本文へジャンプ

Secure the Network, Secure the People

*This Lab. is not accepting new student.

BEURAN Laboratory
Research Associate Professor: BEURAN, Razvan Florin

E-mail:
[Research areas]
Cybersecurity, Network systems
[Keywords]
Security training, cyber range, emulation

Skills and background we are looking for in prospective students

We welcome students with interests and abilities related to networks, in particular network security, who also have good programming and/or mathematical skills. Independent thinking and a strong motivation to learn and develop oneself are a must.

What you can expect to learn in this laboratory

Students who graduate from our lab will have deep knowledge regarding networks and network security. They will be able to develop network-related software, and to perform various kinds of network experiments and assessments. Through their involvement in cybersecurity education and training activities, the students will gain hands-on network security experience; thus, they will become able to deal with cybersecurity issues in the real world. Their English paper reading and writing, as well as presentation skills will also improve significantly.

【Job category of graduates】 Cybersecurity and ICT companies

Research outline

People have become more and more reliant on the Internet for daily communication. In addition, networks are and will be used more and more to improve people’s quality of life in the context of smart homes, but also in the area of industrial automation. This will lead to a world in which devices and people are all connected together via the so-called “Internet of Everything” (IoE). However, while network communication makes life more convenient, it also exposes users to risks that they must be aware of, such as malware, phishing, etc.

Cybersecurity training

Current and future IT professionals and security experts must possess all the knowledge and skills required in order to properly handle computer security incidents. These can be acquired only partially through theoretical lectures, and it is of utmost importance to have practical experience with actual security threats in order to be able to deal with such issues in an efficient and timely manner.
This kind of experience can only be obtained in cyber ranges, which are realistic environments for cybersecurity training. For this purpose, we are developing an integrated cybersecurity training framework, named CyTrONE, that makes it possible to easily manage both the training content and the associated training environment.



Integrated cybersecurity training framework CyTrONE

Security awareness training

However, cybersecurity is not a topic that only IT professionals need to be concerned with. Regular IT users as well must be aware of the potential security risks they are faced with during their daily use of computers, smart phones, tablets. Moreover, many of today’s homes are equipped with IoT devices, such as wireless routers and IP cameras, which also should be managed responsibly from a security point of view.
Consequently, as a second main direction, we conduct research on the use of novel methodologies for education and training aimed at improving the security awareness of regular IT users. For instance, the use of adaptive learning ensures that training content suits the abilities of the learners and helps motivating them to study harder. Moreover, gamification techniques help with making the training activities more attractive and facilitate the learning process.

Key publications

  1. R. Beuran, D. Tang, Z. Tan, S. Hasegawa, Y. Tan, Y. Shinoda, "Supporting Cybersecurity Education and Training via LMS Integration: CyLMS", Springer Education and Information Technologies, November 2019, vol. 24, no. 6, pp. 3619-3643.
  2. R. Beuran, D. Tang, C. Pham, K. Chinen, Y. Tan, Y. Shinoda, "Integrated Framework for Hands-on Cybersecurity Training: CyTrONE", Elsevier Computers & Security, vol. 78C, June 2018, pp. 43-59.
  3. R. Beuran, C. Pham, D. Tang, K. Chinen, Y. Tan, Y. Shinoda, "Cybersecurity Education and Training Support System: CyRIS", IEICE Transactions on Information and Systems, vol. E101-D, no. 3, March 2018, pp. 740-749.

Equipment

Large-scale network testbed StarBED
http://starbed.nict.go.jp/en/

Teaching policy

We aim at providing a dynamic research environment in which students can increase their knowledge, learn new skills, and develop new abilities. We lay a strong emphasis on putting theoretical knowledge into practice, and on hands-on experience with various aspects of networks and network security. We consider the development of communications skills to be extremely significant, hence presenting and publishing one’s work are highly encouraged and supported.

[Website] URL:https://www.jaist.ac.jp/is/labs/beuran-lab/

PageTop