Thursday, December 4, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Technology and Engineering

Fujunzhu Zhao, a Ph.D. student, works in Zhiwu “Drew” Wang’s lab. Wang’s team is working to convert food waste into sustainable bioplastics

July 8, 2024
in Technology and Engineering
Reading Time: 3 mins read
0
Fujunzhu Zhao, a Ph.D. student, works in Zhiwu "Drew" Wang's lab. Wang's team is working to convert food waste into sustainable bioplastics
66
SHARES
602
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT

Identity theft — it’s not just for individuals anymore.

Taejoong"Tijay" Chung.

Credit: Photo by Tonia Moxley for Virginia Tech.

Identity theft — it’s not just for individuals anymore.

Companies. Colleges. Organizations. In fact, anyone with a web address can be at risk from bad actors seeking to divert their users for fraudulent purposes or censorship.

To protect the owners and users of websites, College of Engineering researcher Taejoong “Tijay” Chung is working to better secure today’s domain name system and Internet Protocol (IP) addresses. The project is being done through a recently-announced National Science Foundation Faculty Early Career Development (CAREER) award.

Project at a glance

Title: Securing and Evolving Internet Security Protocols for Naming and Routing
Purpose: Measuring and improving security for Internet domain names and IP addresses
Principal investigator: Chung, assistant professor in the Department of Computer Science
Collaborators: Comcast, Cloudflare, the Regional Internet Registry for Europe, the Internet Society, and the Domain Name System Operations Analysis and Research Center
Funding: $691,258
Timeframe: 2024-29

All websites depend on what’s known as the Domain Name System, which functions like the phone book of the internet, Chung said. Individuals, organizations, and companies register unique domain names, such as google.com and vt.edu. Then users type those “addresses” into a browser and navigate to the correct site.

To get to those sites, though, every human-readable domain name must be translated into a unique numerical identifier, or IP address. Every device connected to the internet has a unique IP address that is broadcast to the larger network of routers that funnel users to the correct content.

But things can go wrong at several points in the process.

If a domain name is not protected by a robust security protocol, it can be co-opted by bad actors, Chung said. And surprisingly, even though strong protocols exist, some website owners can’t afford or don’t have the technical abilities to implement them.

Similarly, attackers can hijack a valuable website by passing off a fake IP address as the correct place for routers to send its internet traffic. Chung pointed to a infamous case from Pakistan wherein the government was able to divert YouTube users to its own IP addresses — effectively blocking its citizens from accessing YouTube content.

“Because of gaps in security for IP addresses, this kind of attack is still happening,” Chung said.

Using publicly accessible data, Chung’s team will work in three areas: 

  • Developing a technique for finding and evaluating security vulnerabilities
  • Analyzing the causes of configuration errors in the IP system and using machine learning-based tools to automatically correct them
  • Applying what the team learns from this work to other network protocols to better protect critical infrastructure and communication channels

Widening the net

“The internet is too broad, so just one researcher can’t do a meaningful study,” Chung said. “To get useful results, I am working with three Ph.D. students and several collaborators, including industry partners.”

Chung works not only with companies like Comcast and Cloudflare, but also with global nonprofits dedicated to a trustworthy internet, such as Regional Internet Registry for Europe, Internet Society, and Domain Name System Operations Analysis and Research Center.

His overall mission, Chung said, is to educate industry leaders, researchers, and the general public about these systems and how to protect themselves from bad actors. To that end, all the data, source code, and analysis from this project will be made available to the public.



Share26Tweet17
Previous Post

The James Webb Space Telescope captures a staggering quasar-galaxy merger in the remote universe

Next Post

Virginia Tech researchers work to create biodegradable bioplastics from food waste

Related Posts

blank
Technology and Engineering

Evaluating eGFR Equations in Chinese Children

December 3, 2025
blank
Technology and Engineering

Low Heart Rate Variability Signals Severe Brain Bleeds

December 3, 2025
blank
Technology and Engineering

Gut Microbiota’s Role in Necrotizing Enterocolitis

December 3, 2025
blank
Technology and Engineering

Using Machine Learning to Combat Water Pollution

December 3, 2025
blank
Technology and Engineering

Cost-Effectiveness of Home Phototherapy Reviewed

December 3, 2025
blank
Technology and Engineering

Unbound Fatty Acids Displace Bilirubin Like Sulfisoxazole

December 2, 2025
Next Post
Fujunzhu Zhao, a Ph.D. student, works in Zhiwu

Virginia Tech researchers work to create biodegradable bioplastics from food waste

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27587 shares
    Share 11032 Tweet 6895
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    995 shares
    Share 398 Tweet 249
  • Bee body mass, pathogens and local climate influence heat tolerance

    652 shares
    Share 261 Tweet 163
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    522 shares
    Share 209 Tweet 131
  • Groundbreaking Clinical Trial Reveals Lubiprostone Enhances Kidney Function

    491 shares
    Share 196 Tweet 123
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • Boosting Cancer Immunotherapy by Targeting DNA Repair
  • Addressing Dumpsite Risks: A Action Framework for LMICs
  • Evaluating eGFR Equations in Chinese Children
  • Global Guidelines for Shared Decision-Making in Valvular Heart Disease

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Blog
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 5,191 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading