Arun Viswanathan

ORCID: 0000-0003-1848-6590
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Smart Grid Security and Resilience
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • Space exploration and regulation
  • Infrastructure Resilience and Vulnerability Analysis
  • Space Science and Extraterrestrial Life
  • Systems Engineering Methodologies and Applications
  • Simulation Techniques and Applications
  • Education Methods and Practices
  • Internet Traffic Analysis and Secure E-voting
  • Smart Grid Energy Management
  • Opportunistic and Delay-Tolerant Networks
  • Complex Network Analysis Techniques
  • Software Engineering Techniques and Practices
  • Space Satellite Systems and Control
  • Distributed systems and fault tolerance
  • Software-Defined Networks and 5G
  • Cybersecurity and Cyber Warfare Studies
  • Software Engineering Research
  • Service-Oriented Architecture and Web Services
  • Data Visualization and Analytics
  • Adversarial Robustness in Machine Learning
  • Cooperative Communication and Network Coding

Jet Propulsion Laboratory
2016-2024

University of Southern California
2012-2016

America's critical infrastructure is becoming "smarter"and increasingly dependent on highly specialized computers called industrial control systems (ICS). Networked ICS components now the Internet of Things (IIoT) are at heart "smart city", controlling infrastructure, such as CCTV security networks, electric grids, water and transportation systems. Without continuous, reliable functioning these assets, economic social disruption will ensue. Unfortunately, IIoT hackable difficult to secure...

10.1109/access.2018.2867556 article EN cc-by IEEE Access 2018-01-01

Once a novelty, small satellites, often referred to as CubeSats, have become important tools for variety of space activities ranging from exploration defense. Their relative affordability and short development timeline made them attractive options complement larger vehicles, conduct reconnaissance other finite tasks. The specialized nature many CubeSat missions do not make their security any less could easily be matters national security. This paper demonstrates the use attack tree analysis...

10.1109/smc-it51442.2021.00016 article EN 2021-07-01

Despite the significant increase in cyber threats to space systems, structured technical community engagement cybersecurity and mission resilience with an emphasis on systematic advancement of guidance is lacking. The international group co-authors propose development a system standard intended for commercial-off-the-shelf (COTS) modular such as CubeSats.

10.2514/6.2022-4302 article EN ASCEND 2022 2022-10-15

Effective analysis of raw data from networked systems requires bridging the semantic gap between and user's high-level understanding system. The represents facts about system state involves identifying a set semantically relevant behaviors, which represent interesting relationships these facts. Current tools, such as wireshark splunk, restrict to low-level individual provide limited constructs aid users in gap. Our objective is enable at level closer or process. key our approach introduction...

10.5555/1972457.1972471 article EN Networked Systems Design and Implementation 2011-03-30

This paper presents a systems analysis approach to characterizing the risk of Smart Grid load-drop attack. A characterization is necessary for design detection and remediation strategies address consequences such attacks. Using concepts from health management system engineering, this work (a) first identifies metrics that can be used generate constraints security features, (b) lays out an end-to-end integrated methodology using separate network power simulations assess risk. We demonstrate...

10.1109/smartgridcomm.2013.6688000 article EN 2013-10-01

In the future, automated demand response mechanisms will be used as spinning reserve. Demand in smart grid must resilient to cyber-physical threats. this paper, we evaluate resilience of when reserve presence We quantify evaluation by correlating stability system attacks measured frequency (Hz) and attack level amount load (MW) that responds event. The results demonstrate importance anticipating dependability before it can relied upon

10.3390/electronics6010002 article EN Electronics 2016-12-28

The people responsible for building the IT products and infrastructure of tomorrow – today’s students computing disciplines oftentimes do not have opportunity or proper motivation to develop cybersecurity skills meeting needs job market. This paper introduces High Fidelity Live eXercises (HiFLiX) a teaching/learning activity designed expose challenges resembling those they could face in future work environment. We describe HiFLiX prototype study, conducted as collaboration between...

10.24251/hicss.2019.911 article EN cc-by-nc-nd Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2019-01-01

Multiresolution semantic analysis of data involves inferring increasing levels meaning from data. Due to the large volume and complexity network data, multi resolution visualizations allow user rapidly focus on meaningful relevant information. Current tools techniques for visual are limited in their ability operate at semantically resolutions impose great cognitive burden users manually infer semantics low-level details. Extending our previous work that allows define as abstract models, we...

10.1109/icsc.2011.80 article EN 2011-09-01

Cubesats are becoming ubiquitous in Low Earth Orbit with operators ranging from the U.S. Government to commercial businesses, university teams and even hobbyists. However cubesats small satellites vulnerable range of cyberattacks on ground segment, link segment Space Segment. Testing understanding threats all segments a mission can be daunting, especially for that not well funded or lack resources test development. sci_Zone along AIAA Aerospace Cybersecurity Working Group created LinkStar...

10.2514/6.2022-0239 article EN AIAA SCITECH 2022 Forum 2022-01-03

Machine learning for cyber defense offers the promise of detecting adversarial activity against ground data systems managing critical space assets. A fundamental challenge facing machine research in cybersecurity is lack high-fidelity, shareable datasets robust evaluation and testing learning-based solutions. High-fidelity, real-world are necessary reliable benchmarking nominal system behavior malicious activity. Unfortunately, such realistic both rarely shared publicly by owners due to...

10.2514/6.2020-4117 article EN ASCEND 2022 2020-11-02

Technology development efforts in autonomy and cyber-defense have been evolving independently of each other, over the past decade. In this paper, we report our ongoing effort to integrate these two presently distinct areas into a single framework. To end, propose two-player partially observable stochastic game formalism capture both high-level autonomous mission planning under uncertainty adversarial decision making subject imperfect information. We show that synthesizing sub-optimal...

10.1109/spw50608.2020.00046 article EN 2020-05-01

Technology development efforts in autonomy and cyber-defense have been evolving independently of each other, over the past decade. In this paper, we report our ongoing effort to integrate these two presently distinct areas into a single framework. To end, propose two-player partially observable stochastic game formalism capture both high-level autonomous mission planning under uncertainty adversarial decision making subject imperfect information. We show that synthesizing sub-optimal...

10.48550/arxiv.2002.01969 preprint EN other-oa arXiv (Cornell University) 2020-01-01

This paper describes a five-month study of an experimental reputation management system for large-scale communication network at the Jet Propulsion Laboratory. Our objective is to detect anomalous peers in large scale networks by continuously evaluating peer using activity. We evaluated several algorithms our research, and while providing robust protection, most were considered too computationally expensive or otherwise impractical. Considering computational efficiency, required transaction...

10.2514/6.2021-4083 article EN ASCEND 2022 2021-11-03
Coming Soon ...