{"id":99876,"date":"2024-08-12T14:00:31","date_gmt":"2024-08-12T19:00:31","guid":{"rendered":"https:\/\/engineering.wisc.edu\/?post_type=news&p=99876"},"modified":"2024-08-12T14:00:37","modified_gmt":"2024-08-12T19:00:37","slug":"focus-on-new-faculty-dan-li-safeguards-manufacturing-systems-from-cyberattacks","status":"publish","type":"news","link":"https:\/\/engineering.wisc.edu\/news\/focus-on-new-faculty-dan-li-safeguards-manufacturing-systems-from-cyberattacks\/","title":{"rendered":"Focus on new faculty: Dan Li safeguards manufacturing systems from cyberattacks"},"content":{"rendered":"\n
Soon after starting a master\u2019s program in operations research at Georgia Tech, Dan Li remained restless. She wanted more\u2014more challenging courses, more avenues to make a wider-reaching impact. And so she swapped the master\u2019s for the long haul of pursuing a PhD.<\/p>\n\n\n\n
Clearly, Li gravitates toward demanding work.<\/p>\n\n\n\n
Li, who is joining the University of Wisconsin-Madison as an assistant professor of industrial and systems engineering in fall 2024, develops algorithms to prevent and detect cyberattacks in industrial and control systems, specifically those used in manufacturing plants.<\/p>\n\n\n\n
According to the IBM Security X-Force Threat Intelligence Index 2023, manufacturing was the most attacked operational-technology-related industry in 2022.<\/p>\n\n\n\n
\u201cThose are not initiated by an amateur hacker sitting in front of the computer at their home, but actually a group of experts of engineering and computer science and networks, all together to design a very sophisticated attack to target some critical infrastructure,\u201d says Li. \u201cBut there are a lot of things we can do.\u201d<\/p>\n\n\n\n
By leveraging data from the array of sensors and control systems employed in so-called \u201ccyber-physical\u201d manufacturing systems, Li develops more accurate and time-sensitive attack detection algorithms.<\/p>\n\n\n\n
\u201cThat\u2019s a huge difference from the traditional IT cyberattack detection algorithms, because they mostly work on the network traffic data\u201d says Li, whose research group also conducts risk assessment to identify weak points across cyber networks and the physical processes they control. \u201cThis is a very nice extra layer of protection. It\u2019s not a substitute for those types of technologies, but really another layer by taking how the system works physically into consideration.\u201d<\/p>\n\n\n\n