Cyber Security

Researchers at Imperial College London are committed to being at the forefront of discovery and innovation in cyber security – and their expertise can help all manner of organisations, from National Security Departments and social networks, to banks, NHS and pharmaceutical companies.

Solutions include fighting identity theft and document fraud, anomaly detection, virtual diagnostic networks, information assurance, forensics, risk management, cyber-physical security for networks such as transport and energy – plus security and ethical policy for IoT and cloud computing.

Our experts can advise on and devise solutions to meet these ever growing (and changing) needs.

 

Statistical Cyber-Security Analytics

The Statistics team are developing data science techniques that enable large dynamic computer networks to identify intrusions and anomalous behaviour and therefore protect against cyber-attacks and fraudulent activity.

Using statistical methodology, machine learning and Big Data analytics the team have developed the tools to perform scalable anomaly detection in high volume data streams such as social networks, telecoms networks, network flow data, host-based sensor process-level data, cyber-physical and IoT data – pinpointing deviations from normal behaviour.

Experts include…

  • Prof Niall Adamsexpertise in classification, data mining, streaming data analysis and spatial statistics for bioinformatics, cyber-security and retail finance.
  • Dr Nick Heardexpertise in computational Bayesian inference, cluster analysis, change point detection, graph analysis and topic modelling for large dynamic networks such as computer networks or social networks – and bioinformatics problems.
  • Dr Marina Evangelou expertise in Bayesian statistics, penalised regression analysis, machine learning and network analysis.

Collaborations include the Government’s National Cyber Security Centre, the Los Alamos National Laboratory, QinetiQ, Heilbronn Institute for Mathematical Research and Crossword Cybersecurity.

EVENT: Read slides and posters from September 2017’s showcase of research into the deployment of statistical methodology, machine learning, Big Data analytics and anomaly detection, forensics, risk management and more.

 

Systems, web, and mobile security

The Academic Centre of Excellence in Cyber Security Research is a National Cyber Security Centre (NCSC) recognised team working on improving defences for smartphones, mobile apps, laptops and tablets – protecting against hacking of x86 programs, ‘denial of service’ attacks or cyber-physical attacks on digitised services such as train networks, power companies and manufacturers.

Their tools and autonomous system architectures provide sensor networks, autonomous policy-based systems and IoT environments with resilience to malicious compromise, allowing them to operate and maintain integrity if affected. They are also building composable autonomous systems.

Experts include…

  • Prof Emil Lupu – expertise in cyber security and resilience of systems including their physical, digital and human characteristics; policy systems, analysis, refinement and implementation, IOT systems, web and mobile.
  • Dr Cristian Cadar – expertise in systems security, program analysis for security, exploit detection and mitigation, automated software testing and verification. Co-author of analysis tools including the widely-used symbolic execution engine KLEE (http://klee.github.io/)
  • Dr Ben Livshits – expertise in web application and mobile security, privacy, program analysis, compilers, performance, augmented reality, software engineering and crowdsourcing.

 

IOT security

As adoption of the Internet of Things (IoT) grows, use of Big Data and machine learning increases, whilst human oversight reduces. With homes, infrastructure and healthcare services being digitised, we are opening our physical world up to cyber threats. The PETRAS IoT Research Hub looks at privacy, ethics and security issues of the IoT – and IOT devices.

Experts include…

  • Prof Emil Lupu – expertise in cyber security and resilience of systems including their physical, digital and human characteristics; policy systems, analysis, refinement and implementation, IOT systems, web and mobile.

 

Secure Cloud Computing

Experts within SERECA (Large-Scale Distributed System Group) are developing hardware-assisted secure environments for today’s cloud applications using Intel’s Software Guard eXtension (SGX) technology – allowing the trusted execution of sensitive code in untrusted Cloud platforms. User applications are protected by secure SGX enclaves, which shield the application code and data from the rest of the environment. The goal is to protect sensitive cloud applications from insider threats and other malicious activity.

Trusted execution features in commodity CPUs and provides organisations with high levels of security in cloud environments, without the performance overhead of data encryption and decryption in software.

Further developments include ‘platform-as-a-service’ (PaaS) clouds that provide ‘tenants’ with “end-to-end” protection across the entire workflow of a complex cloud-hosted distributed application.

