H.I.T. Laboratory was established in 2004 and is an abbreviation of Hackers In inTrusion. Our laboratory conducts research on a broad area of theory and applications related to network security and privacy. We also propose solutions on the attack and defense of misbehavior in the network. We also perform research on many protocols and application security.
Our research interests span several areas of computer network security including
- Mobile Communications Security
- Emerging Wireless Application Security
- Smartphones Security
- The Internet Security
The detailed information on our research area is described in Projects.
Why Network Security?
Computer infrastructures today are implemented in a networked environment; where it is susceptible to attacks. There is a need for a secure solution to prevent unauthorized access, privilege escalation, or invasion of privacy in the services and systems. Network security is a broadly recognized field. It’s getting the spotlight as the industry is leaning towards a total security solution.
Security protocols, systems such as intrusion detection systems (IDS), and algorithms related to security applications are being researched in security field. We try to understand the network security communications systems as a whole and deal with the issues from the ground up. We try to provide sound solutions for solving the problems which is a threat to the network security system. Network security is like a vicious cycle of patch work after patch work after a breach in security. We need to proactively protect the network and react accordingly before a violation actually occurs.
For this purpose, we conduct research on existing security protocols and check the network status by closely monitoring the Intrusion Detection/Prevent System or Network Monitoring System. We also need to increase our knowledge basis regarding Internet Traffic Characterization.
Security in Wireless / Mobile Communications
- 3G and 4G Wireless Network
- Wireless LAN (IEEE 802.11i)
- Vehicle Ad-hoc Network (VANET)
- Machine To Machine (M2M)
Security in Emerging Applications
- Telemedicine and e-Healthcare
- Pay-TV and (Mobile) IP-TV
- Cloud Computing
- Smart Grid
Embedded System Analysis
- Reverse Engineering
- Digital Forensic
- Network Penetration Test
Characterization and Modeling
- Traffic Characterization and Modeling
- Security Optimization for Wireless Network