Ali Dehghantanha Explained
Ali Dehghantanha is an academic-entrepreneur in cybersecurity and cyber threat intelligence. He is a Professor of Cybersecurity and a Canada Research Chair in Cybersecurity and Threat Intelligence.[1]
Dehghantanha is a pioneer in applying machine learning techniques toward cyber threat hunting, cyber threat intelligence, and enterprise risk management. His research is highly cited in both academic and industrial settings.[2] He is the Founder and Director of Cyber Science Lab.[3]
Education
After completing his Diploma in Mathematics at National Organization for Development of Exceptional Talents (NODET), Dehghantanha attended Islamic Azad University, Mashhad Branch, from which he graduated with a bachelor's degree in Software Engineering in 2005. He earned his Master's and Doctoral degrees in Security in Computing from University Putra Malaysia in 2008 and 2011, respectively.[1]
Career
Dehghantanha started his academic career as Sr. Lecturer of Computer Science and Information Technology at the University Putra Malaysia in 2011, and later on joined the University of Salford as Marie Curie International Incoming Post-Doctoral Research Fellow in 2015.[4] From 2017 to 2018, he held appointment as Sr. Lecturer (Associate Professor) in the Department of Computer Science at the University of Sheffield.[5] Following this appointment, he joined the University of Guelph (UoG), Ontario, Canada, as an Associate Professor and Director of Master of Cybersecurity and Threat Intelligence program.[6] He became a Tier 2 NSERC Canada Research Chair in Cybersecurity and Threat Intelligence at the University of Guelph (UoG) in 2020.[7] He also holds a concurrent appointment as Adjunct Associate Professor in Schulich School of Engineering's Department of Electrical & Software Engineering at the University of Calgary since 2020.[8] He has developed two Master's programs in cybersecurity, one in the University of Guelph – Canada,[9] and another in the University of Salford.
Research
Dehghantanha is among highly cited researchers in cybersecurity.[2] He is well-recognized for his research in cyber threat intelligence,[10] and in several fields of cyber security including malware analysis,[11] Internet of Things (IoT) security, and digital forensics.[12]
Application of AI in Cyber Threat Hunting and Attribution
Dehghantanha was among the first to introduce some major security and forensics challenges within the Internet of Things (IoT) domain. He also reviewed previous studies published in this special issue targeting identified challenges.[13] In 2016, he proposed a two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. He has influenced the IoT/ICS network defense field by creating an Intrusion Detection System (IDS) for IoT networks, a secret sharing method of encryption key exchange in vehicular IoT networks, and a method for secret key sharing and distribution between IoT devices. He conducted experiments using NSL-KDD dataset, and proved that his proposed model outperforms previous models designed to detect U2R and R2L attacks.[14] His most notable contributions were made to building AI-based methods for cyber-attack identification and analysis in IoT.[15] [16] Moreover, he developed a Deep Recurrent Neural Network structure for in-depth analysis of IoT malware.[17]
Dehghantanha introduced ensemble-based multi-filter feature selection method for DDoS detection in cloud computing, and also discussed its applications in terms of detection rate and classification accuracy when compared to other classification techniques.[18] While presenting a systematic literature review of blockchain cyber security, he conducted a systematic analysis of the most frequently adopted blockchain security applications. The systematic review also highlights the future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain for AI data, and sidechain security.[19] Furthermore, he focused his study on machine learning aided Android malware classification, and also presented two machine learning aided approaches for static analysis of Android malware.[20]
Frameworks for Cybersecurity Technology Adoption and Organizational Risk Assessment
In 2019, Dehghantanha built a framework that models the impacts of adopting Privacy Enhancing Technologies (PETs) on the performance of SMEs in Canada.[21] He has also created several frameworks for security analysis of cloud platforms, including CloudMe,[22] OneDrive, Box, GoogleDrive, DropBox,[23] MEGA,[24] and SugarSync.[25] He also works to create frameworks for breach coaching and exposure management. In 2016, he published a book entitled Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, and explored the implications of cloud (storage) services and mobile applications on digital forensic investigations.[26]
Awards and honors
Bibliography
Books
- Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 1st Ed. (2016) ISBN 9780128053034
- Cyber Threat Intelligence (2018) ISBN 9783319739502
- Handbook of Big Data and IoT Security (2019) ISBN 9783030105433
- Blockchain Cybersecurity, Trust and Privacy (2020) ISBN 9783030381813
- Handbook of Big Data Privacy (2020) ISBN 9783030385576
- Handbook of Big Data Analytics and Forensics (2021) ISBN 9783030747527
Selected articles
- Pajouh, H. H., Javidan, R., Khayami, R., Dehghantanha, A., & Choo, K. K. R. (2016). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), 314–323.
- Osanaiye, O., Cai, H., Choo, K. K. R., Dehghantanha, A., Xu, Z., & Dlodlo, M. (2016). Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, 2016(1), 1–10.
- Milosevic, N., Dehghantanha, A., & Choo, K. K. R. (2017). Machine learning aided Android malware classification. Computers & Electrical Engineering, 61, 266–274.
- Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546.
- Taylor, P. J., Dargahi, T., Dehghantanha, A., Parizi, R. M., & Choo, K. K. R. (2020). A systematic literature review of blockchain cyber security. Digital Communications and Networks, 6(2), 147–156.