Experts include…

  • Prof Peter Pietzuch – expertise in systems security, hardware security, trusted execution and Intel SGX technology.

Collaborations include Microsoft, Huawei, Intel and the Turing Institute.

 

Privacy and Cryptography:

Our experts can also assist with algorithms and tools for maintaining data confidentiality, both on the network and when data is collected and stored – especially Big Data (large scale).
 
Large-scale datasets (such as mobile phone logs, credit card usage, browsing metadata, membership or customer sales information) offer organisations huge insight into the location, habits and requirements of people, so they can provide appropriate services and communications. However, anonymity, privacy, identity fraud and other cyber security issues require organisations to gather and store it safely. This is where our consultants can help.
 

Experts include…

 

  • Dr Yves-Alexandre de Montjoye – expertise in mobility traces, computational privacy, metadata, causal inference, Big Data, behavioural modelling, computational social sciences.
 
For more information on interrogating Big Data see our data science page.
 

Cybersecurity in Healthcare:

Solutions provided to enhance privacy for medical records and cyber security of wearable and implantable healthcare devices.
 
 

Hear more from our Health Security and FinSec experts…

 

Advisory services

Product design, research methods, data analysis, technology evaluation for investment, technological innovation, patent evaluation, prototype and protocol development, policy, cyber security and more. Assisting museums, writers, film makers and artists to ensure creations scientifically sound.

Expert insight

Membership of Scientific Advisory Boards and Technical Panels, advice and guidance on drug development programmes, thought leadership, conference speakers, literature reviews and provision of foresight.

Analysis and testing

Use of the world-class specialist facilities and technicians at Imperial for projects ranging from aerodynamic measurements and medical imaging to structural testing and analysis.

Our consultants are world-leading experts in their field, committed to on-going research.

Who to contact:

Jamie Pombeiro de Sousa

Jamie Pombeiro de Sousa

Engagement Manager

For Materials, Manufacturing, Mechanical Engineering, Computing, Cyber Security, Data Science and AI

+44 (0)7707 280187

Email me

All areas of expertise:

Related Insights

Robotic revolution

Robotic revolution

Robots are already used to pick and pack online deliveries, vacuum our homes, and to enable surgeons to carry out life-saving operations. In the coming decades, robots have the potential to further enhance human capabilities, providing better care, more efficient transport, and tackling mundane tasks. read more

Decision-making under uncertainty

Decision-making under uncertainty

Decision-making under uncertainty - Read how Imperial academics are helping companies maximise performance even in highly uncertain times. read more

Economic impact of COVID19

Economic impact of COVID19

Reactions and analysis of the impact of coronavirus on business and the economy with opinion on economic recovery, government spending, interest rates, global supply chains, ability of businesses to respond and adapt - and carbon dividends. read more

Related case studies

From big data to knowledge

From big data to knowledge

Dr Roberto Trotta reveals how his astrostatistics skills can solve the everyday complex data problems of a wide range of organisations. read more

Building a low carbon economy with ICT

Building a low carbon economy with ICT

Our consultants shared their expertise in economics to help Microsoft explore how ICT can play an enabling role in low carbon economies to reduce CO2 emissions. read more

Management and conservation of Bluefin Tuna

Management and conservation of Bluefin Tuna

Risk modelling used to help the International Commission for the Conservation of Atlantic Tunas (ICCAT) improve their plans for Bluefin Tuna harvesting and conservation. read more

Latest news

New freshwater control system may resolve flood challenges

New freshwater control system may resolve flood challenges

A new river control system that uses smart technology has been shown to reduce downstream flooding, in a consultancy project carried out by Dr Wouter Buytaert for PyTerra. read more

FREE Congenital Anomalies webinar – ON DEMAND

FREE Congenital Anomalies webinar – ON DEMAND

Register to see the second in our series of four, educational webinars exploring Fetal Medicine. We will explore the common (and less common) structural, chromosomal and genetic congenital abnormalities. Delivered by Imperial’s Professor Christoph Lees, and supported by GE HealthCare. read more

Discovery Channel’s ‘Breaking Magic’

Discovery Channel’s ‘Breaking Magic’

Dr Roberto Trotta provided scientific expertise to the production team of ‘Breaking Magic’, which airs on the Discovery Channel. read more