{"584631":{"#nid":"584631","#data":{"type":"news","title":"Beyah, Liao Place Third at Cyber Security Awareness Week Applied Research Competition","body":[{"value":"\u003Cp\u003ERaheem Beyah and Xiaojing Liao won third place at the Cyber Security Awareness Week (CSAW) Applied Research Competition, a prestigious contest for graduate and doctoral level security researchers who have published papers in the last year.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EHeld at New York University in New York City, CSAW is the world\u0026rsquo;s largest student-run security games, which feature six different competitions for students ranging from high school grades through those who are in doctoral programs.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EBeyah is the Motorola Foundation Professor in the Georgia Tech School of Electrical and Computer Engineering (ECE) and is the School\u0026rsquo;s associate chair for Strategic Initiatives and Innovation, and Liao is his Ph.D. student in the Communications Assurance and Performance Group. They were honored for their paper, \u0026ldquo;Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence,\u0026rdquo; which they coauthored with Kan Yuan, Xiaofeng Wang, and Luyi Xing, their colleagues at Indiana University-Bloomington, and Zhou Li, their colleague who works at RSA.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ETo adapt to the rapidly evolving landscape of cyber threats, security\u0026nbsp;professionals are actively exchanging Indicators of Compromise (IOC), such as malware signatures and botnet IPs through public\u0026nbsp;sources like blogs, forums, and tweets. With hundreds of thousands of sources in the wild, the IOC data are produced at a high volume and velocity\u0026nbsp;today, which becomes increasingly hard to manage by humans. This team\u0026rsquo;s paper describes a solution that they developed which uses natural language processing and machine learning techniques to automate the reading of these threat indicators. This allows: 1) quicker deployment of accurate signatures\/rules into defense mechanisms like intrusion detection systems; and 2) discovery of unknown relationships of various attack campaigns.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ERaheem Beyah and Xiaojing Liao won third place at the Cyber Security Awareness Week (CSAW) Applied Research Competition, a prestigious contest for graduate and doctoral level security researchers who have published papers in the last year.\u0026nbsp;\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Raheem Beyah and Xiaojing Liao won third place at the Cyber Security Awareness Week (CSAW) Applied Research Competition, a prestigious contest for graduate and doctoral level security researchers who have published papers in the last year. "}],"uid":"27241","created_gmt":"2016-12-05 16:16:41","changed_gmt":"2016-12-05 16:33:48","author":"Jackie Nemeth","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-12-05T00:00:00-05:00","iso_date":"2016-12-05T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"582786":{"id":"582786","type":"image","title":"Xiaojing Liao","body":null,"created":"1476883529","gmt_created":"2016-10-19 13:25:29","changed":"1476883529","gmt_changed":"2016-10-19 13:25:29","alt":"","file":{"fid":"222148","name":"cloud-malware.jpg","image_path":"\/sites\/default\/files\/images\/cloud-malware.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/cloud-malware.jpg","mime":"image\/jpeg","size":2247661,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cloud-malware.jpg?itok=PPDGs8Zs"}},"582788":{"id":"582788","type":"image","title":"Raheem Beyah","body":null,"created":"1476883619","gmt_created":"2016-10-19 13:26:59","changed":"1476883619","gmt_changed":"2016-10-19 13:26:59","alt":"Raheem Beyah","file":{"fid":"222149","name":"raheem-beyah.jpg","image_path":"\/sites\/default\/files\/images\/raheem-beyah.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/raheem-beyah.jpg","mime":"image\/jpeg","size":917439,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/raheem-beyah.jpg?itok=KhAaVNbk"}}},"media_ids":["582786","582788"],"related_links":[{"url":"http:\/\/www2.ece.gatech.edu\/cap\/","title":"Communications Assurance and Performance Group"},{"url":"http:\/\/www.ece.gatech.edu","title":"School of Electrical and Computer Engineering"},{"url":"http:\/\/www.gatech.edu","title":"Georgia Tech"},{"url":"https:\/\/csaw.engineering.nyu.edu\/research","title":"Cyber Security Awareness Week"}],"groups":[{"id":"1255","name":"School of Electrical and Computer Engineering"}],"categories":[{"id":"130","name":"Alumni"},{"id":"134","name":"Student and Faculty"},{"id":"8862","name":"Student Research"},{"id":"135","name":"Research"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"145","name":"Engineering"}],"keywords":[{"id":"67741","name":"Raheem Beyah"},{"id":"172886","name":"Xiaojing Liao"},{"id":"109","name":"Georgia Tech"},{"id":"166855","name":"School of Electrical and Computer Engineering"},{"id":"172887","name":"Cyber Security Awareness Week"},{"id":"67761","name":"Communications Assurance and Performance Group"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39431","name":"Data Engineering and Science"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJackie Nemeth\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESchool of Electrical and Computer Engineering\u003C\/p\u003E\r\n\r\n\u003Cp\u003E404-894-2906\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["jackie.nemeth@ece.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}