Profile

Image Unavailable
Title: Dr
First Name: Harsha
Surname: Kalutarage
Position: Lecturer
Telephone: +44 (0) 1224 262830
Email:
ORCID: ORCID Icon https://orcid.org/0000-0001-6430-9558

Duties and Responsibilities

Harsha is currently teaching the following modules.

  • Ethical Hacking
  • Database Security
  • Network Security
  • Machine Learning for Cyber Security – newly created module for the MSc in Cyber Security, to give students the opportunity to evaluate and apply AI technologies in cyber security (eg. use of AI for security monitoring, AI enabled pentesting**, pentesting of AI enabled systems**).

 **Accepting PhD students (self funded) in these areas

Academic Background

  • PhD in Computing (Cyber Security)
  • MPhil in Computer Science (Natural Language Processing)
  • Advanced Certificate in Information Technology
  • BSc (Special) in Statistics & Computing

Research Interests

Harsha is a Lecturer (Cyber Security) in the School of Computing Science and Digital Media at Robert Gordon University in Aberdeen, UK. His ultimate goal is to improve Cyber Security through the advancement and application of data science and Artificial Intelligence (AI) technologies. He wants to leverage his applied computer science research background to develop and evaluate new technologies in Cyber Security, not only for the academic interest but also for tackling real world security problems to improve everyday life. He is particularly interested in applications of AI technologies in security and safety of critical systems (eg. IoT, Cyber Physical Systems, Smart Home/Office), and analysing the security and safety of AI enabled systems (eg. pentesting of AI algorithms, adversarial Machine Learning).

**Currently, Harsha is accepting PhD students (self funded) to carry out a research project on AI enabled pentesting and pentesting of AI enabled systems. If you have a Bachelor degree in Computer Science (UK equivalent 1st or 2nd upper) and strong interest in Cyber Security and Artificial Intelligence, do not hesitate to contact him.

 Current doctoral student supervision activities

Chamath Palihawadana (Co-supervisor)

Uneneibotejit Otokwala (Co-supervisor)

Muhammad Shadi Hajar (Co-supervisor)

Idris Zakariyya (Co-supervisor)

Funding

  • Fully funded PhD studentship 2019 (jointly funded by RGU and HORIBA MIRA Ltd.), Project Title: Protecting Vehicles from Cyber Attacks
  • Pump Priming Grant Awards 2018, Project Title: Anomaly Detection in Controller Area Networks (CAN bus)
  • GCHQ Small Grants Awards 2017, Project Title: Equipment for User Behavioural Analytics Framework (Joint application with Dr.Robert McCausland)

Professional Memberships

  • Fellow of Higher Education Academy (FHEA)
  • Certified Ethical Hacker (CEH)

