DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE210100019
Funder
Australian Research Council
Funding Amount
$408,000.00
Summary
A Scalable and Adaptive-Resilient Blockchain. This project aims to address the security and scalability challenges that limit blockchain adoption. Existing blockchains do not scale and are vulnerable to attacks (e.g. with a total loss of over US$1 billion in 2019). This project expects to improve security by adaptively enforcing the currently broken security assumptions, and to improve scalability by designing blockchains with high concurrency via relaxed criteria on the ordering of transactions ....A Scalable and Adaptive-Resilient Blockchain. This project aims to address the security and scalability challenges that limit blockchain adoption. Existing blockchains do not scale and are vulnerable to attacks (e.g. with a total loss of over US$1 billion in 2019). This project expects to improve security by adaptively enforcing the currently broken security assumptions, and to improve scalability by designing blockchains with high concurrency via relaxed criteria on the ordering of transactions. The expected outcomes include foundations and practical solutions for self-adaptive, secure and scalable blockchains. The benefits of this would be improved confidence in and capacity for building blockchain applications, which have a predicted value of over US$3.1 trillion by 2030.Read moreRead less
Towards full lifecycle privacy protection on cloud. Privacy protection in user data on cloud is now at risk throughout all stages of user information lifecycle facing significant challenges such as stage adaptive protection, across-system protection, privacy invasion tracing and prediction. Current approaches mainly focus on a specific case at certain stage, hence cannot address those challenges properly by considering all stages. This project aims to systematically investigate those challenges ....Towards full lifecycle privacy protection on cloud. Privacy protection in user data on cloud is now at risk throughout all stages of user information lifecycle facing significant challenges such as stage adaptive protection, across-system protection, privacy invasion tracing and prediction. Current approaches mainly focus on a specific case at certain stage, hence cannot address those challenges properly by considering all stages. This project aims to systematically investigate those challenges and expects to establish innovative research and solutions for enabling full lifecycle privacy protection on cloud. The project outcomes will help to safeguard Australian community in fast-growing online cyber world, and benefit to fast-growing privacy sensitive data hosting and applications on cloud.Read moreRead less
Detecting Supervisory Control and Data Access (SCADA) malicious programs to protect Australian critical infrastructure. The security of SCADA systems has enormous impact to our national security and economy because they control and monitor critical infrastructure, like power, gas and water facilities and nuclear power plants, etc. This project aims to investigate the security issues and provide innovative technological solutions to detect and prevent such problems.
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that ....Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that are required for the 5G enabled environment. The construction of new AI-based tools and testing facilities as well as the generation of new knowledge in the field of privacy preservation and collaboration between universities are expected outcomes of this project. Read moreRead less
Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for loca ....Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for localised IoT execution, through microservices executing autonomously on nodes of IoT fog networks. It will develop new techniques for automated discovery of microservices from enterprise systems and the verification of future-state system execution based on current-state behavioural and other properties such as security.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170100641
Funder
Australian Research Council
Funding Amount
$305,754.00
Summary
Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new model ....Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new models, theories, techniques and PABE constructions. This research project is expected to contribute to cyber security in anonymous access control with advanced management for all Australians.Read moreRead less
Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes ....Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes are innovative technologies, guaranteeing accuracy and confidentiality of annotation results whilst protecting the privacy of data classification results. It enhances data-intensive outputs quality, which will benefit large data-intensive applications, such as cybersecurity protections via intrusion detection.Read moreRead less