Networking and Cybersecurity

Overview

Director Terry Benzel

With roots in early Internet infrastructure research and development, ISI's Networking and Cybersecurity Division carries out a broad program of research spanning the areas of networking scientific investigations, Internet operations and governance, cybersecurity research topics, and a variety of infrastructure projects for experimentation and collaboration. These can be grouped into three general areas:

  • Research, Methods and Infrastructure for Cyber Experimentation
  • Network Infrastructure Supporting Science, Data and Operations
  • Roles of People in Cyber Scenarios

Collaboration and community underlie all of our research areas – from experimental infrastructure co-development and the large user community to data sharing and Internet operations. In addition to these activities, we initiated three new educationally focused collaborations. In one, we are working with a consortium of universities to understand how people learn by using testbeds, while the other collaborations are focused on opportunities for high school and undergraduate students.

Research Methods and Infrastructure for Cyber Experimentation

This research area brings together strength in developing experimental methodologies and tools for research across a wide range of challenging problems of increasing scale and complexity.

Network Infrastructure Supporting Science, Data and Operations

A deep understanding of the Internet's structure, behavior and operations focuses on Internet measurement, data sharing, and developing research topics drawn from operational support for the core Internet. In addition, high-performance advanced networking supports emerging national research platforms for global science initiatives.

Roles of People in Cyber Scenarios

Humans are often seen as the weakest link in cybersecurity. Modeling, analyzing and developing methods for understanding and adapting the human in cyber systems is a significant challenge. New initiatives in this area address behavior toward passwords and techniques for modeling and experimentation.