Notes and References
- Web site: Ali Dehghantanha - University of Guelph .
- Web site: Ali Dehghantanha – Google Scholar Profiel.
- Web site: Ali Dehghantanha - CyberScience Lab.
- Web site: A Dehghantanha - University of Salford .
- Web site: Digital Forensics Evidence Analysis via Intelligent Systems and Practices.
- Web site: Master of Cybersecurity and Threat Intelligence (MCTI).
- Web site: Canada Research Chairs.
- Web site: Electrical and Computer Engineering Contacts.
- Web site: University of Guelph launches one-of-a-kind cyber security program.
- Web site: COVID-19 causing increase in cyber attacks says U of G prof.
- Web site: Apple, Google not doing enough to fight app-store malware, say security experts.
- Web site: Ali Dehghantanha- ResearchGate Profile.
- Internet of Things security and forensics: Challenges and opportunities. 2018. 10.1016/j.future.2017.07.060. Conti. Mauro. Dehghantanha. Ali. Franke. Katrin. Watson. Steve. Future Generation Computer Systems. 78. 544–546. 1807.10438. 38283507.
- A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. 2019. 10.1109/TETC.2016.2633228. Pajouh. Hamed Haddad. Javidan. Reza. Khayami. Raouf. Dehghantanha. Ali. Choo. Kim-Kwang Raymond. IEEE Transactions on Emerging Topics in Computing. 7. 2. 314–323. 44175270.
- Book: https://ieeexplore.ieee.org/document/8859946. Smart Grid Cyber Attacks Detection Using Supervised Learning and Heuristic Feature Selection. 10.1109/SEGE.2019.8859946. 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE). 2019. Sakhnini. Jacob. Karimipour. Hadis. Dehghantanha. Ali. 108–112. 1907.03313. 978-1-7281-2440-7. 195833193.
- A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids. 2019. 10.1109/ACCESS.2019.2920326. Karimipour. Hadis. Dehghantanha. Ali. Parizi. Reza M.. Choo. Kim-Kwang Raymond. Leung. Henry. IEEE Access. 7. 80778–80788. 192625335. free.
- Cryptocurrency malware hunting: A deep Recurrent Neural Network approach. 2020. 10.1016/j.asoc.2020.106630. Yazdinejad. Abbas. Haddadpajouh. Hamed. Dehghantanha. Ali. Parizi. Reza M.. Srivastava. Gautam. Chen. Mu-Yen. Applied Soft Computing. 96. 106630. 225407725.
- Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. 2016. 10.1186/s13638-016-0623-3. Osanaiye. Opeyemi. Cai. Haibin. Choo. Kim-Kwang Raymond. Dehghantanha. Ali. Xu. Zheng. Dlodlo. Mqhele. EURASIP Journal on Wireless Communications and Networking. 2016. 17352259. free. 11427/34419. free.
- A systematic literature review of blockchain cyber security. 2020. 10.1016/j.dcan.2019.01.005. Taylor. Paul J.. Dargahi. Tooska. Dehghantanha. Ali. Parizi. Reza M.. Choo. Kim-Kwang Raymond. Digital Communications and Networks. 6. 2. 147–156. 86808618. free.
- Machine learning aided Android malware classification. 2017. 10.1016/j.compeleceng.2017.02.013. Milosevic. Nikola. Dehghantanha. Ali. Choo. Kim-Kwang Raymond. Computers & Electrical Engineering. 61. 266–274. 1039430 .
- Book: https://ieeexplore.ieee.org/document/8861821. Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains. 10.1109/CCECE.2019.8861821. 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE). 2019. Parizi. Reza M.. Homayoun. Sajad. Yazdinejad. Abbas. Dehghantanha. Ali. Choo. Kim-Kwang Raymond. 1–4. 1906.04953. 978-1-7281-0319-8. 186206585.
- CloudMe forensics: A case of big data forensic investigation. 2018. 10.1002/cpe.4277. Teing. Yee-Yang. Dehghantanha. Ali. Choo. Kim-Kwang Raymond. Concurrency and Computation: Practice and Experience. 30. 5. e4277. 1807.10218. 3317884.
- Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices. Australian Journal of Forensic Sciences. 3 March 2016. 48. 6. 615–642. Daryabar. F.. Dehghantanha. Ali. Eterovic-Soric. Brett. Choo. Kim-Kwang Raymond. 10.1080/00450618.2015.1110620. 112520209.
- Cloud storage forensics : MEGA as a case study. Australian Journal of Forensic Sciences. 18 April 2016. 49. 3. 344–357. Daryabar. F.. Dehghantanha. Ali. Choo. Kim-Kwang Raymond. 10.1080/00450618.2016.1153714. 111643510.
- SugarSync forensic analysis. Australian Journal of Forensic Sciences. 8 April 2015. 48. 1. 95–117. Shariatia. M.. Dehghantanha. Ali. Choo. Kim-Kwang Raymond. 10.1080/00450618.2015.1021379. 111218734.
- Web site: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.
- Web site: Ali Dehghantanha - infosecurity-magazine.
- Web site: Dr. Ali Dehghantanha Receives Outstanding Leadership Award.