Raheem Beyah

From Wikipedia, the free encyclopedia

Raheem Beyah
Born (1976-12-23) December 23, 1976 (age 47)
NationalityAmerican
TitleDean
Academic background
Alma materNorth Carolina A&T State University
Georgia Institute of Technology
Thesis"A Deployable Approach to Better Than Best Effort Quality of Service"
Doctoral advisorJohn A. Copeland
Raghupathy Sivakumar
Academic work
DisciplineComputer engineering
InstitutionsGeorgia Institute of Technology
Georgia State University
WebsiteBayeh at Georgia Tech

Raheem Beyah (born December 23, 1976) is an American computer engineer, researcher, and educator. As of January 15, 2021 he is the Dean of the College of Engineering and Southern Company Chair at the Georgia Institute of Technology.[1] Prior to becoming the Dean, he was the vice president for Interdisciplinary Research and the Motorola Foundation Professor and the executive director of Georgia Tech's online masters in cyber security (OMS Cyber) program.[2][3] Beyah is also the co-founder and chair of industrial security company Fortiphyd Logic, Inc.

Early life and education[edit]

In his youth Beyah wanted to be an astronaut, but was drawn to the field of computer engineering through his love for video games.[4] He matriculated through the Atlanta Public Schools System and graduated from Frederick Douglass High School. Beyah received his B.S. in electrical engineering from North Carolina A&T State University in 1998 and his M.S. and Ph.D. in electrical and computer engineering from Georgia Tech in 1999 and 2003, respectively.[5] His thesis "A Deployable Approach to Better Than Best Effort Quality of Service", was advised by John A. Copeland and Raghupathy Sivakumar.

Career[edit]

Beyah began his career working at Accenture (formerly Andersen Consulting). After being promoted to the level of Consultant, Beyah left and returned to Georgia Tech to pursue a Ph.D. in electrical and computer engineering, advised by Copeland. While completing his Ph.D., he worked as a research engineer at Georgia Tech. In 2005 he joined the computer science department at Georgia State University as an assistant professor while maintaining an adjunct professor appointment at Georgia Tech. In 2011, he returned to Georgia Tech full time as an associate professor in the School of Electrical and Computer Engineering.

Beyah's research interests are in the areas of network security and monitoring, cyber-physical systems security, network traffic characterization and performance, and critical infrastructure security.[5] His works have been frequently cited. Beyah serves as the Director of the Communications Assurance and Performance (CAP) research group. Through this group he has discovered several flaws in critical infrastructure components.[6] His work has been highlighted in Forbes,[7] USA Today,[8] DARKReading,[9] WIRED Magazine[10] and NETWORKWORLD.[11] In 2017, Beyah and his students introduced a proof of concept of LogicLocker, the first ransomware for programmable logic controllers.[12]

Beyah was promoted to Professor, appointed to the Motorola Foundation Endowed Professorship, and appointed as Associate Chair for Strategic Initiatives and Innovation in 2016. He served as interim Steve W. Chaddick School Chair for the 2017-2018 academic year. Upon stepping down, he was appointed as the executive director for Georgia Tech's Online Masters in Cybersecurity (OMS Cyber) program.[3] In 2019, he became Georgia Tech's Vice President for Interdisciplinary Research and was later asked to lead the Institute's data security efforts by Georgia Tech President Ángel Cabrera.[13] In 2021, he became the Dean of the College of Engineering and the Southern Company Chair.

In addition to his work in the academy, Beyah has served as a witness for court cases, including a whistleblower case against Davita Health Care Providers on which he served as a software expert for the plaintiff.[14] Davita Health Care Providers settled the lawsuit for $495M.[15] In 2016, Beyah co-founded Fortiphyd Logic, Inc. and he currently chairs the Board of Directors.[16]

Honors and awards[edit]

Selected publications[edit]

  • Beyah, R.; Kangude, S.; Strickland, B.; Copeland, J. (2004). "Rogue access point detection using temporal traffic characteristics". IEEE Global Telecommunications Conference, 2004. GLOBECOM '04. Vol. 4. pp. 2271–2275. doi:10.1109/GLOCOM.2004.1378413. ISBN 0-7803-8794-5. S2CID 10272290.
  • Ji, Shouling; Li, Weiqing; Srivatsa, Mudhakar; Beyah, Raheem (November 3, 2014). "Structural Data De-anonymization: Quantification, Practice, and Implications". Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. pp. 1040–1053. doi:10.1145/2660267.2660278. ISBN 9781450329576. S2CID 16403005.
  • Vu, C. T.; Beyah, R. A.; Li, Y. (April 2007). "Composite Event Detection in Wireless Sensor Networks". 2007 IEEE International Performance, Computing, and Communications Conference. pp. 264–271. doi:10.1109/PCCC.2007.358903. ISBN 978-1-4244-1137-5. S2CID 821282.

