{"61418":{"#nid":"61418","#data":{"type":"news","title":"GTRI Creates Cyber Technology and Information Security Laboratory","body":[{"value":"\u003Cp\u003EThe Georgia Tech Research Institute (GTRI) has created a new Cyber Technology and Information Security Laboratory (CTISL) to apply GTRI\u0027s broad expertise and systems engineering experience in cyber-related research to a wide range of information security issues.\u003C\/p\u003E\n\u003Cp\u003ECTISL researchers will develop cutting-edge capabilities that will allow trusted data to be sent across trusted networks to ensure effective missions for GTRI\u0027s customers. CTISL\u0027s work will focus on providing resilient command and control solutions to war fighters operating in contested environments, helping industry defend against cyber criminals, and safeguarding the nation\u0027s critical infrastructure.\n\u003C\/p\u003E\n\u003Cp\u003E\u0022The consolidation of GTRI\u0027s key cyber researchers, programs and resources under a single umbrella of shared research objectives will be a powerful driver in the development of new cyber solutions and technologies that will have an immediate impact on the United States,\u0022 said CTISL acting director Bo Rotoloni.\n\u003C\/p\u003E\n\u003Cp\u003ERotoloni, who was previously the deputy director of GTRI\u0022s Signature Technology Laboratory, brings to the job an understanding of GTRI\u0027s existing customers and a vision for developing new cyber research areas where the laboratory can apply its expertise. To develop and deploy advanced technologies to defend and deter cyber attacks against the United States, researchers in the new laboratory will pursue opportunities in various agencies within the U.S. Departments of Defense and Homeland Security; local, state and foreign ally governments; and commercial and private entities. \n\u003C\/p\u003E\n\u003Cp\u003ECTISL will also leverage basic research from across the Georgia Institute of Technology, as part of the Georgia Tech Information Security Center (GTISC). \n\u003C\/p\u003E\n\u003Cp\u003E\u0022At GTISC, real-world impact of our research programs is very important so we are excited that our faculty and students will be able to collaborate with researchers in the new Cyber Technology and Information Security Laboratory to help create cyber security solutions that will address real problems,\u0022 said GTISC director Mustaque Ahamad, who is a professor in Georgia Tech\u0027s School of Computer Science. \u0022GTRI\u0027s expertise in developing such solutions complements our basic research and by working together, Georgia Tech will be well positioned to play a leadership role in this important field.\u0022\n\u003C\/p\u003E\n\u003Cp\u003EThe new research laboratory -- GTRI\u0027s eighth -- will be comprised of three divisions that will pursue an aggressive strategy to provide world-class support for enduring programs and integration of cutting-edge cyber solutions, emerging technology and policy, Rotoloni said. The three divisions include secure information systems, command and control mission assurance, and network vulnerability. \u003C\/p\u003E\n\u003Cp\u003EResearchers in the secure information systems division design, develop and deploy enterprise information systems requiring state-of-the-art database, platform and Internet security. They are currently providing secure applications and cross-domain extensible markup language (XML) guards to the U.S. Department of Defense to enable sharing of compartmented data between networks. \n\u003C\/p\u003E\n\u003Cp\u003EIn the command and control mission assurance division, GTRI researchers will design and field resilient information systems. Cutting edge technologies, including secure network enclaves, virtualization, multi-level security, and adaptive quality of service management, will be applied to construct command and control systems for combat operations. \n\u003C\/p\u003E\n\u003Cp\u003EGTRI has been involved for more than six years with the U.S. military\u0027s Deployable Joint Command and Control system (DJC2) -- a self-contained, self-powered temporary headquarters facility. GTRI has been responsible for designing DJC2\u0027s information technology infrastructure since the initial prototype stage. The work has included networks, wired and wireless communications, as well as newer elements such as advanced peer-to-peer inter-networking convergence and satellite communication terminals. The GTRI team is currently developing a secure DJC2 wireless architecture, expected to become one of the few operational systems that is fully accredited for security.\n\u003C\/p\u003E\n\u003Cp\u003EThe Network-Centric Test and Training System (NeTTS) was also developed by GTRI researchers for command and control mission assurance. NeTTS is a family of non-intrusive test tools for distributed, network-centric environments that support test and training through the creation of realistic virtual environments. \n\u003C\/p\u003E\n\u003Cp\u003E\u0022NeTTS has been used by all four military services, providing support during pre-test planning, test conduct and post-test analysis of a wide variety of communication networks and systems,\u0022 said Fred Wright, CTISL\u0027s deputy director and chief engineer.