Robust next-generation detection techniques to defend operational networks against attacks. As networks are fast becoming one of the pillars of our society, network security is essential.
Without good security, networks will be unreliable, more costly, and restricted in the capabilities they can offer. The project will allow advanced anomaly and intrusion detection techniques to be used in the ultra-high speeds of the Internet core. It will provide the groundwork for the attack detection and p ....Robust next-generation detection techniques to defend operational networks against attacks. As networks are fast becoming one of the pillars of our society, network security is essential.
Without good security, networks will be unreliable, more costly, and restricted in the capabilities they can offer. The project will allow advanced anomaly and intrusion detection techniques to be used in the ultra-high speeds of the Internet core. It will provide the groundwork for the attack detection and prevention infrastructure of the future. Read moreRead less
Managing quality of experience delivery in new generation telecommunications networks with e-negotiation. New generation telecommunications networks are required to support increasingly demanding services, including interactive multimedia and conferencing. The success of these networks will rely on the users' perception of their quality of experience. The management of these networks will rely on the ability of informed decision making that competes effectively for limited resources in such a ....Managing quality of experience delivery in new generation telecommunications networks with e-negotiation. New generation telecommunications networks are required to support increasingly demanding services, including interactive multimedia and conferencing. The success of these networks will rely on the users' perception of their quality of experience. The management of these networks will rely on the ability of informed decision making that competes effectively for limited resources in such a highly dynamic environment. This project will design information distribution strategies and smart decision making agents that negotiate a user's quality of experience using market mechanisms. Designs from this project will be trialled and validated in the partner's commercial networks.Read moreRead less
Smart communications network management: Delivering bundled interdependent services across internetworked heterogeneous domains. Sophisticated communications network management (data, voice, video) is crucial to the global economy. The field is worth several billion dollars per annum. This project will generate expertise that addresses and solves an important problem in communications management, will enable Australia to use communications networks more effectively, and will advance communicatio ....Smart communications network management: Delivering bundled interdependent services across internetworked heterogeneous domains. Sophisticated communications network management (data, voice, video) is crucial to the global economy. The field is worth several billion dollars per annum. This project will generate expertise that addresses and solves an important problem in communications management, will enable Australia to use communications networks more effectively, and will advance communications technology. Read moreRead less
Developing Minimum Message Length and Support Vector Machine methods to predict user behaviour. Predicting and modelling customer behaviour enables considerable savings in the telecommunications industry and elsewhere. The resulting predictive models facilitate identifying novice users, identifying fraud, responding to users' needs, guiding and advising users, and forwarding useful information.
We consider two cutting-edge data mining approaches, Minimum Message Length (developed and led by ....Developing Minimum Message Length and Support Vector Machine methods to predict user behaviour. Predicting and modelling customer behaviour enables considerable savings in the telecommunications industry and elsewhere. The resulting predictive models facilitate identifying novice users, identifying fraud, responding to users' needs, guiding and advising users, and forwarding useful information.
We consider two cutting-edge data mining approaches, Minimum Message Length (developed and led by Monash) and Support Vector Machines, in order to create efficient tailor-made software.
Our software will respond to specific groups of users, and their changes over time, rather than just the average user. Moreover, it will integrate the functionalities of existing individual data mining software.Read moreRead less
High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop paral ....High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop parallel algorithms for traffic analysis and load balancing that can exploit the capacity of these new firewalls. This project provides an excellent opportunity for an Australian company to compete in the growing security market.Read moreRead less
Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses an ....Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses and break-in attempts frequently appear in the world news. A major impediment to confidence in voice-over-IP services is the risk of attacks on its infrastructure, and the potential for using weaknesses in voice-over-IP infrastructure to launch attacks on the existing telephone network.Read moreRead less