Tirthankar Ghosh, Ph.D.

Tirthankar Ghosh Image
Professor
Elder Family Chair
Director of Connecticut Institute of Technology

Computer Engineering and Computer Science Department
Tagliatela College of Engineering
Education

Ph.D., Electrical Engineering, Florida International University
M.S., Computer Engineering, Florida International University
B.E., Electrical Engineering, Jadavpur University

About Tirthankar

Dr. Tirthankar Ghosh has over eighteen years of experience in cybersecurity education and research ranging from network anomaly in industrial control systems, autonomous vehicle security, network threat detection and mitigation, and adversary behavior analysis. Dr. Ghosh has received and managed multi-million dollars of grants from National Science Foundation, National Security Agency / Department of Defense, Office of Naval Research, state governments, and private sectors, and has established several funded research labs on university campuses. Dr. Ghosh has experience working in the Minnesota and Florida higher education systems where he led several initiatives on research and education at the state and national levels. Dr. Ghosh was the co-founder of MN Cyber Careers Consortium and Greater St Cloud Cybersecurity Consortium at the state and local levels in the state of Minnesota. Dr. Ghosh has authored several publications, gave numerous invited talks and research presentations, and authored a book titled ӰԭSecurity by Practice: Exercises in Network Security and Information AssuranceӰԭ. Dr. Ghosh is an ABET program evaluator for Cybersecurity and Computer Science. Dr. Ghosh has an undergraduate degree in Electrical Engineering and a masterӰԭs and PhD degrees in Computer and Electrical Engineering.