\n\u003C\/p\u003E\n\u003Cp\u003EIn the network vulnerability division, researchers will concentrate on exploiting and reconstructing information in the form of signals, communication protocols, applications and embedded systems. The division will also support various government agencies in countering adversary information networks. Threat countermeasures span a wide range from radio-frequency jamming\/denial-of-service to applied offensive computer network operations tactics.\n\u003C\/p\u003E\n\u003Cp\u003EIn this research area, GTRI is developing techniques to simulate hostile intrusion attempts into networks and other critical areas, a practice called \u0022red teaming\u0022 that uses a GTRI custom code library. Researchers have also developed a program called Spider Sense, which crawls the Internet and automatically exploits websites.  Researchers are also working with GTISC to develop and apply novel approaches to automatically identify and analyze emerging cyber threats, such as botnets.\n\u003C\/p\u003E\n\u003Cp\u003ERotoloni noted that GTRI has been working in the information security area since the 1990s.  With this new laboratory, he says, it will continue to develop the latest technologies in signal and protocol exploitation, web crawling, malware analysis, reverse engineering of embedded systems and applications, enterprise networks, database applications, and perimeter guards.\n\u003C\/p\u003E\n\u003Cp\u003E\u0022Our national security and way of life depend on our ability to operate effectively in the vulnerable domain of cyberspace,\u0022 said Tom McDermott, interim director of GTRI. \u0022With the creation of this new laboratory, GTRI is showing its commitment to solving our nation\u0027s most difficult challenges in cyberspace.\u0022\n\u003C\/p\u003E\n\u003Cp\u003E\u003Cstrong\u003EResearch News \u0026amp; Publications Office\u003Cbr \/\u003E\nGeorgia Institute of Technology\u003Cbr \/\u003E\n75 Fifth Street, N.W., Suite 314\u003Cbr \/\u003E\nAtlanta, Georgia  30308  USA\u003C\/strong\u003E\n\u003C\/p\u003E\n\u003Cp\u003E\u003Cstrong\u003EMedia Relations Contacts:\u003C\/strong\u003E Abby Vogel Robinson (abby@innovate.gatech.edu; 404-385-3364) or John Toon (jtoon@gatech.edu; 404-894-6986) or Kirk Englehardt (kirk.englehardt@gtri.gatech.edu; 404-407-7280)\n\u003C\/p\u003E\n\u003Cp\u003E\u003Cstrong\u003EWriter:\u003C\/strong\u003E Abby Vogel Robinson\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"GTRI has created a new Cyber Technology and Information Security Laboratory (CTISL) to apply GTRI\u0027s broad expertise and systems engineering experience in cyber-related research to a wide range of information security issues.","format":"limited_html"}],"field_summary_sentence":[{"value":"New lab will maximize GTRI\u0027s broad experience in cyber research."}],"uid":"27206","created_gmt":"2010-10-04 00:00:00","changed_gmt":"2016-10-08 03:07:31","author":"Abby Vogel Robinson","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2010-10-04T00:00:00-04:00","iso_date":"2010-10-04T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"61419":{"id":"61419","type":"image","title":"Fred Wright Bo Rotoloni","body":null,"created":"1449176337","gmt_created":"2015-12-03 20:58:57","changed":"1475894536","gmt_changed":"2016-10-08 02:42:16","alt":"Fred Wright Bo Rotoloni","file":{"fid":"191352","name":"twv00777.jpg","image_path":"\/sites\/default\/files\/images\/twv00777_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/twv00777_0.jpg","mime":"image\/jpeg","size":1264552,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/twv00777_0.jpg?itok=VnFsQM-_"}},"61420":{"id":"61420","type":"image","title":"GTRI CTISL leadership","body":null,"created":"1449176337","gmt_created":"2015-12-03 20:58:57","changed":"1475894536","gmt_changed":"2016-10-08 02:42:16","alt":"GTRI CTISL leadership","file":{"fid":"191353","name":"twj00777.jpg","image_path":"\/sites\/default\/files\/images\/twj00777_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/twj00777_0.jpg","mime":"image\/jpeg","size":1190159,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/twj00777_0.jpg?itok=yLEy__0C"}}},"media_ids":["61419","61420"],"related_links":[{"url":"http:\/\/www.gtri.gatech.edu\/ctisl","title":"GTRI Cyber Technology and Information Security Laboratory"},{"url":"http:\/\/www.gtri.gatech.edu\/","title":"Georgia Tech Research Institute"}],"groups":[{"id":"1188","name":"Research Horizons"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"145","name":"Engineering"},{"id":"147","name":"Military Technology"},{"id":"135","name":"Research"}],"keywords":[{"id":"344","name":"cyber"},{"id":"10840","name":"cyber attacks"},{"id":"345","name":"cyber security"},{"id":"10839","name":"cyber technology"},{"id":"1366","name":"defense"},{"id":"2678","name":"information security"},{"id":"10675","name":"network security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cstrong\u003EAbby Vogel Robinson\u003C\/strong\u003E\u003Cbr \/\u003EResearch News and Publications\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/www.gatech.edu\/contact\/index.html?id=avogel6\u0022\u003EContact Abby Vogel Robinson\u003C\/a\u003E\u003Cbr \/\u003E\u003Cstrong\u003E404-385-3364\u003C\/strong\u003E","format":"limited_html"}],"email":["abby@innovate.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}