dalton, a sophomore at Wentworth Institute of Technology (mentor: Nitin Agarwal): 鈥淯tilizing Cyber and Social Network Forensics for the Understanding of Cyber Warfare鈥
  • 聽聽聽聽聽Edsel Paula-Aquina, a senior at Warren Wilson College, and Ying Vang, a senior at California State University-Fresno (mentor: Chia-Chu Chiang): 鈥淐omputer on Encrypted Data鈥
  • 聽聽聽聽聽Diana Anguiano, a senior at California State University-San Marcos (mentor: Mengjun Xie): 鈥淐omparison between Fingerprint Authentication and Behavioral Biometric Authentication using 2D and 3D Gestures鈥
For more information, contact Mengjun Xie at 501.569.8134 or mxxie@ualr.edu. In the upper right photo, CyberSAFE@糖心Vlog传媒LR participants and faculty mentors, from left to right, are: Front row: Monica Bebawy, Brandon Dalton, and Diana Anguiano; Second row: Dr. Mengjun Xie, Dennis Frank, and Jasmine Mabrey; Third row: Jonathan Ming, Ying Vang, Antwane Lewis, and Dr. Kenji Yoshigoe; and Back row: Edsel Paula-Aquino, Zachary King, graduate assistant Yanyan Li, and Dr. Mariofanna Milanova.]]>
糖心Vlog传媒LR team takes third place in Cyber Defense Competition /news-archive/2016/03/23/ualr-takes-third-cyber-defense-competition/ Wed, 23 Mar 2016 14:38:39 +0000 /news/?p=63801 ... 糖心Vlog传媒LR team takes third place in Cyber Defense Competition]]> The University of Arkansas at Little Rock Cyber Security Club recently earned the highest finish ever for an Arkansas university at the . 糖心Vlog传媒LR鈥檚 Cyber Security Club team, comprised of captain Andrew Lewis as well as Blaise Koch, Connor Young, Dylan Hailey, Jeffery Wooldridge, John Henry, Tommy Haycraft, and Yanyan Li, finished third in the March 12-13 competition at Texas A&M University-San Antonio. The team initially competed in a virtual qualifier with 22 other squads and was one of eight that advanced to the regional competition. During the regional event, participants spent two days simulating an information technology department at an imaginary health insurance company called Insuracomm. Each team was assigned a room with six computers and charged with tasks like running the company website, setting up an email server, developing social media policies, and handling information technology requests. However, their assignments got more complicated as professional testers constantly tried to sabotage their efforts. 鈥淲e were asked to keep a bunch of industry services up and running, and that in itself is very difficult,鈥 Koch said. 鈥淧rofessional penetration testers were tasked with bringing our services down. Think of them as legal hackers. They are the ones companies pay to find holes in their security before the bad guys do.鈥 Mengjun Xie, faculty advisor of the Cyber Security Club, said the competition demonstrates to students how their cyber security skills can be used in the real world. 鈥淓verything is online. Data often becomes the most valuable asset for most companies, universities, and all types of organizations,鈥 Xie said. 鈥淥nce the students participate in this competition, they have a very strong motivation to learn. This national competition attracts so much attention.鈥 One of the real-world problems the team had to investigate was the company鈥檚 vulnerability to an attack similar to what happened to Ashley Madison, the online dating website for married people that was hacked in 2015. Since the competition鈥檚 fake insurance company deals with health insurance, the team had to follow strict national laws that protect personal health information. 鈥淓very competition I have gone to you face a challenge in modern-day security,鈥 Lewis said. 鈥淵ou never know what you will get with these competitions. Sometimes we build an entire network and then defend it against hackers. It is always changing. The idea is to learn about modern vulnerability and security issues. Everyone knows what happened at Ashley Madison. One of our assignments was to see if our website was vulnerable to the Ashley Madison attacks.鈥 The College of Engineering and Information Technology and the Department of Computer Science sponsored the Cyber Security Club鈥檚 trip to the competition. Dr. Kenji Yoshigoe, chair of the 糖心Vlog传媒LR Department of Computer Science, noted a team from the university first competed in a regional qualifier merely three years ago. 鈥淪ince then, the team has come a long way and became one of the dominating teams in the Southwest region,鈥 聽Yoshigoe said. 鈥淥n behalf of the Computer Science Department, I would like to congratulate them on their great accomplishment.” In the upper right photo, pictured in the front row, from left to right, are Mengjun Xie, Andrew Lewis, Blaise Koch, John Henry, and Yanyan Li. Pictured in the back row, from left to right, are Tommy Haycraft, Connor Young, Jeffery聽Wooldridge, and Dylan Hailey.]]>