Selected Publications
  • Ghosh, T.; Bagui, S.; Bagui, S.; Kadzis, M.; Bare, J. (2023) Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis. J. Cybersecur. Priv. 2023, 3, 895-913.
  • Bagui, S., Mink, D., Bagui, S., Ghosh, T., Plenkers, R., McElroy, T., Dulaney, S. & Shabanali, S. (2023) Introducing UWF-Zeek Data 22: A Comprehensive Raw Network Dataset Based on the MITRE ATT&CK Framework. Future Internet, 8(1), 18; . January 2023.
  • Bagui, S., Mink, D., Bagui, S., Ghosh, T., McElroy, T., Esteban, P., Khasnavis, N., & Plenkers, R. (2022) Using Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Logs. Sensors 2022, 22, 7999. . October 2022.
  • Ghosh, T., Bagui, S., Bagui, S., Kadzis, M., Dat, L. & Bare, J. (2022). Univariate and Bivariate Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems, Intl. J. of Computers and Their Applications, September 2022.
  • Day, L., Ghosh, T., Bagui, S. & Bagui, S. (2022). Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems, in proc of Computer and its Applications Conference 2022 (CATA '22).
  • Wright, J., Sevil, H., Francia, G., Youssef, T., Ghosh, T. & Hall, G. (2022). Analysis of Evolutionary Algorithm based Optimization for Cyber Threat Modeling. In proc of IEEE SoutheastCon '22, Mobile, AL, April 1-2, 2022.
  • Ghosh, T. & Francia, G. (2021). Assessing Competencies Using Scenario-based Learning in Cybersecurity. Journal of Cybersecurity and Privacy. 2021, 1, pp. 539-552. September 2021.
  • Francia, G., Ghosh, T., Hall, G. & El-Sheikh, E. (2021). Cybersecurity Scenario Builder and Retrieval Toolkit. Springer Nature, 2021. .
  • Francia, G., El-Sheikh, E. & Ghosh, T. (2021). Stackable Cybersecurity Pathway Credentials Through Digital Badging, in proc of the 17th International Conference on Frontiers in Education: Computer Science & Computer Engineering, FECS'21: July 26-29, 2021, Las Vegas, USA.
  • Ghosh, T., El-Sheikh, E. & Jammal, W. (2019). Multi-stage Detection Techniques for DNS-based Botnets using Bro Scripting. In proc of Computer and its Applications (CATA '19), March 18-20, 2019, Honolulu, Hawaii.
  • Ghosh, T., Worku, K., Hupp, J. & Zheng, Y. (2018). Performance Evaluation of Multi-hop WirelessHART Network on a Real-life Testbed. Transactions on Networks and Communications, Society of Science and Education, vol 6(1), Feb 2018.
  • Ghosh, T. (2016). Security by Practice: Exercises in Network Security and Information Assurance, Lulu Publishing Services, ISBN: 978-1-4834-6165-6, December 2016.
  • Ghosh, T., Abeykoon, K. & Abeykoon, T. (2014). An Organizational Role-based Extrusion Detection Model with Profile Migration. Transactions on Networks and Communications, Society of Science and Education, vol 2(5), 2014.
Grants and Funded Projects
  • NCAE Cybersecurity Curriculum Commission: A Strategic Approach to Building High-Quality, High-Impact Cybersecurity Curriculum for the Nation (PI) (with Towson University as lead), funded by National Security Agency, $199,186. October 2021-September 2024.
  • Building a Sustainable Pathway for Future Cybersecurity Workforce Through Industry Collaboration, Apprenticeships, and Articulation (PI), funded by Cyber Florida/Florida Department of Education, $489,437, August 2022-August 2023.
  • Connected Vehicle Security Metrics and Threat Intelligence (co-PI), funded by Florida Department of Transportation. $278,503. November 2021-October 2023.
  • CAE-C Faculty Development (PI) (with DSU as lead), funded by National Security Agency, $236,636. October 2020-September 2022.
  • CAE-C Workforce Development (co-PI), Funded by national Security Agency, $9,000,000. October 2020-September 2023.
  • Enabling Cyber and Electronic Warfare Advantage Through Cutting-edge Research on Emerging Technologies and Innovative Cybersecurity Scenario-based Training (co-PI), Funded by Office of Naval Research (ONR), $249,642. October 2020-September 2021. Office of Naval Research.
  • GenCyber (PI): summer camps on cyber security (Guiding Cyber Mentors), funded by National Security Agency and National Science Foundation, $48,711.00. 2020-2022.
  • CyberCorps: Scholarship for Service: Argo Cyber Emerging Scholars Program (ACES), (co-PI), funded by National Science Foundation, $2.4 million. January 2020-December 2024.
  • GenCyber: (PI) summer camps on cyber security (Guiding Cyber Mentors), funded by National Security Agency and National Science Foundation, $48,711.00. April 2019-March 2020.
  • Investigating wireless sensor network security and performance with embedded systems (PI), obtained from St Cloud State University as a Proposal Enhancement Grant. $7,454.00. January 1 2018-June 30, 2019.
  • Embedded systems and wireless sensor networks research lab (co-PI), continued funding from Emerson Process management, $95,585.60, 2018-2019.
  • Competency-based curriculum development in Cybersecurity (PI), funded by MN IT Center of Excellence (formerly Advance IT Minnesota). $15,500. July 2017-June 2018.
  • Minnesota Women in Cybersecurity and CyberConnect program (PI) - funded by Advanced IT Minnesota, $19,895.00. July 2016-June 2017.
  • Offering bridge course for two-year college students for transfer (PI), funded by National Cyber Watch Center. $2,500.00. Summer 2017.
  • MN Cyber Careers Consortium launch (PI), seed funding obtained from Central MN Initiative Foundation, $5,000. January 2016-December 2017.
  • MN Cyber Careers Consortium launch (PI), supplementary funding obtained from St. Cloud State University, $2,500. August 2016-December 2017.
  • GenCyber: summer camps on cyber security (PI), funded by National Security Agency and National Science Foundation, $100,000.00. May 2016-December 2016.
  • CyberCorps: Scholarship for Service to create a collaborative learning environment between St. Cloud State University and Community Colleges (PI), funded by National Science Foundation, $3.20 million. January 2015-December 2019.
  • GenCyber: summer camps on cyber security (PI), funded by National Science Foundation, $150,000.00. January 2015-December 2015.
  • Attracting Female Students to IT Programs (PI), funded by Advanced IT Minnesota, $20,700.00. July 2015-June 2016.
  • Developing an embedded systems and wireless sensor networking lab (co-PI), funded by Emerson Process Management, $60,000.00. July 2014-June 2017.

In the Media

Tirthankar Ghosh, professor of computer engineering and computer science and director of the Connecticut Institute of Technology, discusses a Ӱԭsocial engineering scamӰԭ that the town of Plymouth fell victim to, losing hundreds of thousands of taxpayer dollars.

In the Media

Tirthankar Ghosh, professor of computer engineering and computer science and director of the Connecticut Institute of Technology, discusses a vote from the FCC to treat internet service providers equally through net neutrality.

In the Media

Tirthankar Ghosh, a professor of cybersecurity, comments on some signs that a scammer has tampered with an ATM or credit card reader with a skimmer or shimmer device.

In the Media

Tirthankar Ghosh, a professor of cyber security and director of the Connecticut Institute of Technology at the University of New Haven, comments on a fraud scheme in which a student at the University of Miami reportedly hacked a shipping company to falsify returns of expensive items purchased.