Green cyber background graphic
Institute for Cyber Security

Applied Research 

Rendering of the Marshall University ICS Lab

The Institute for Cyber Security conducts applied research focused on advancing cybersecurity capabilities for critical infrastructure, public-sector organizations, and emerging technologies across West Virginia and the Appalachian region.

Our research integrates hands-on experimentation, cyber range environments, OT/ICS test platforms, drone and unmanned systems analysis, and digital forensics innovation. Each project is designed to solve real operational challenges faced by municipalities, healthcare providers, water systems, power utilities, and regional partners.

ICS research aligns directly with our mission: strengthening cyber readiness, improving resilience, accelerating innovation, and supporting the cybersecurity needs of communities, industry, and government.

Key research areas include:

MU ICS Drone

Drone Trace + Unmanned Systems Security

Drone Trace + Unmanned Systems Security
The ICS’s partnership with DroneTrace supports applied research in drone forensics, traceability, and unmanned aircraft system (UAS) behavior.

Confirmed activities include:

  • Analyzing drone flight data and hardware
  • Practicing traceability and identification techniques
  • Exploring security challenges in emerging UAS technologies
  • Supporting hands-on training for students and practitioners
ICS staff work on cyber research using a microscope

Digital Forensics and Investigative Innovation

The ICS supports digital forensics research and development through:

  • Experimentation with forensic tools and methods
  • Applied evidence-handling processes
  • Hands-on student and practitioner training
  • Practical testing of classroom and lab procedures

This research area grows directly from ICS faculty expertise and community training needs.

IT and OT Security for Critical Infrastructure

The ICS advances cybersecurity for operational technology across sectors including:

  • Water and wastewater systems
  • Healthcare technology environments
  • Municipal services
  • Industrial control systems
  • Transportation systems

Focus areas:

  • OT/ICS lab-based training
  • Cyber readiness and scenario planning
  • Vulnerability and threat analysis
  • Alignment with federal guidance (CISA, EPA, NIST)
Green glowing graphic of the world over a photo of rendering of the ICS lab

Cyber Operations Simulations and Threat-Response Modeling

The ICS conducts scenario driven cyber operations simulations:

  •  Simulated ransomware attacks to test incident response, containment, and recovery procedures.
  • Phishing and social engineering campaigns that evaluate organizational awareness and detection capabilities.
  • Advanced persistent threat (APT) emulation exercises replicating nation-state tactics, techniques, and procedures (TTPs).
  • Distributed denial-of-service (DDoS) attack scenarios to assess network resilience and defensive mitigation strategies.
  • Insider threat simulations modeling credential misuse, privilege escalation, and data exfiltration.
  • ICS/OT disruption scenarios that mimic real-world failures in energy, water, transportation, or manufacturing systems.
  • Supply-chain compromise simulations that replicate poisoned updates, dependency tampering, or compromised vendors.