Patents[edit]

  • Systems and methods for fingerprinting physical devices and device types based on network traffic [22]
  • Systems and methods for detection of infected websites [23]
  • Systems and methods for detecting anomalous software on a programmable logic controller [24]
  • Device fingerprinting for cyber-physical systems [25]



References[edit]

  1. ^ Futrell, Patti (January 4, 2021). "Beyah Named Dean of College of Engineering". Georgia Institute of Technology. Retrieved January 5, 2021.
  2. ^ "OMS Cybersecurity Program Director Featured on WABE". GTPE News. September 10, 2018.
  3. ^ a b Harris, Kelsey (November 29, 2018). "From Research Engineer to Cybersecurity Expert". Georgia Tech Professional Education. Retrieved January 5, 2021.
  4. ^ "Teaching Wasn't Always in Cards for Beyah". Georgia Institute of Technology. July 22, 2013. Retrieved January 4, 2021.
  5. ^ a b "Dr. Raheem Beyah". rbeyah.ece.gatech.edu. Retrieved January 5, 2021.
  6. ^ ICS-CERT advisories:
  7. ^ Brewster, Thomas (September 10, 2015). "Want To Hack The Mars Rover? Take A Look At Its Intel-Owned Operating System". Forbes. Retrieved January 5, 2021.
  8. ^ Weise, Elizabeth (June 12, 2017). "Malware discovered that could threaten electrical grid". USA Today. Retrieved January 5, 2021.
  9. ^ "Using IOT Botnets to Manipulate the Energy Market". August 6, 2020.
  10. ^ Newman, Lily Hay. "Hackers Could Use IoT Botnets to Manipulate Energy Markets". Wired.
  11. ^ "Major cloud is infested with malware, researchers say". November 10, 2016.
  12. ^ Kovacs, Eduard (February 14, 2017). "Simulation Shows Threat of Ransomware Attacks on ICS | SecurityWeek.Com". Security Week.
  13. ^ "Tech Responds to Student Data Disclosure". Georgia Institute of Technology. April 28, 2020. Retrieved January 5, 2021.
  14. ^ "Davita Crime Fraud Opposition" (PDF). Archived from the original (PDF) on August 29, 2017. Retrieved January 5, 2021.
  15. ^ Burress, Jim (May 5, 2015). "DaVita Settles Atlanta Whistleblower Lawsuit For $495M". WABE. Retrieved January 5, 2021.
  16. ^ "About Us: Raheem Beyah, Ph.D." Fortiphyd. Retrieved January 5, 2021.
  17. ^ "NSF Award Search: Award#1140230 - CAREER: A Networking Approach to Host-based Intrusion Detection". National Science Foundation. Retrieved January 5, 2021.
  18. ^ "Minority in Research Science Trailblazer, National Black Engineer of the Year Awards (BEYA)" (PDF). BEYA STEM Global Competitiveness Conference. Retrieved January 5, 2021.
  19. ^ "ACM Recognizes Distinguished Members for Computing Innovations that Transform Society" (PDF). Association for Computing Machinery. November 30, 2016. Retrieved January 5, 2021.
  20. ^ "University Teams Win Berths at Prestigious Applied Research and Policy Competitions At NYU Cyber Security Awareness Week". Cyber Security Trend. October 27, 2016. Retrieved January 5, 2021.
  21. ^ Abdul-Alim, Jamaal (February 23, 2017). "Raheem Beyah Wants to Open More Doors to Cybersecurity - Higher Education". Diverse. Retrieved January 5, 2021.
  22. ^ "Systems and methods for fingerprinting physical devices and device types based on network traffic".
  23. ^ "Systems and methods for detection of infected websites".
  24. ^ "Systems and methods for detecting anomalous software on a programmable logic controller".
  25. ^ "Device fingerprinting for cyber-physical systems".