Publications

Peer-Reviewed Conference and Journal Articles

  • Kalutarage, H. K., Al-Kadri, M. O., Cheah, M., & Madzudzo, G. (2019). Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus. In ACM Computer Science in Cars Symposium (p.7). ACM.
  • Jia, G., Miller, P., Hong, X., Kalutarage, H., & Ban, T. (2019). Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder. In 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 458-465). IEEE.
  • Zakariyya, I., Al-Kadri, M. O., Kalutarage, H., & Petrovski, A. (2019). Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. SECRYPT 2019.
  • Tomlinson, A., Bryans, J., Shaikh, S. A., & Kalutarage, H. K. (2018). Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows. In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) (pp. 231-238). IEEE.
  • Rawal, B. S., Liang, S., Gautam, S., Kalutarage, H. K., & Vijayakumar, P. (2018). Nth Order Binary Encoding with Split-Protocol. International Journal of Rough Sets and Data Analysis (IJRSDA), 5(2), 95-118. doi:10.4018/IJRSDA.2018040105
  • Palomares, I., Kalutarage, H., Huang, Y., Miller, P., McCausland, R., & McWilliams, G. (2017). A fuzzy multicriteria aggregation method for data analytics: Application to insider threat monitoring. In Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems (IFSA-SCIS), 2017 Joint 17th World Congress of International (pp. 1-6). IEEE.
  • Kalutarage, H. K., Nguyen, H. N., & Shaikh, S. A. (2017). Towards a threat assessment framework for apps collusion. Telecommunication Systems, 66(3), 417-430. doi: 10.1007/s11235-017-0296-1
  • Shaikh, S. A., & Kalutarage, H. K. (2016). Effective network security monitoring: from attribution to target-centric monitoring. Telecommunication Systems, 62(1), 167-178. doi:10.1007/s11235-015-0071-0
  • Rawal, B. S., Kalutarage, H. K., Vivek, S. S., & Pandey, K. (2016). The Disintegration Protocol: An Ultimate Technique for Cloud Data Security. In Smart Cloud (SmartCloud), IEEE International Conference on (pp. 27-34). IEEE.
  • Kalutarage, H., Shaikh, S., Lee, B. S., Lee, C., & Kiat, Y. C. (2016). Early warning systems for cyber defence. In iNetSec 2015: Open Problems in Network Security: International Workshop on Open Problems in Network Security (Vol. 9591, pp. 29-42). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9591). Springer Verlag. doi:10.1007/978-3-319-39028-4_3
  • Asavoae, I. M., Blasco, J., Chen, T. M., Kalutarage, H. K., Muttik, I., Nguyen, H. N., ... & Shaikh, S. A. (2016). Towards Automated Android App Collusion Detection. CEUR Workshop Proceedings, 1575, 29-37.
  • Kalutarage, H. K., Shaikh, S. A., Wickramasinghe, I. P., Zhou, Q., & James, A. E. (2015). Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks. Computers and Electrical Engineering, 47, 327-344. doi:10.1016/j.compeleceng.2015.07.007
  • Garcia-Perez, A., Shaikh, S. A., Kalutarage, H. K., & Jahantab, M. (2015). Towards a knowledge-based approach for effective decision-making in railway safety. Journal of Knowledge Management, 19(3), 641-659. doi:10.1108/JKM-02-2015-0078
  • Kalutarage, H. K., Lee, C., Shaikh, S. A., & Sung, F. L. B. (2015). Towards an early warning system for network attacks using bayesian inference. In Cyber security and cloud computing (CSCloud), 2015 IEEE 2nd international conference on (pp. 399-404). IEEE.
  • Muttik, I., Blasco, J., Chen, T., Kalutarage, H., & Shaikh, S. (2015). Android - Collusion Conspiracy. In Proceedings of the  18th Association of Anti-virus Asia Researchers International Conference. http://cs.swan.ac.uk/~csmarkus/ACID/wp-content/uploads/2015/12/AVAR2015_Paper-CameraReady.pdf
  • Kalutarage, H. K., Krishnan, P., & Shaikh, S. A. (2014). A certification process for android applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7991 LNCS, pp. 288-303). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7991 LNCS). Springer Verlag. doi:10.1007/978-3-642-54338-8_24
  • Kalutarage, H. K., Shaikh, S. A., Zhou, Q., & James, A. E. (2013). Tracing sources of anonymous slow suspicious activities. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7873 LNCS, pp. 122-134). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7873 LNCS). doi: 10.1007/978-3-642-38631-2_10
  • Kalutarage, H. K., Shaikh, S. A., Zhou, Q., & James, A. E. (2013). Monitoring for slow suspicious activities using a target centric approach. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8303 LNCS, pp. 163-168). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8303 LNCS). doi: 10.1007/978-3-642-45204-8_12
  • Kalutarage, H. K., Shaikh, S. A., Zhou, Q., & James, A. E. (2013). How do we effectively monitor for slow suspicious activities? In Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems, ESSoS-DS 2013 (Vol. 965, pp. 36-40). CEUR-WS.
  • Kalutarage, H. K., Shaikh, S. A., Zhou, Q., & James, A. E. (2012). Sensing for suspicion at scale: A bayesian approach for cyber conflict attribution and reasoning. In Cyber conflict (CYCON), 2012 4th international conference on (pp. 1-19). IEEE.

 Peer-Reviewed Book Chapters 

  • Kalutarage, H. K., & Shaikh, S. A. (2018). Feature Trade-Off Analysis for Reconnaissance Detection. Data Science For Cyber-security, 3, 95.
  • Mariuca, A. I., Blasco, J., Chen, T. M., Kalutarage, H. K., Muttik, I., Nguyen, H. N., ... Shaikh, S. A. (2017). Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case. In I. Palomares Carrascosa, H. K. Kalutarage, & Y. Huang (Eds.), Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications (pp. 55-97). Cham: Springer International Publishing. doi: 10.1007/978-3-319-59439-2_3

 Book Editing 

  • Carrascosa, I. P., Kalutarage, H. K., & Huang, Y., (Eds.) (2017). Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications. Springer International Publishing.

 Patents 

  • Shaikh, S. A., & Kalutarage, H. K. (2017). Relating to the monitoring of network security. US Patent Application Publication No. US20170346834A1, filed June 15, 2016, Pub. Date November 30, 2017

Theses 

 Peer-Reviewed Abstracts/Posters in Conferences, Workshops and Symposia 

  • Kalutarage, H. K. (2015). Effective monitoring of slow suspicious activities on computer networks. The 5th PhD School on Traffic Monitoring and Analysis, Barcelona, Spain (poster)
  • Kumara, K. H., & Dias, N. G. J. (2009). A tool for automatic derivation of phone transitions for the creation of a diphone database for Sinhala text to speech synthesis. Research Symposium 2009-Faculty of Graduate Studies, University of Kelaniya. (abstract)
  • Dias, N. G. J., Kumara, K. H., & Dolawattha, D. D. M. (2009). An analysis of sound parameters for prosodic modeling in Sinhala text to speech synthesis. Research Symposium 2009-Faculty of Graduate Studies, University of Kelaniya. (abstract)
  • Kumara, K. H., Dias, N. G. J., & Wickramasinghe, R. (2007). MBROLA Formatted Diphone Database for Sinhala Language. Research Symposium 2007-Faculty of Graduate Studies, University of Kelaniya. (abstract)

 Published Whitepapers/Magazine articles 

Invited Talks

Topic: Machine Learning in Cyber Security

Topic: Using Machine Learning for Cyber Security: capability gaps, operational limitations and research challenges

Topic: Feature Trade-off Analysis for Reconnaissance Detection

Topic: Early Warning Systems for Cyber Defence