Sathya Chandran

   Researcher
   sathya.chandran3@gmail.com
   LinkedIn

Bio

I graduated with a PhD in Computer Science & Engineering at University of South Florida. My advisor was Dr.Xinming Ou in Argus cyber security research group.


Research

I enjoy solving problems in computer, information and network security that lie in the intersection of theory and systems. My PhD research efforts focussed towards studying Security Operation Centers (SOCs) through Anthropological methods. The goal of this research was to understand security operations from a holistic perspective through long-term participant observation. Insights obtained from this study are used to develop better training methods for analysts, develop better operational tools, and provide future security researchers a comprehensive overview of security operations culture.

I also worked on modeling forensic analysis using sound theoretical methods. In the past I have worked on evaluation of intrusion analysis systems built using Artificial Intelligence (AI) techniques.

Please visit the following pages for more information on my research:

Anthropology and Security

Analytical Forensics


News

  1. Bruce Schneier blogs about our anthropological study of SOC's [July'14].
  2. My work at HP Labs, Princeton during Summer 2012 covered by dark READING.

Publications

  1. Turning Contradictions into innovations or: How we learned to stop whining and improve security operations. Sathya Chandran Sundaramurthy, John McHugh, Xinming Ou, Michael Wesch, Alexandru G. Bardas, and S. Raj Rajagopalan. In the Twelfth Symposium on Usable Privacy and Security (SOUPS), Denver, CO, USA, June, 2016.
  2. An empirical study on current models for reasoning about digital evidence. Stefan Nagy, Imani Palmer, Sathya Chandran Sundaramurthy, Xinming Ou, and Roy Campbell. In 10th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE), Málaga, Spain, September 2015.
  3. Experimental study of fuzzy hashing in malware clustering analysis. Yuping Li, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, Doina Caragea, Xin Hu, and Jiyong Jang. In 8th Workshop on Cyber Security Experimentation and Test, Washington, D.C., U.S.A., August 2015.
  4. A human capital model for mitigating security analyst burnout. Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Jacob Case, Xinming Ou, Michael Wesh, John McHugh, and S. Raj Rajagopalan. In the Eleventh Symposium on Usable Privacy and Security (SOUPS), Ottawa, Canada, July 2015. (Distinguished Paper Award).
  5. A tale of three security operation centers. Sathya Chandran Sundaramurthy, Jacob Case, Tony Truong, Loai Zomlot, and Marcel Hoffmann. In CCS Workshop on Security Information Workers, Scottsdale, AZ, U.S.A., October 2014.
  6. An anthropological approach to studying CSIRTs. Sathya Chandran Sundaramurthy, John McHugh, Xinming Ou, S. Raj Rajagopalan, and Michael Wesch. IEEE Security & Privacy Special Issue on CSIRTs, Sept/Oct, 2014. Pre-Print.
  7. Aiding intrusion analysis using machine learning. Loai Zomlot, Sathya Chandran Sundaramurthy, Doina Caragea and Xinming Ou. In the 12th International Conference on Machine Learning Applications, Miami, FL, U.S.A., Dec 2013.
  8. Designing forensic analysis techniques through anthropology. Sathya Chandran Sundaramurthy. In 2013 New Security Paradigms Workshop (NSPHD track), Banff, Canada, September 2013.
  9. Investigative response modeling and predictive data collection. Dan Moor, S. Raj Rajagopalan, Sathya Chandran Sundaramurthy and Xinming Ou. In the seventh IEEE eCrime Researchers Summit 2012, Las Croabas, Puerto Rico, October 2012.
  10. Examining intrusion prevention system events from worldwide networks. Sathya Chandran Sundaramurthy, Sandeep Bhatt and Marc R. Eisenbarth. In 2012 Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS'12) (Co-located with ACM CCS 2012), Raleigh, NC, U.S.A., October 2012.
  11. Classification of udp traffic for DDOS detection. Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, Raj Rajagopalan and Marc R. Eisenbarth. In 5th USENIX Workshop on Large-Scale Exploits and Emerging Threats (LEET), San Jose, CA, U.S.A., April 2012.
  12. Prioritizing intrusion analysis using dempster-shafer theory. Loai Zomlot, Sathya Chandran Sundaramurthy, Kui Luo, Xinming Ou and S. Raj Rajagopalan. In proceedings of 4th Workshop on Artificial Intelligence and Security (Co-located with ACM CCS 2011), Chicago, IL, U.S.A., October 2011.
  13. Practical ids alert correlation in the face of dynamic threats. Sathya Chandran Sundaramurthy, Loai Zomlot and Xinming Ou. Proceedings of the 2011 International Conference on Security and Management (SAM 11), Las Vegas, NV, U.S.A., July 2011.

Posters

  1. Prioritizing intrusion analysis using dempster-shafer theory. Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou and S. Raj Rajagopalan. Presented at the 2011 IEEE Symposium on Security and Privacy (Oakland), Oakland, CA, U.S.A., May 2011.

Talks

  1. SAM'11 slides

Links

Valid HTML 4.01 Transitional Viewable With Any Browser


Last modified: Oct 19 2016