Ali Dehghantanha is an academic-entrepreneur in cybersecurity and cyber threat intelligence. He is a Professor of Cybersecurity and a Canada Research Chair in Cybersecurity and Threat Intelligence.[1]

Ali Dehghantanha
Born1982
Mashhad, Iran
NationalityIranian - Canadian
OccupationAcademic entrepreneur
Known forResearch in the field of cybersecurity and threat intelligence
AwardsOutstanding Leadership Award, IEEE
Marie-Curie International Incoming Fellowship
Research Excellence Award, University of Guelph College of Engineering and Physical Sciences
Academic background
EducationPh.D. Security in Computing – University Putra Malaysia
Academic work
InstitutionsUniversity of Guelph, ON, Canada
University of Salford, Manchester, UK

Dehghantanha is a pioneer in applying machine learning techniques toward cyber threat hunting, cyber threat intelligence, and enterprise risk management. His research is highly cited in both academic and industrial settings.[2] He is the Founder and Director of Cyber Science Lab.[3]

Education

edit

After completing his Diploma in Mathematics at National Organization for Development of Exceptional Talents (NODET), Dehghantanha attended Islamic Azad University, Mashhad Branch, from which he graduated with a bachelor's degree in Software Engineering in 2005. He earned his Master's and Doctoral degrees in Security in Computing from University Putra Malaysia in 2008 and 2011, respectively.[1]

Career

edit

Dehghantanha started his academic career as Sr. Lecturer of Computer Science and Information Technology at the University Putra Malaysia in 2011, and later on joined the University of Salford as Marie Curie International Incoming Post-Doctoral Research Fellow in 2015.[4] From 2017 to 2018, he held appointment as Sr. Lecturer (Associate Professor) in the Department of Computer Science at the University of Sheffield.[5] Following this appointment, he joined the University of Guelph (UoG), Ontario, Canada, as an Associate Professor and Director of Master of Cybersecurity and Threat Intelligence program.[6] He became a Tier 2 NSERC Canada Research Chair in Cybersecurity and Threat Intelligence at the University of Guelph (UoG) in 2020.[7] He also holds a concurrent appointment as Adjunct Associate Professor in Schulich School of Engineering's Department of Electrical & Software Engineering at the University of Calgary since 2020.[8] He has developed two Master's programs in cybersecurity, one in the University of Guelph – Canada,[9] and another in the University of Salford.

Research

edit

Dehghantanha is among highly cited researchers in cybersecurity.[2] He is well-recognized for his research in cyber threat intelligence,[10] and in several fields of cyber security including malware analysis,[11] Internet of Things (IoT) security, and digital forensics.[12]

Application of AI in Cyber Threat Hunting and Attribution

edit

Dehghantanha was among the first to introduce some major security and forensics challenges within the Internet of Things (IoT) domain. He also reviewed previous studies published in this special issue targeting identified challenges.[13] In 2016, he proposed a two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. He has influenced the IoT/ICS network defense field by creating an Intrusion Detection System (IDS) for IoT networks, a secret sharing method of encryption key exchange in vehicular IoT networks, and a method for secret key sharing and distribution between IoT devices. He conducted experiments using NSL-KDD dataset, and proved that his proposed model outperforms previous models designed to detect U2R and R2L attacks.[14] His most notable contributions were made to building AI-based methods for cyber-attack identification and analysis in IoT.[15][16] Moreover, he developed a Deep Recurrent Neural Network structure for in-depth analysis of IoT malware.[17]

Dehghantanha introduced ensemble-based multi-filter feature selection method for DDoS detection in cloud computing, and also discussed its applications in terms of detection rate and classification accuracy when compared to other classification techniques.[18] While presenting a systematic literature review of blockchain cyber security, he conducted a systematic analysis of the most frequently adopted blockchain security applications. The systematic review also highlights the future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain for AI data, and sidechain security.[19] Furthermore, he focused his study on machine learning aided Android malware classification, and also presented two machine learning aided approaches for static analysis of Android malware.[20]

Frameworks for Cybersecurity Technology Adoption and Organizational Risk Assessment

edit

In 2019, Dehghantanha built a framework that models the impacts of adopting Privacy Enhancing Technologies (PETs) on the performance of SMEs in Canada.[21] He has also created several frameworks for security analysis of cloud platforms, including CloudMe,[22] OneDrive, Box, GoogleDrive, DropBox,[23] MEGA,[24] and SugarSync.[25] He also works to create frameworks for breach coaching and exposure management. In 2016, he published a book entitled Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, and explored the implications of cloud (storage) services and mobile applications on digital forensic investigations.[26]

Awards and honors

edit

Bibliography

edit

Books

edit
  • Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 1st Ed. (2016) ISBN 9780128053034
  • Cyber Threat Intelligence (2018) ISBN 9783319739502
  • Handbook of Big Data and IoT Security (2019) ISBN 9783030105433
  • Blockchain Cybersecurity, Trust and Privacy (2020) ISBN 9783030381813
  • Handbook of Big Data Privacy (2020) ISBN 9783030385576
  • Handbook of Big Data Analytics and Forensics (2021) ISBN 9783030747527

Selected articles

edit
  • Pajouh, H. H., Javidan, R., Khayami, R., Dehghantanha, A., & Choo, K. K. R. (2016). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), 314–323.
  • Osanaiye, O., Cai, H., Choo, K. K. R., Dehghantanha, A., Xu, Z., & Dlodlo, M. (2016). Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, 2016(1), 1–10.
  • Milosevic, N., Dehghantanha, A., & Choo, K. K. R. (2017). Machine learning aided Android malware classification. Computers & Electrical Engineering, 61, 266–274.
  • Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546.
  • Taylor, P. J., Dargahi, T., Dehghantanha, A., Parizi, R. M., & Choo, K. K. R. (2020). A systematic literature review of blockchain cyber security. Digital Communications and Networks, 6(2), 147–156.

