Cyber Research Center

Welcome to the Cyber Research Center



We are dedicated to researching and teaching information assurance, computer, and network security. The mission of the CRC is to educate and inspire cadets and faculty in the acquisition, use, management, and protection of information through innovative teaching, curriculum development, research, and outreach to Army, DoD, and federal agencies.



Vulnerable Web Server is a Cadet Senior Design Project with the goal of providing an integrated curriculum and hands-on environment to educate high school students about cybersecurity.  Team VWS is comprised of CDT Jacob Kravitz, CDT Cort Thompson, and CDT Myszka.

The Vulnerable Web Server Instruction Manual (VWSIM) educates high school students on basic techniques of the Linux operating system, active and passive reconnaissance, cross site scripting, SQL injection, remote file inclusion, and command execution.

Team VMS conducted beta testing with the IT305 Theory and Practice of Military Information Technology Systems.  Team members conducted Train the Trainer session with current instructors to discuss implementation into the IT305 curriculum, which was implemented in April 2015.

The team also submitted a conference paper for the 2015 Colloquium for Information Systems Security Education (CISSE), which was accepted for publication.  On 30 April, 2015 Team VWS participated in the EECS Department Projects Day, and earned Second Place for all EECS Projects!

Cyber-crime is becoming alarmingly common through the use of anonymous e-mails. Author attribution helps digital forensics investigators filter through a large set of possible authors and focus traditional investigative techniques on the most probable culprits. A recent promising technique is to construct a write-print for each known author, and compare it to the write-print extracted from the anonymous message(s). A write-print is a unique digital fingerprint created by mining frequent patterns from a particular author's writing style. However, the process for generating a write-print is very slow, making it a poor choice for author attribution situations of a time-sensitive nature, such as anonymous threats of attack, exposure or ongoing harassment.

This past semester, CDTs Andreas Kellas, Alexander Molnar, Leo St. Amour and Frederick Ulrich under the direction of Dr. Suzanne J. Matthews developed the Parallel Author Verification of E-mail (PAVE), a MapReduce algorithm for generating author write-prints in parallel. When tested on a subset of the Enron e-mail corpus, our algorithm was able to achieve up to 90% accuracy. Students are currently in the process of assembling a technical report and paper for submission.

Other News in Cybersecurity

Click here to visit the Army Cyber Institute website .