Home News Education The Cyber Trio

The Cyber Trio

28
From left, Elizabeth Bautista, manager for the Operations Technology Group at the National Energy Research Scientific Computing; Cory Haser, a Slippery Rock University senior computing major; and Nitin Sukhija, SRU assistant professor of computer science; stand near server racks at Lawrence Berkeley National Laboratory in Berkeley, California. The trio make up a research team that is developing augmented and virtual reality applications that can help high performance computing data centers defend against cyberattacks.

Cory Haser adds a new dimension to his work with computers, having previously developed software that uses three-dimensional models. He got an opportunity this summer to push his 3D modeling skills to a whole new level.

Haser, a Slippery Rock University senior computing major from Zelienople, is part of a faculty-student research project with Nitin Sukhija, SRU assistant professor of computer science, and Elizabeth Bautista, manager for the Operations Technology Group at the National Energy Research Scientific Computing Center at Lawrence Berkeley National Laboratory in Berkeley, CA.

Together they are developing a framework to apply augmented and virtual realities to cybersecurity operations for high-performance computing data centers.

Augmented reality is technology that superimposes a computer-generated image on a user’s view of the real world from a computer screen, and virtual reality is computer-generated simulations of three-dimensional environments.

“We’re combining augmented and virtual reality technology with cybersecurity and a high-performance computing environment, which when compared to related studies, is a new approach,” said Sukhija, who is also the director of SRU’s Center for Cybersecurity and Advanced Computing. “An important challenge faced by cybersecurity specialists is managing the extreme levels of stress and finding ways to monitor, access and defend multiple cyberattacks in real time.”

The idea is for supercomputer centers to be able to detect security breaches through augmented and virtual reality without having an expert on site.

The concept was born when Haser entered Sukhija’s office looking to obtain research experience. Haser already works in the field as an augmented reality software engineer for D’Angelo Technologies, a small business in Zelienople that provides engineering solutions for military, civil and commercial clients.

Sukhija and Haser received several grants, including $4,759 through SRU’s Summer Collaborative Research Experience grant program, to conduct their research at NERSC, one of the largest facilities in the world devoted to providing computational resources and expertise for basic scientific research.

The software application they are developing will help cybersecurity specialists navigate the data center and provide visual markers superimposed on screen to detect and find computing parts, such as memory and data processors, or the compromised server itself from the stacks of data servers in the event that a person is unable to physically be at the data center while conducting an investigation.

“This is a really innovative idea,” Bautista said. “When I saw the AR software I immediately thought of our security operations. I’m in a 24/7 work environment in a data center, and we started thinking about a situation where staff might be unable to be on the computational center floor, due to something like an evacuation or environmental issues.

“Chances are, the systems are running even when staff cannot be there. With this idea, we would be able to see what’s going on in the data center in three dimensions without actually walking through it, and we could possibly diagnose or prevent the problem much more effectively,” she said.

According to the researchers, having this technology would increase efficiency, eliminate risks, and save time and money, especially for data centers that might not have an expert on location when hardware fails or if someone needs to pinpoint malicious activity when all they have is an IP address.

In two separate visits, Haser has spent a total of two weeks on-site at the Berkeley lab working on the project with Sukhija and Bautista.

“It’s been amazing to work at Berkeley Lab and in the cybersecurity and high performance computing environment,” Haser said. “This is a little bit out of my comfort zone, but it’s nice to still be able to work with technology that I’m familiar with and then combine it with something I’m interested in learning more about and potentially developing some software that people can use.”

“Cory’s a perfect example of how you have to apply your knowledge in other areas,” Sukhija said. “He accepted the challenge and he’s been great to work with.”