References

edit
  1. ^ a b "Ali Dehghantanha - University of Guelph".
  2. ^ a b "Ali Dehghantanha – Google Scholar Profiel".
  3. ^ "Ali Dehghantanha - CyberScience Lab".
  4. ^ "A Dehghantanha - University of Salford".
  5. ^ "Digital Forensics Evidence Analysis via Intelligent Systems and Practices".
  6. ^ "Master of Cybersecurity and Threat Intelligence (MCTI)".
  7. ^ a b "Canada Research Chairs".
  8. ^ "Electrical and Computer Engineering Contacts".
  9. ^ "University of Guelph launches one-of-a-kind cyber security program".
  10. ^ "COVID-19 causing increase in cyber attacks says U of G prof".
  11. ^ "Apple, Google not doing enough to fight app-store malware, say security experts".
  12. ^ "Ali Dehghantanha- ResearchGate Profile".
  13. ^ Conti, Mauro; Dehghantanha, Ali; Franke, Katrin; Watson, Steve (2018). "Internet of Things security and forensics: Challenges and opportunities". Future Generation Computer Systems. 78: 544–546. arXiv:1807.10438. doi:10.1016/j.future.2017.07.060. S2CID 38283507.
  14. ^ Pajouh, Hamed Haddad; Javidan, Reza; Khayami, Raouf; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (2019). "A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks". IEEE Transactions on Emerging Topics in Computing. 7 (2): 314–323. doi:10.1109/TETC.2016.2633228. S2CID 44175270.
  15. ^ Sakhnini, Jacob; Karimipour, Hadis; Dehghantanha, Ali (2019). "Smart Grid Cyber Attacks Detection Using Supervised Learning and Heuristic Feature Selection". 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE). pp. 108–112. arXiv:1907.03313. doi:10.1109/SEGE.2019.8859946. ISBN 978-1-7281-2440-7. S2CID 195833193.
  16. ^ Karimipour, Hadis; Dehghantanha, Ali; Parizi, Reza M.; Choo, Kim-Kwang Raymond; Leung, Henry (2019). "A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids". IEEE Access. 7: 80778–80788. doi:10.1109/ACCESS.2019.2920326. S2CID 192625335.
  17. ^ Yazdinejad, Abbas; Haddadpajouh, Hamed; Dehghantanha, Ali; Parizi, Reza M.; Srivastava, Gautam; Chen, Mu-Yen (2020). "Cryptocurrency malware hunting: A deep Recurrent Neural Network approach". Applied Soft Computing. 96: 106630. doi:10.1016/j.asoc.2020.106630. S2CID 225407725.
  18. ^ Osanaiye, Opeyemi; Cai, Haibin; Choo, Kim-Kwang Raymond; Dehghantanha, Ali; Xu, Zheng; Dlodlo, Mqhele (2016). "Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing". EURASIP Journal on Wireless Communications and Networking. 2016. doi:10.1186/s13638-016-0623-3. hdl:11427/34419. S2CID 17352259.
  19. ^ Taylor, Paul J.; Dargahi, Tooska; Dehghantanha, Ali; Parizi, Reza M.; Choo, Kim-Kwang Raymond (2020). "A systematic literature review of blockchain cyber security". Digital Communications and Networks. 6 (2): 147–156. doi:10.1016/j.dcan.2019.01.005. S2CID 86808618.
  20. ^ Milosevic, Nikola; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (2017). "Machine learning aided Android malware classification". Computers & Electrical Engineering. 61: 266–274. doi:10.1016/j.compeleceng.2017.02.013. S2CID 1039430.
  21. ^ Parizi, Reza M.; Homayoun, Sajad; Yazdinejad, Abbas; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (2019). "Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains". 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE). pp. 1–4. arXiv:1906.04953. doi:10.1109/CCECE.2019.8861821. ISBN 978-1-7281-0319-8. S2CID 186206585.
  22. ^ Teing, Yee-Yang; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (2018). "CloudMe forensics: A case of big data forensic investigation". Concurrency and Computation: Practice and Experience. 30 (5): e4277. arXiv:1807.10218. doi:10.1002/cpe.4277. S2CID 3317884.
  23. ^ Daryabar, F.; Dehghantanha, Ali; Eterovic-Soric, Brett; Choo, Kim-Kwang Raymond (3 March 2016). "Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices". Australian Journal of Forensic Sciences. 48 (6): 615–642. doi:10.1080/00450618.2015.1110620. S2CID 112520209.
  24. ^ Daryabar, F.; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (18 April 2016). "Cloud storage forensics : MEGA as a case study". Australian Journal of Forensic Sciences. 49 (3): 344–357. doi:10.1080/00450618.2016.1153714. S2CID 111643510.
  25. ^ Shariatia, M.; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (8 April 2015). "SugarSync forensic analysis". Australian Journal of Forensic Sciences. 48 (1): 95–117. doi:10.1080/00450618.2015.1021379. S2CID 111218734.
  26. ^ "Contemporary Digital Forensic Investigations of Cloud and Mobile Applications".
  27. ^ "Ali Dehghantanha - infosecurity-magazine".
  28. ^ "Dr. Ali Dehghantanha Receives Outstanding Leadership Award".