Information and communication technologies have evolved over the last two decades and are now integrated into virtually every aspect of our lives. The transformation brought about by this digitalization creates new dependencies. Our economy, the administration of Pakistan government and the provision of essential services now rely on the integrity of cyberspace and on the infrastructure, systems and data which underpin it. As a nuclear state and Pakistan geopolitical position, the possibilities of various internal and external security concerns raised during last decade including Cyber Security. Government of Pakistan is implementing defense policies which shall stop the entry of terrorists in country and supervise territorial borders. Critical defense measures for important cyber services of the country such as NADRA, E-Government services and capital markets also requires attention of government in current security situation.  In recent years, security solutions have been incorporated as various levels in public and private organizational networks. These solutions are comprising of firewalls, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) etc. The primitive line of defense in any security solution is IDS/IPS which safe guards against both internal and external threats. An IDS is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. Intrusion detection systems offer organizations a number of benefits, starting with the ability to identify security incidents. An IDS can be used to help analyze the quantity and types of attacks, and organizations can use this information to change their security systems or implement more effective controls. An intrusion detection system can also help companies identify bugs or problems with their network device configurations. The basic application domain of Cyber Reconnaissance and Combat (CRC) is the development of indigenous IDS software that can monitor and raise alarms in case of cyber-attacks. Although, a number of open source and commercial IDS are available but they cannot be trusted to protect Critical Information Infrastructure. Indigenous IDS will serve as main line of defense to identify threats/ attacks on National Information Infrastructure.

Download PDF

CRC Research & Services Portfolio

Geographical Routing protocol for Vehicular Ad hoc Networks

Vulnerability Analysis

Smart IoT Communication Architecture

Dynamic Application Security Testing and Assurance

Intrusion Detection Systems

CRC Key Researchers

Dr. Kashif Naseer Qureshi

Dr. Faisal Bashir Hussain

Dr. Muhammad Najam Ul Islam